Results 21 to 30 of about 13,488 (258)

Botnet detection based on generative adversarial network

open access: yesTongxin xuebao, 2021
In order to solve the problems of botnets’ strong concealment and difficulty in identification, and improve the detection accuracy of botnets, a botnet detection method based on generative adversarial networks was proposed.By reorganizing the data ...
Futai ZOU   +3 more
doaj   +2 more sources

Federated Deep Learning for Zero-Day Botnet Attack Detection in IoT-Edge Devices

open access: yesIEEE Internet of Things Journal, 2021
Deep learning (DL) has been widely proposed for botnet attack detection in Internet of Things (IoT) networks. However, the traditional centralized DL (CDL) method cannot be used to detect the previously unknown (zero-day) botnet attack without breaching ...
S. Popoola   +5 more
semanticscholar   +1 more source

Large-scale Malicious P2P Botnet Node Detection Technology Based on Challenge Strategy [PDF]

open access: yesJisuanji gongcheng, 2016
Traditional botnet detection technologies mainly detect botnet nodes in specified area network on the hosts or the border of gateway export,which have small scale and low detection efficiency.To efficiently execute Peer-to-Peer(P2P) network botnet node ...
LI Jing,YAO Yiyang,LU Xindai,QIAO Yong
doaj   +1 more source

Design of Universal Botnet Experimental Platform [PDF]

open access: yesJisuanji gongcheng, 2018
Botnet research in open networks has many drawbacks,such as uncontrollable process,difficult to scale,and unable to repeat experiments.In order to solve this problem,the requirement and design principle of the universal botnet experimental platform with ...
LI Dawei
doaj   +1 more source

Hybrid Deep Learning for Botnet Attack Detection in the Internet-of-Things Networks

open access: yesIEEE Internet of Things Journal, 2021
Deep learning (DL) is an efficient method for botnet attack detection. However, the volume of network traffic data and memory space required is usually large.
S. Popoola   +4 more
semanticscholar   +1 more source

Botnet Attack Detection by Using CNN-LSTM Model for Internet of Things Applications

open access: yesSecur. Commun. Networks, 2021
The Internet of Things (IoT) has grown rapidly, and nowadays, it is exploited by cyber attacks on IoT devices. An accurate system to identify malicious attacks on the IoT environment has become very important for minimizing security risks on IoT devices.
Hasan Alkahtani, Theyazn H. H. Aldhyani
semanticscholar   +1 more source

Review of Botnet Attack Detection in SDN-Enabled IoT Using Machine Learning

open access: yesSensors, 2022
The orchestration of software-defined networks (SDN) and the internet of things (IoT) has revolutionized the computing fields. These include the broad spectrum of connectivity to sensors and electronic appliances beyond standard computing devices ...
Worku Gachena Negera   +4 more
doaj   +1 more source

A Meta-Classification Model for Optimized ZBot Malware Prediction Using Learning Algorithms

open access: yesMathematics, 2023
Botnets pose a real threat to cybersecurity by facilitating criminal activities like malware distribution, attacks involving distributed denial of service, fraud, click fraud, phishing, and theft identification.
Shanmugam Jagan   +6 more
doaj   +1 more source

DBoTPM: A Deep Neural Network-Based Botnet Prediction Model

open access: yesElectronics, 2023
Internet of things (IoT) devices’ evolution and growth have boosted system efficiency, reduced human labour, and improved operational efficiency; however, IoT devices pose substantial security and privacy risks, making them highly vulnerable to botnet ...
Mohd Anul Haq
semanticscholar   +1 more source

Detecting A Botnet By Reverse Engineering

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2013
— Botnet malware is a malicious program. Botnet that infects computers, called bots, will be controlled by a botmaster to do various things such as: spamming, phishing, keylogging Distributed Denial of Service (DDoS) and other activities that are ...
Oesman Hendra Kelana, Khabib Mustofa
doaj   +1 more source

Home - About - Disclaimer - Privacy