Results 31 to 40 of about 13,488 (258)

Security Hardening of Botnet Detectors Using Generative Adversarial Networks

open access: yesIEEE Access, 2021
Machine learning (ML) based botnet detectors are no exception to traditional ML models when it comes to adversarial evasion attacks. The datasets used to train these models have also scarcity and imbalance issues. We propose a new technique named Botshot,
Rizwan Hamid Randhawa   +4 more
doaj   +1 more source

Ensemble Machine Learning Techniques for Accurate and Efficient Detection of Botnet Attacks in Connected Computers

open access: yesEngineer, 2023
The transmission of information, ideas, and thoughts requires communication, which is a crucial component of human contact. The utilization of Internet of Things (IoT) devices is a result of the advent of enormous volumes of messages delivered over the ...
S. Afrifa   +4 more
semanticscholar   +1 more source

XG-BoT: An Explainable Deep Graph Neural Network for Botnet Detection and Forensics [PDF]

open access: yesInternet of Things, 2022
In this paper, we propose XG-BoT, an explainable deep graph neural network model for botnet node detection. The proposed model comprises a botnet detector and an explainer for automatic forensics.
Wai Weng Lo   +3 more
semanticscholar   +1 more source

Multilayer Framework for Botnet Detection Using Machine Learning Algorithms

open access: yesIEEE Access, 2021
A botnet is a malware program that a hacker remotely controls called a botmaster. Botnet can perform massive cyber-attacks such as DDOS, SPAM, click-fraud, information, and identity stealing. The botnet also can avoid being detected by a security system.
Wan Nur Hidayah Ibrahim   +6 more
doaj   +1 more source

High resistance botnet based on smart contract

open access: yes网络与信息安全学报, 2021
The development and application of blockchain technology makes it possible to build a more robust and flexible botnet command and control channel. In order to better study this type of potential new botnet threats, a highly confrontational botnet model ...
ZHAO Hao, SHU Hui, KANG Fei, XING Ying
doaj   +3 more sources

Botnet Vulnerability Intelligence Clustering Classification Mining and Countermeasure Algorithm Based on Machine Learning

open access: yesIEEE Access, 2019
Botnet detection, vulnerability mining and confrontation bring many challenges to network security, and become the main dangerous source threatening economic development and causing significant economic losses. To solve these problems, we combine machine
Zenan Chu, Yi Han, Kai Zhao
doaj   +1 more source

Hybrid Botnet Detection Based on Host and Network Analysis

open access: yesJournal of Computer Networks and Communications, 2020
Botnet is one of the most dangerous cyber-security issues. The botnet infects unprotected machines and keeps track of the communication with the command and control server to send and receive malicious commands.
Suzan Almutairi   +3 more
doaj   +1 more source

Botnet dataset with simultaneous attack activity

open access: yesData in Brief, 2022
The proposed dataset shows characteristics of simultaneous botnet attack activities. Botnet network traffic has sequentially interconnected as formed as bidirectional network flow (binetflow), which is combined with normal activities.
Muhammad Aidiel Rachman Putra   +2 more
doaj   +1 more source

Reliable Machine Learning Model for IIoT Botnet Detection

open access: yesIEEE Access, 2023
Due to the growing number of Industrial Internet of Things (IoT) devices, network attacks like denial of service (DoS) and floods are rising for security and reliability issues.
Fatma Taher   +3 more
semanticscholar   +1 more source

Sonification of Network Traffic for Detecting and Learning About Botnet Behavior

open access: yesIEEE Access, 2018
Today's computer networks are under increasing threat from malicious activity. Botnets (networks of remotely controlled computers, or “bots”) operate in such a way that their activity superficially resembles normal network traffic which ...
Mohamed Debashi, Paul Vickers
doaj   +1 more source

Home - About - Disclaimer - Privacy