Results 211 to 220 of about 13,488 (258)
Some of the next articles are maybe not open access.

Botnets

2014
Recent malicious attempts are intended to get financial benefits through a large pool of compromised hosts, which are called software robots or simply bots. A group of bots, referred to as a botnet, is remotely controllable by a server and can be used for sending spam emails, stealing personal information, and launching DDoS attacks. Growing popularity
openaire   +1 more source

Machine Learning Approaches for Botnet Detection in Network Traffic

AICCONF
Botnets pose a significant challenge to network security, continually evolving and threatening the integrity of digital infrastructure. Traditional botnet detection methodologies have limitations, prompting the need for innovative approaches.
Yousif Tareq Salih   +8 more
semanticscholar   +1 more source

Botnet and P2P Botnet Detection Strategies: A Review

2018 International Conference on Communication and Signal Processing (ICCSP), 2018
Among various network attacks, botnet led attacks are considered as the most serious threats. A botnet, i.e., the network of compromised computers is able to perform large scale illegal activities such as Distributed Denial of Service attacks, click fraud, bitcoin mining etc. These attacks are considered as the major concern now-a-days.
Himanshi Dhayal, Jitender Kumar
openaire   +1 more source

Disposable botnets

Proceedings of the 15th International Conference on Availability, Reliability and Security, 2020
Large botnets made up of Internet-of-Things (IoT) devices have been a steady presence in the threat landscape since 2016. Earlier research has found preliminary evidence that the IoT binaries and C&C infrastructure were only seen for very brief periods. It has not explained how attackers maintain control over their botnets.
Rui Tanabe   +7 more
openaire   +1 more source

An efficient botnet detection system for P2P botnet

2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016
Peer-to-Peer (P2P) botnets are exploited by the botmasters for their resiliency against the take down efforts. As the modern botnets are stealthier, the traditional botnet detection approaches are not suitable for the botnet detection. In this paper, an efficient botnet detection system is proposed for detecting the P2P botnet.
M. Thangapandiyan, P. M. Rubesh Anand
openaire   +1 more source

Botnets: Lifecycle and Taxonomy

2011 Conference on Network and Information Systems Security, 2011
The new threat of the Internet, but little known to the 'general public' is constituted by botnets. Botnets are networks of infected computers, which are headed by a pirate called also 'Attacker' or 'Master'. The botnets are nowadays mainly responsible for large-scale coordinated attacks.
Hachem N.   +3 more
openaire   +1 more source

Feature engineering based performance analysis of ML and DL algorithms for Botnet attack detection in IoMT

International Journal of System Assurance Engineering and Management, 2023
Sohail Saif   +2 more
semanticscholar   +1 more source

A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT

Internet of Things (Netherlands), 2023
Soleimanian Gharehchopogh Farhad   +1 more
exaly  

IoT botnet detection from software defined network using American zebra optimization algorithm with SSRNN-ELM

International journal of information technology
Nalluri Venkata   +7 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy