Results 81 to 90 of about 13,488 (258)

Network Security Modeling using NetFlow Data: Detecting Botnet attacks\n in IP Traffic [PDF]

open access: green, 2021
Ganesh Subramaniam   +3 more
openalex   +1 more source

B-CAT: a model for detecting botnet attacks using deep attack behavior analysis on network traffic flows

open access: yesJournal of Big Data
Threats on computer networks have been increasing rapidly, and irresponsible parties are always trying to exploit vulnerabilities in the network to do various dangerous things.
Muhammad Aidiel Rachman Putra   +2 more
semanticscholar   +1 more source

MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network

open access: yesInternational Conference on Information Systems Security and Privacy, 2020
The exponential growth of the Internet of Things in conjunction with the traditional lack of security mechanisms and resource constraints associated with these devices have posed new risks and challenges to security in networks.
Alejandro Guerra-Manzanares   +3 more
semanticscholar   +1 more source

Adversarial Attack Detection in Federated Learning Using Quantum Recurrent Neural Network

open access: yesApplied Computational Intelligence and Soft Computing, Volume 2026, Issue 1, 2026.
Adversarial attacks in network systems manipulate data to deceive networks, impacting domains like image recognition and natural language processing. Attackers exploit algorithm weaknesses, creating misleading inputs that lead to inaccurate outcomes.
Venkat R.   +7 more
wiley   +1 more source

Lightweight Deep Learning Approach for Intelligent Intrusion Detection in IoT Networks

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2026, Issue 1, 2026.
Intrusion detection system (IDS) is designed to analyze and monitor the network traffic to identify unauthorized access or attacks in an Internet of Things (IoT). IDS assists in protecting IoT devices and networks by recognizing malicious activities and preventing potential breaches.
Srikanth Mudiyanuru Sriramappa   +5 more
wiley   +1 more source

Research on C&C traffic detection of DDoS BotNet in internet of things

open access: yesDianxin kexue, 2019
C&C communication detection used in IoT DDoS BotNet is an important part to identify DDoS BotNet.By analyzing C&C communication traffic in the BotNet,the characteristics of the smaller C&C communication data packet and the periodicity of DNS ...
Yusheng HE
doaj   +2 more sources

Metaheuristic Optimization Algorithm for Vulnerability Detection in Web of Things Environment

open access: yesJournal of Engineering, Volume 2026, Issue 1, 2026.
The integration of the Web of Things with cloud computing platforms has significantly improved data sharing, analytics, and automation across smart environments. However, this interconnection also exposes devices and cloud infrastructures to severe security threats, including Trojans, ransomware, worms, and advanced malware.
Romil Rawat   +2 more
wiley   +1 more source

Design and Implementation of Automated Steganography Image-Detection System for the KakaoTalk Instant Messenger

open access: yesComputers, 2020
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
Jun Park, Youngho Cho
doaj   +1 more source

Botnet Detection Using Support Vector Machines with Artificial Fish Swarm Algorithm

open access: yesJournal of Applied Mathematics, 2014
Because of the advances in Internet technology, the applications of the Internet of Things have become a crucial topic. The number of mobile devices used globally substantially increases daily; therefore, information security concerns are increasingly ...
Kuan-Cheng Lin   +2 more
doaj   +1 more source

Construction and Performance Analysis of Image Steganography-based Botnet in KakaoTalk Openchat

open access: yesComputers, 2019
Once a botnet is constructed over the network, a bot master and bots start communicating by periodically exchanging messages, which is known as botnet C&C communication, in order to send botnet commands to bots, collect critical information stored in
Jaewoo Jeon, Youngho Cho
doaj   +1 more source

Home - About - Disclaimer - Privacy