Results 31 to 40 of about 14,194 (229)
Botnet ia a collection on network of bots. i.e the collection of zombie computers which are controlled by a single person or group known as bot master or herder. This paper focuses on botnet detection framework and proposed a generic framework for botnet detection. The proposed framework is based on the approach of passively monitoring network traffic.
Emmanuel Pilli +3 more
openaire +1 more source
Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks [PDF]
The propagation approach of a botnet largely dictates its formation, establishing a foundation of bots for future exploitation. The chosen propagation method determines the attack surface, and consequently, the degree of network penetration, as well as ...
Acarali, D. +3 more
core +1 more source
Intelligent Botnet Traffic Detection Method Based on Multi-granularity Statistical Features [PDF]
With the rapid development of information technology,botnet attacks have become a higly harmful cyber security threat.Botnet detection and disposal can prevent attackers from launching other derivative attacks based on botnets.The current botnet ...
ZHANG Haixia, HUANG Kezhen, LIAN Yifeng, ZHAO Changzhi, YUAN Yunjing, PENG Yuanyuan
doaj +1 more source
A Botnet Detecting Infrastructure Using a Beneficial Botnet [PDF]
A beneficial botnet, which tries to cope with technology of malicious botnets such as peer to peer (P2P) networking and Domain Generation Algorithm (DGA), is discussed. In order to cope with such botnets' technology, we are developing a beneficial botnet as an anti-bot measure, using our previous beneficial bot.
openaire +1 more source
DDoS-Capable IoT Malwares: comparative analysis and Mirai Investigation [PDF]
The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable ...
De Donno, Michele +3 more
core +4 more sources
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
Jun Park, Youngho Cho
doaj +1 more source
A Survey on Botnets: Incentives, Evolution, Detection and Current Trends
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things.
Simon Nam Thanh Vu +4 more
doaj +1 more source
In-depth comparative evaluation of supervised machine learning approaches for detection of cybersecurity threats [PDF]
This paper describes the process and results of analyzing CICIDS2017, a modern, labeled data set for testing intrusion detection systems. The data set is divided into several days, each pertaining to different attack classes (Dos, DDoS, infiltration ...
D'hooge, Laurens +3 more
core +1 more source
Applications of Artificial Intelligence to Detect Android Botnets: A Survey
From the growing popularity of Android smart devices, and especially with the recent advances brought on by the COVID-19 pandemic on digital adoption and transformation, the importance of protecting these devices has grown, as they carry very sensitive ...
Abdullah M. Almuhaideb +1 more
doaj +1 more source
BOTNET DETECTION USING INDEPENDENT COMPONENT ANALYSIS
Botnet is a significant cyber threat that continues to evolve. Botmasters continue to improve the security framework strategy for botnets to go undetected.
Wan Nurhidayah Ibrahim +3 more
doaj +1 more source

