作者: Michael J. Suzio , John D. Kuhn , Gary I. Givental , II Daniel E. Chapman
DOI:
关键词:
摘要: A computer detects malicious intrusions (or bots) into a computer. The receives firewall log data that includes communication records containing the source and destination of communication, as well as, time communication. or may be on list suspicious servers known to contain software. identifies sequence communications between common address address. further substantially fixed intervals communications, generates an alert indicating suspected bot intrusion. also from patterns in intervals, similarly generating