zombie

(redirected from Botnet)
Also found in: Dictionary, Medical, Financial, Acronyms, Encyclopedia, Wikipedia.
Graphic Thesaurus  🔍
Display ON
Animation ON
Legend
Synonym
Antonym
Related
  • noun

Synonyms for zombie

a dead body that has been brought back to life by a supernatural force

(voodooism) a spirit or supernatural force that reanimates a dead body

a god of voodoo cults of African origin worshipped especially in West Indies

someone who acts or responds in a mechanical or apathetic way

several kinds of rum with fruit juice and usually apricot liqueur

Synonyms

Related Words

References in periodicals archive ?
For a botnet to work, hackers look for vulnerable devices across the internet to infect as many connected devices as possible.
Therefore, it is necessary to reveal influence feature in botnet detection in order to overcome the difficulty to recognize the botnet activity in the network.
Ensure your firewall has malicious traffic detection, botnet detection, and command and control (C and C) call-home traffic detection.
And that makes it easier than ever to build huge botnets that take down much more than one site at a time.
If these techniques are then deployed at full scale with a botnet, the results can be devastating.
A year ago, ESET analyzed the Mumblehard botnet which was comprised of thousands of infected Linux systems located all around the world.
Criminal gangs who own botnets typically rent them out, which is why DDoS attacks also tend to be short lived.
Botnet, computer crime, identity crime, identity theft, Zeus botnet.
Botnet are a network of malicious software that can steal information, remotely gain control of devices and carry out cyber attacks like Distributed Denial-of-Service (DDoS) that prevent access of websites.
Mobile botnet [4] refers to a group of affected mobile phone/smartphones that are remotely controlled and administered by botmasters through the C&C architecture.
Attacks in the second quarter of 201 4 provided indications that the botnet is still in place from its earlier use in the Operation Ababil attacks against financial institutions in 2011-2013.
The damage of a botnet takes two forms; an infected internal computer system that becomes controlled by an operator to perform differ- ent hacking tasks or a hacked organisation website where bots are commanded to har- vest personal information.
The study indicates, Botnet creation begins with the download of a software program called a "bot" (for example, IRCBot, SGBot, or AgoBot) along with an embedded exploit (or
Over the past five years, Arbor has tracked the rise of botnet- fueled DDoS attacks -- in this year's Worldwide Infrastructure Security Report, botnets were identified by survey respondents as the primary engine fueling DDoS attacks that threaten the availability of data center and cloud-based infrastructures.