Results 61 to 70 of about 13,488 (258)

Edge‐Oriented DoS/DDoS Intrusion Detection and Supervision Platform

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT This work presents an Edge Node‐Oriented DoS/DDoS Intrusion Detection and Monitoring Platform, a novel anomaly detection system based on temporal analysis with machine learning (ML) and deep learning (DL) algorithms, specifically designed to operate on edge servers with limited resources.
Geraldo Eufrazio Martins Júnior   +3 more
wiley   +1 more source

Botnet Detection Using On-line Clustering with Pursuit Reinforcement Competitive Learning (PRCL)

open access: yesEmitter: International Journal of Engineering Technology, 2018
Botnet is a malicious software that often occurs at this time, and can perform malicious activities, such as DDoS, spamming, phishing, keylogging, clickfraud, steal personal information and important data.
Yesta Medya Mahardhika   +2 more
doaj   +1 more source

SkipGateNet: A Lightweight CNN-LSTM Hybrid Model With Learnable Skip Connections for Efficient Botnet Attack Detection in IoT

open access: yesIEEE Access
The rise of Internet of Things (IoT) has led to increased security risks, particularly from botnet attacks that exploit IoT device vulnerabilities. This situation necessitates effective Intrusion Detection Systems (IDS), that are accurate, lightweight ...
Mohammed S. Alshehri   +5 more
semanticscholar   +1 more source

Securing the Unseen: A Comprehensive Exploration Review of AI‐Powered Models for Zero‐Day Attack Detection

open access: yesExpert Systems, Volume 43, Issue 3, March 2026.
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam   +3 more
wiley   +1 more source

Ensemble averaging deep neural network for botnet detection in heterogeneous Internet of Things devices

open access: yesScientific Reports
The botnet attack is one of the coordinated attack types that can infect Internet of Things (IoT) devices and cause them to malfunction. Botnets can steal sensitive information from IoT devices and control them to launch another attack, such as a ...
Aulia Arif Wardana   +3 more
semanticscholar   +1 more source

A Two‐Phase Detection Method Based on Ensemble Feature Fusion for Detecting Distributed Denial of Service (DDoS) Attacks in Cloud Computing Using Deep Learning Algorithm

open access: yesEngineering Reports, Volume 8, Issue 2, February 2026.
This study introduces a two‐phase method for detecting DDoS attacks in cloud environments using ensemble feature fusion and a hybrid CNN‐LSTM model. By combining meta‐heuristic feature selection with deep learning, the approach achieves over 99% accuracy on benchmark datasets, reducing false positives and improving cybersecurity resilience.
Hind Saad Hussein   +3 more
wiley   +1 more source

Smishing Strategy Dynamics and Evolving Botnet Activities in Japan [PDF]

open access: gold, 2022
Ryu Saeki   +4 more
openalex   +1 more source

Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem   +4 more
wiley   +1 more source

A Botnet Detecting Infrastructure Using a Beneficial Botnet [PDF]

open access: yesProceedings of the 2018 ACM SIGUCCS Annual Conference, 2018
A beneficial botnet, which tries to cope with technology of malicious botnets such as peer to peer (P2P) networking and Domain Generation Algorithm (DGA), is discussed. In order to cope with such botnets' technology, we are developing a beneficial botnet as an anti-bot measure, using our previous beneficial bot.
openaire   +1 more source

RRF‐IPS: A Real‐Time Reputation‐Based Intrusion Prevention System

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
RRF‐IPS: A Real‐Time Reputation‐Based Intrusion Prevention System. ABSTRACT With the rapid development of technologies such as cloud computing and the Internet of Things, organizations face the thorny reality that network attacks are becoming increasingly diverse, covert, and intelligent.
Zhenghao Qian   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy