翻訳と辞書
Words near each other
・ Commana Parish close
・ Commanche Court
・ Commanche Run
・ Command
・ Command & Conquer
・ Command & Conquer (1995 video game)
・ Command & Conquer (2013 video game)
・ Command (album)
・ Command (computing)
・ Command (military formation)
・ Command (teaching style)
・ Command Airways
・ Command Airways (South Africa)
・ Command and control
・ Command and control (disambiguation)
Command and control (malware)
・ Command and control (management)
・ Command and Control Regiment (Sweden)
・ Command and control regulation
・ Command and Control Research Program
・ Command and Data modes (modem)
・ Command and influence
・ Command and obedience in the Bundeswehr
・ Command and Staff College
・ Command and Staff College (disambiguation)
・ Command Ashore insignia
・ Command at Sea insignia
・ Command Authority
・ Command Bolshoi
・ Command button


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Command and control (malware) : ウィキペディア英語版
Command and control (malware)

In the field of computer security, command and control (C&C) infrastructure consists of servers and other technical infrastructure used to control malware in general, and, in particular, botnets.
〔(【引用サイトリンク】title=Command & Control: Understanding, denying, detecting )〕〔(【引用サイトリンク】title=Command and Control in the Fifth Domain )〕 Command and control servers may be either directly controlled by the malware operators, or themselves run on hardware compromised by malware. Fast-flux DNS can be used as a way to make it difficult to track down the control servers, which may change from day to day. Control servers may also hop from DNS domain to DNS domain, with domain generation algorithms being used to create new DNS names for controller servers.〔(【引用サイトリンク】title=29 Feb 2015 )
In some cases, computer security experts have succeeded in destroying or subverting malware command and control networks, by, among other means, seizing servers or getting them cut off from the Internet, denying access to domains that were due to be used by malware to contact its C&C infrastructure, and, in some cases, breaking into the C&C network itself. In response to this, C&C operators have resorted to using techniques such as overlaying their C&C networks on other existing benign infrastructure such as IRC or Tor, using peer-to-peer networking systems that are not dependent on any fixed servers, and using public key encryption to defeat attempts to break into or spoof the network.
==See also==

*Malware
*Advanced Persistent Threat

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Command and control (malware)」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.