Results 91 to 100 of about 13,488 (258)
A novel botnet attack detection for IoT networks based on communication graphs [PDF]
Dante Ivan Leiva Muñoz +1 more
openalex +1 more source
A Botnets Circumspection: The Current Threat Landscape, and What We Know So Far
Botnets have carved a niche in contemporary networking and cybersecurity due to the impact of their operations. The botnet threat continues to evolve and adapt to countermeasures as the security landscape continues to shift.
Emmanuel C. Ogu +3 more
doaj +1 more source
Ensemble classification to predict botnet and its impact on IoT networks
The IoT (Internet of Things) has been rapidly growing to make a stronger influence on huge industrial systems. Since cybercriminals have made IoT a target for harmful operations such as botnets, an attack on the end nodes is now a possibility. Protecting
G. Chandana Swathi +2 more
doaj +1 more source
Botnet Badinage: Regulatory Approaches to Combating Botnets
A botnet is a collection of remotely controlled and compromised computers that are controlled by a bot master. Botnets are the main crime tool used by cybercriminals. To use an analogy, many crimes may be committed with a gun ranging from murder to rape to armed robbery to assault to breaking and entering to theft.
openaire +2 more sources
BotCatcher:botnet detection system based on deep learning
Machine learning technology has wide application in botnet detection.However,with the changes of the forms and command and control mechanisms of botnets,selecting features manually becomes increasingly difficult.To solve this problem,a botnet detection ...
Di WU, Binxing FANG, Xiang CUI, Qixu LIU
doaj +2 more sources
Modeling Peer-to-Peer Botnet on Scale-Free Network
Peer-to-peer (P2P) botnets have emerged as one of the serious threats to Internet security. To prevent effectively P2P botnet, in this paper, a mathematical model which combines the scale-free trait of Internet with the formation of P2P botnet is ...
Liping Feng +4 more
doaj +1 more source
A real-time botnet detection model based on an efficient wrapper feature selection method
Akram Farahmand Nejad, Samira Noferesti
openalex +1 more source
Botnet Fingerprinting: Anomaly Detection in SMTP Conversations [PDF]
Piotr Bazydlo +2 more
openalex +1 more source
Model-Based Framework for exploiting sensors of IoT devices using a Botnet: A case study with Android [PDF]
Zubair Khaliq +4 more
openalex +1 more source

