Results 191 to 200 of about 14,194 (229)
Some of the next articles are maybe not open access.
2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC), 2009
Botnet is a collection of computer hosts exploited by malicious software that is remotely controlled through a command and control channel. More new types of attacks invented based on Botnets. Because of usage of legitimate IRC (Internet Relay Chat) servers to command and control the bots, it is hard to detect and remove Botnets.
Hsiao-Chung Lin +2 more
openaire +1 more source
Botnet is a collection of computer hosts exploited by malicious software that is remotely controlled through a command and control channel. More new types of attacks invented based on Botnets. Because of usage of legitimate IRC (Internet Relay Chat) servers to command and control the bots, it is hard to detect and remove Botnets.
Hsiao-Chung Lin +2 more
openaire +1 more source
Botnet Detection using Machine Learning
2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), 2021A bot is a computer that has been affected through a malware infection and can be controlled distantly by a cyber-criminal. The cyber-criminal would be able to utilize the bot to dispatch more assaults. A botnet is a collection of such bot controlled by a cyber-criminal Infected group of computers creates a botnet on the global network.
K B Aswathi +4 more
openaire +1 more source
Detecting encrypted botnet traffic
2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2013Bot detection methods that rely on deep packet inspection (DPI) can be foiled by encryption. Encryption, however, increases entropy. This paper investigates whether adding high-entropy detectors to an existing bot detection tool that uses DPI can restore some of the bot visibility. We present two high-entropy classifiers, and use one of them to enhance
Han Zhang +2 more
openaire +1 more source
2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2014
Botnets continue to constitute a major security threat to users of the internet. We examine a novel security game between a bot master and the legitimate users of the compromised network. The more a bot master utilizes his botnet, the more likely it is he will be detected by the legitimate users of the network.
Braden Soper, John Musacchio
openaire +1 more source
Botnets continue to constitute a major security threat to users of the internet. We examine a novel security game between a bot master and the legitimate users of the compromised network. The more a bot master utilizes his botnet, the more likely it is he will be detected by the legitimate users of the network.
Braden Soper, John Musacchio
openaire +1 more source
Encrypted Botnet Detection Scheme
2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2014Botnets have started using Information obfuscation techniques include encryption to evade detection. In order to detect encrypted botnet traffic, in this paper we see detection of encrypted botnet traffic from normal network traffic as traffic classification problem.
openaire +1 more source
Detecting and destroying botnets
Network Security, 2016Due to their limitless size and capacity, botnets are among the most powerful components of a modern cyber-criminal's arsenal of attack techniques. They are made up of compromised workstations distributed over the public Internet that leverage the untapped processing power of a multitude of endpoints, usually to accomplish a malicious agenda.
openaire +1 more source
Botnet Detection Using Bayes Classifier
2021In today’s connected world, risk of getting attacked over the internet is increased, which plays a major role in infecting the devices over the internet. The internet is flooded with different malwares, but we have focused on the harmful effects of Botnet.
Prapti Kolpe, Deepak Kshirsagar
openaire +1 more source
Collaboration-based Botnet Detection Architecture
2009 Second International Conference on Intelligent Computation Technology and Automation, 2009With the rapid prevalence of botnet, Internet is facing growing threats. Botnet detection has recently become very important in the field of network security. Aiming at the weakness of the existing botnet detection architectures, we propose a hierarchical collaborative model, which shares information and cooperates in the three levels of information ...
Hailong Wang, Zhenghu Gong
openaire +1 more source
Detection DNS Tunneling Botnets
2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021Bohdan Savenko +4 more
openaire +1 more source
Botnets Threat Analysis and Detection
2017Botnets have evolved dramatically in the recent years, and there are many different types of botnet with many different candidates in each field. In this chapter, we present a brief overview of a botnet (definition, infection method, history, and topology) and then expose the three botnets (Zeus, Koobface, and Windigo) that have made a considerable ...
Anoop Chowdary Atluri, Vinh Tran
openaire +1 more source

