Results 191 to 200 of about 14,194 (229)
Some of the next articles are maybe not open access.

Flow Based Botnet Detection

2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC), 2009
Botnet is a collection of computer hosts exploited by malicious software that is remotely controlled through a command and control channel. More new types of attacks invented based on Botnets. Because of usage of legitimate IRC (Internet Relay Chat) servers to command and control the bots, it is hard to detect and remove Botnets.
Hsiao-Chung Lin   +2 more
openaire   +1 more source

Botnet Detection using Machine Learning

2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), 2021
A bot is a computer that has been affected through a malware infection and can be controlled distantly by a cyber-criminal. The cyber-criminal would be able to utilize the bot to dispatch more assaults. A botnet is a collection of such bot controlled by a cyber-criminal Infected group of computers creates a botnet on the global network.
K B Aswathi   +4 more
openaire   +1 more source

Detecting encrypted botnet traffic

2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2013
Bot detection methods that rely on deep packet inspection (DPI) can be foiled by encryption. Encryption, however, increases entropy. This paper investigates whether adding high-entropy detectors to an existing bot detection tool that uses DPI can restore some of the bot visibility. We present two high-entropy classifiers, and use one of them to enhance
Han Zhang   +2 more
openaire   +1 more source

A botnet detection game

2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2014
Botnets continue to constitute a major security threat to users of the internet. We examine a novel security game between a bot master and the legitimate users of the compromised network. The more a bot master utilizes his botnet, the more likely it is he will be detected by the legitimate users of the network.
Braden Soper, John Musacchio
openaire   +1 more source

Encrypted Botnet Detection Scheme

2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2014
Botnets have started using Information obfuscation techniques include encryption to evade detection. In order to detect encrypted botnet traffic, in this paper we see detection of encrypted botnet traffic from normal network traffic as traffic classification problem.
openaire   +1 more source

Detecting and destroying botnets

Network Security, 2016
Due to their limitless size and capacity, botnets are among the most powerful components of a modern cyber-criminal's arsenal of attack techniques. They are made up of compromised workstations distributed over the public Internet that leverage the untapped processing power of a multitude of endpoints, usually to accomplish a malicious agenda.
openaire   +1 more source

Botnet Detection Using Bayes Classifier

2021
In today’s connected world, risk of getting attacked over the internet is increased, which plays a major role in infecting the devices over the internet. The internet is flooded with different malwares, but we have focused on the harmful effects of Botnet.
Prapti Kolpe, Deepak Kshirsagar
openaire   +1 more source

Collaboration-based Botnet Detection Architecture

2009 Second International Conference on Intelligent Computation Technology and Automation, 2009
With the rapid prevalence of botnet, Internet is facing growing threats. Botnet detection has recently become very important in the field of network security. Aiming at the weakness of the existing botnet detection architectures, we propose a hierarchical collaborative model, which shares information and cooperates in the three levels of information ...
Hailong Wang, Zhenghu Gong
openaire   +1 more source

Detection DNS Tunneling Botnets

2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021
Bohdan Savenko   +4 more
openaire   +1 more source

Botnets Threat Analysis and Detection

2017
Botnets have evolved dramatically in the recent years, and there are many different types of botnet with many different candidates in each field. In this chapter, we present a brief overview of a botnet (definition, infection method, history, and topology) and then expose the three botnets (Zeus, Koobface, and Windigo) that have made a considerable ...
Anoop Chowdary Atluri, Vinh Tran
openaire   +1 more source

Home - About - Disclaimer - Privacy