botnet
美 ['b?tnet]
英 ['b?tnet] 
- n.僵尸網絡(指受惡意軟件控制的計算機群)
- 網絡殭屍網路;殭屍網絡;僵屍網路
例句
The Rustock botnet, which sent up to 30 billion spam messages per day, might have been run by two or three people.
Rustock僵尸網絡平均每天發送300億封垃圾郵件,或許只由兩三個人控制。
Such "zombie" machines can be linked up to thousands, if not millions, of others around the world to create a "botnet" .
這些“行尸走肉”的機器即使不能與幾百萬臺電腦相連也能與幾千臺世界各地的電腦相連,從而創造了一個“僵尸網絡”。
There has been a range of speculation about the nature of the threat posed by the botnet, from a wake-up call to a devastating attack.
關于僵尸網絡構成的威脅有著廣泛的投機,從喚醒命令直至破壞性的攻擊。
Weidman's program is one of the first known to turn smart phones into nodes of a botnet.
韋德曼的程序就是其中一種最先知道的可用于加入僵尸網絡節點的軟件。
This led the Symantec researchers to wonder if this was, in fact, the first case of a mobile botnet being spotted in the wild.
這不禁讓賽門鐵克的研究人員想這是否就是手機僵尸網絡在現實中的第一個實例呢。
Botnet has stepped into the expanding phase, and has been a serious threat to Internet security.
僵尸網絡正步入快速發展時期,對互聯網安全已經造成嚴重威脅。
Becoming part of a botnet requires the installation of a remotely accessible command and control application on the computer under attack.
要變成僵尸網絡的一部分,需要對受攻擊的電腦進行遠程訪問命令和控制應用程序的安裝。
It could also be used to completely hijack the computer, adding it to a botnet.
它也可以用來完全的劫持電腦,加入到一個僵尸網絡。
Users do not have to do anything to become infected; simply rendering a Web page can launch a botnet exploit.
用戶不需要做任何事情,才會受到感染;僅僅渲染一個網頁網頁感染任何可以發動僵尸網絡攻擊。
If any anon fails to be inspired by the target, she can remove her own computer from the volunteer botnet, reducing its effect.
而如果有任何一位無名氏對攻擊目標不感興趣的話,他便可以將自己的計算機從志愿者僵尸網絡中脫離出來,以減少這次攻擊的效力。
The virus created a so-called "botnet" , a network of computers that could be controlled by the writers of the software.
該病毒創建了一個所謂的“僵尸網絡”(botnet),即可能被病毒軟件開發者控制的計算機網絡。
Last week, investigators quickly located computers that were involved with the control of the botnet in Britain and several other countries.
上周,調查人員很快在英國和其他國家定位了控制僵尸網絡的部分計算機。
The existence of the botnet has brought together some of the world's best computer security experts to prevent potential damage.
由于僵尸網絡的存在把世界上一些最好的計算機安全專家聚到一起來阻止其帶來的潛在破壞。
The storage site was hosted in the Ukraine and its contents showed that the botnet was harvesting data.
這個存儲站點的服務器在烏克蘭。從其內容可以看出它正在捕獲數據。
The results show that botnet detection is completed in expected round under controlled false positive rate and false negative rate.
實驗結果表明,在保證誤報率和漏報率的前提下該方法能在預定檢測輪數內完成判定。
As an added twist, a number of underground forums even sell botnet software for do-it-yourselfers.
作為額外服務,許多地下論壇甚至銷售僵尸網絡程序,讓買家自己動手進行攻擊。
This paper describes the IRC-based botnet. First, we explain the botnet behavior and the hard to solve problems for security officer.
本篇論文以IRC協定的botnet為研究對象,首先說明botnet的運作機制,和botnet對于資安人員難以解決的問題。
This could allow malicious sites to steal private data, send spam, or enlist the computer in a botnet.
這可能允許惡意網站竊取個人資料,發送垃圾郵件,或爭取在一個僵尸網絡的計算機。
Botnets continue to proliferate, despite recent botnet takedowns.
雖然近期在拆卸僵尸網絡,但它仍舊繼續激增。
These related emails were then reduced to hosts (static or dynamic IP address) to identify the botnet in question.
然后這些相關電子郵件會減少至主機(靜態或動態IP地址)以識別有問題的僵尸網絡。
Using the telecommunications network, rather than the Internet, for botnet control allows attackers to hide their actions from users.
對于僵尸網絡而言使用通訊網絡替代因特網能夠有更大的優勢,那就是隱匿攻擊者的身份。
RICHARD BOSCOVICH: "It's not just one botnet but probably hundreds of different botnets that come from this particular code base. "
這不只是一個僵尸網絡,可能有來自這個特定代碼基地的各種僵尸網絡。
Botnet is deemed the most dangerous threat, and has posed terrible impact in many aspects.
僵尸網路被視為最危險的威脅,沖擊層面既廣又深。
The students then hired the services of several botnet controllers to systematically click on ad links that were displayed on these sites.
這些學生然后向肉雞操控者租用肉雞網絡來有組織的點擊他們站點的上廣告。
There's no magic "cyberspace command" solution the USAF can unleash to defeat a botnet.
沒有什么神奇的“網際司令部”的解決之道可以讓美國空軍用來打敗疆尸電腦。
They buy advanced code on the Internet's black market, customize it, then sell or rent the resulting botnet to the highest bidders.
他們從網路黑市購買先進的程式碼,視需要加以修改,然后把得到的僵尸網路出售或出租給出價最高的競標者。
Haley said news of the Apple botnet is significant in part because it's something other authors of malicious code can build from.
哈利說,蘋果病毒的新聞意義重大,部分是因為惡意程序的作者可以開發出編碼。
Then they changed the orders, effectively zombifying the botnet for their own research.
小組修改了指令,利用僵尸網絡來進行他們的研究。
"Then you have every computer in China potentially as part of a botnet, " Colin Maclay, also of Harvard, told BBC News.
“那樣所有的中國電腦都可能成為僵尸網絡的一部分,”同樣供職哈佛的科林·麥克雷告訴BBC新聞。
Botnet have hidden attackers, and the characteristics of high flexibility, but also an ability to control multiple computers.
僵尸網路有攻擊者隱密、且彈性大的特性,而且能夠一次對多臺電腦進行控制。
It's not impossible to catch a botnet in the act.
要發現有所動作的僵尸網絡并非不可能的事。
An event that is not that unusual is that somebody steals a botnet from someone else.
一個很不普通的事是有人從別人那里偷取僵尸網絡。
China, on the other hand, only sends 0. 33% of the global botnet spam.
另一方面,中國只向世界發布0.33%的垃圾郵件。
Botnet; Detection System; Abnormal Traffic; Detection Methods; Traffic Filter;
僵尸網絡;檢測系統;異常流量;檢測方案;流量清洗;
Malicious BotNet and Its Illumination on Computer Security
僵尸網絡及其啟發
Determine whether your PC is part of a botnet
確定你的電腦是否陷入了僵尸網絡
Study on the Technology for Detecting the Botnet
僵尸網絡的檢測技術研究