Results 21 to 30 of about 14,194 (229)

Botnet detection based on generative adversarial network

open access: yesTongxin xuebao, 2021
In order to solve the problems of botnets’ strong concealment and difficulty in identification, and improve the detection accuracy of botnets, a botnet detection method based on generative adversarial networks was proposed.By reorganizing the data ...
Futai ZOU   +3 more
doaj   +2 more sources

Review of Botnet Attack Detection in SDN-Enabled IoT Using Machine Learning

open access: yesSensors, 2022
The orchestration of software-defined networks (SDN) and the internet of things (IoT) has revolutionized the computing fields. These include the broad spectrum of connectivity to sensors and electronic appliances beyond standard computing devices ...
Worku Gachena Negera   +4 more
doaj   +1 more source

An anomaly-based botnet detection approach for identifying stealthy botnets [PDF]

open access: yes2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE), 2011
Botnets (networks of compromised computers) are often used for malicious activities such as spam, click fraud, identity theft, phishing, and distributed denial of service (DDoS) attacks. Most of previous researches have introduced fully or partially signature-based botnet detection approaches.
Arshad, Sajjad   +3 more
openaire   +2 more sources

Autonomous machine learning for early bot detection in the internet of things

open access: yesDigital Communications and Networks, 2023
The high costs incurred due to attacks and the increasing number of different devices in the Internet of Things (IoT) highlight the necessity of the early detection of botnets (i.e., a network of infected devices) to gain an advantage against attacks ...
Alex Medeiros Araujo   +2 more
doaj   +1 more source

DETECTING WEB-BASED BOTNETS USING A WEB PROXY AND A CONVOLUTIONAL NEURAL NETWORK

open access: yesTạp chí Khoa học Đại học Đà Lạt, 2020
Botnets are increasingly becoming the most dangerous threats in the field of network security, and many different approaches to detecting attacks from botnets have been studied.
Trần Đắc Tốt   +2 more
doaj   +1 more source

An Accurate Detection Approach for IoT Botnet Attacks Using Interpolation Reasoning Method

open access: yesInformation, 2022
Nowadays, the rapid growth of technology delivers many new concepts and notations that aim to increase the efficiency and comfort of human life. One of these techniques is the Internet of Things (IoT). The IoT has been used to achieve efficient operation
Mohammad Almseidin, Mouhammd Alkasassbeh
doaj   +1 more source

Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture

open access: yesSensors, 2020
With the rapid development and popularization of Internet of Things (IoT) devices, an increasing number of cyber-attacks are targeting such devices. It was said that most of the attacks in IoT environments are botnet-based attacks.
Yan Naung Soe   +4 more
doaj   +1 more source

Multilayer Framework for Botnet Detection Using Machine Learning Algorithms

open access: yesIEEE Access, 2021
A botnet is a malware program that a hacker remotely controls called a botmaster. Botnet can perform massive cyber-attacks such as DDOS, SPAM, click-fraud, information, and identity stealing. The botnet also can avoid being detected by a security system.
Wan Nur Hidayah Ibrahim   +6 more
doaj   +1 more source

Botnet Vulnerability Intelligence Clustering Classification Mining and Countermeasure Algorithm Based on Machine Learning

open access: yesIEEE Access, 2019
Botnet detection, vulnerability mining and confrontation bring many challenges to network security, and become the main dangerous source threatening economic development and causing significant economic losses. To solve these problems, we combine machine
Zenan Chu, Yi Han, Kai Zhao
doaj   +1 more source

Botnet dataset with simultaneous attack activity

open access: yesData in Brief, 2022
The proposed dataset shows characteristics of simultaneous botnet attack activities. Botnet network traffic has sequentially interconnected as formed as bidirectional network flow (binetflow), which is combined with normal activities.
Muhammad Aidiel Rachman Putra   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy