Statements (49)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:virus
|
gptkbp:can_be_hidden_by |
encryption
obfuscation techniques proxy servers fast-flux DNS |
gptkbp:can_be_used_for |
credential stuffing
click fraud mining cryptocurrency spreading ransomware |
gptkbp:can_be_used_to |
peer-to-peer architecture
hybrid architecture centralized architecture |
gptkbp:can_detect |
traffic analysis
intrusion detection systems firewalls behavioral analysis |
gptkbp:composed_of |
compromised devices
|
gptkbp:control_system |
botmaster
|
gptkbp:defeated |
gptkb:law_enforcement
network monitoring tools cybersecurity firms anti-malware software |
gptkbp:diseases |
gptkb:servers
gptkb:Io_T_devices gptkb:smartphone computers |
https://www.w3.org/2000/01/rdf-schema#label |
Botnets
|
gptkbp:is_often_used_in |
command and control servers
|
gptkbp:operates |
internet
|
gptkbp:prevention |
rate limiting
software updates network segmentation threat intelligence sharing anomaly detection systems firewall rules user education traffic filtering IP blacklisting strong authentication methods |
gptkbp:targets |
gptkb:financial_institutions
e-commerce sites social media accounts gaming platforms |
gptkbp:used_for |
data theft
spamming DDo S attacks |
gptkbp:bfsParent |
gptkb:Cisco_Talos
gptkb:Cybercriminal |
gptkbp:bfsLayer |
6
|