Statements (49)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:virus
|
gptkbp:bfsLayer |
5
|
gptkbp:bfsParent |
gptkb:Cisco_Talos
gptkb:Cybercriminal |
gptkbp:composed_of |
compromised devices
|
gptkbp:controls |
botmaster
|
gptkbp:defeated |
gptkb:Police_Department
network monitoring tools cybersecurity firms anti-malware software |
https://www.w3.org/2000/01/rdf-schema#label |
Botnets
|
gptkbp:is_often_used_in |
command and control servers
|
gptkbp:is_protected_by |
rate limiting
software updates network segmentation threat intelligence sharing anomaly detection systems firewall rules user education traffic filtering IP blacklisting strong authentication methods |
gptkbp:is_used_for |
peer-to-peer architecture
data theft hybrid architecture spamming centralized architecture D Do S attacks credential stuffing click fraud mining cryptocurrency spreading ransomware |
gptkbp:operates |
internet
|
gptkbp:recognizes |
traffic analysis
intrusion detection systems firewalls behavioral analysis |
gptkbp:social_responsibility |
gptkb:Io_T_devices
gptkb:smartphone gptkb:server computers |
gptkbp:stealth_features |
encryption
obfuscation techniques proxy servers fast-flux DNS |
gptkbp:targets |
gptkb:Educational_Institution
e-commerce sites social media accounts gaming platforms |