Results 11 to 20 of about 13,488 (258)
Examination of Traditional Botnet Detection on IoT-Based Bots [PDF]
A botnet is a collection of Internet-connected computers that have been suborned and are controlled externally for malicious purposes. Concomitant with the growth of the Internet of Things (IoT), botnets have been expanding to use IoT devices as their ...
Ashley Woodiss-Field +2 more
semanticscholar +2 more sources
Botne and Botnet Detection Survey [PDF]
Among the various forms of malware, Botnets are emerging as the most serious threat, Botnets, remotely controlled by the attackers, and whose members are located in homes, schools, businesses, and governments around the world.
Manar Ahmad, Maisireem Kamal
doaj +1 more source
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed +8 more
wiley +1 more source
BOTNET DETECTION USING INDEPENDENT COMPONENT ANALYSIS
Botnet is a significant cyber threat that continues to evolve. Botmasters continue to improve the security framework strategy for botnets to go undetected.
Wan Nurhidayah Ibrahim +3 more
doaj +1 more source
An Automated Behaviour-Based Clustering of IoT Botnets
The leaked IoT botnet source-codes have facilitated the proliferation of different IoT botnet variants, some of which are equipped with new capabilities and may be difficult to detect.
Tolijan Trajanovski, Ning Zhang
doaj +1 more source
Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset [PDF]
The proliferation of IoT systems, has seen them targeted by malicious third parties. To address this, realistic protection and investigation countermeasures need to be developed.
Nickolaos Koroniotis +3 more
semanticscholar +1 more source
Botnet Identification Technology Based on Fuzzy Clustering [PDF]
A Botnet that combining worms,backdoors,and Trojans has become the backing of Advanced Persistent Threat(APT) attacks because it can be used by attackers to send spam,perform denial of service attacks,and steal sensitive information.Existing Botnet ...
CHEN Ruidong,ZHAO Lingyuan,ZHANG Xiaosong
doaj +1 more source
With various malware, botnets are the legitimate risk increasing against cybersecurity providing criminal operations like malware dispersal, distributed denial of service attacks, fraud clicking, phishing, and identification of theft. Existing techniques
Sathiyandrakumar Srinivasan +1 more
doaj +1 more source
N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders [PDF]
The proliferation of IoT devices that can be more easily compromised than desktop computers has led to an increase in IoT-based botnet attacks. To mitigate this threat, there is a need for new methods that detect attacks launched from compromised IoT ...
Yair Meidan +6 more
semanticscholar +1 more source
Securing Industrial Internet of Things Against Botnet Attacks Using Hybrid Deep Learning Approach
Industrial Internet of Things (IIoT) formation of a richer ecosystem of intelligent, interconnected devices while enabling new levels of digital innovation has transformed and revolutionized global manufacturing and industry 4.0.
Tooba Hasan +6 more
semanticscholar +1 more source

