Results 41 to 50 of about 14,194 (229)

MONDEO: Multistage Botnet Detection

open access: yes, 2023
Mobile devices have widespread to become the most used piece of technology. Due to their characteristics, they have become major targets for botnet-related malware. FluBot is one example of botnet malware that infects mobile devices. In particular, FluBot is a DNS-based botnet that uses Domain Generation Algorithms (DGA) to establish communication with
Dias, Duarte   +2 more
openaire   +2 more sources

Botnet Identification Technology Based on Fuzzy Clustering [PDF]

open access: yesJisuanji gongcheng, 2018
A Botnet that combining worms,backdoors,and Trojans has become the backing of Advanced Persistent Threat(APT) attacks because it can be used by attackers to send spam,perform denial of service attacks,and steal sensitive information.Existing Botnet ...
CHEN Ruidong,ZHAO Lingyuan,ZHANG Xiaosong
doaj   +1 more source

The Architectural Dynamics of Encapsulated Botnet Detection (EDM)

open access: yes, 2019
Botnet is one of the numerous attacks ravaging the networking environment. Its approach is said to be brutal and dangerous to network infrastructures as well as client systems. Since the introduction of botnet, different design methods have been employed
Osagie, Amenze Joy   +1 more
core   +1 more source

Modular neural network for edge-based detection of early-stage IoT botnet

open access: yesHigh-Confidence Computing
The Internet of Things (IoT) has led to rapid growth in smart cities. However, IoT botnet-based attacks against smart city systems are becoming more prevalent.
Duaa Alqattan   +5 more
doaj   +1 more source

A Covert Data Transport Protocol

open access: yes, 2017
Both enterprise and national firewalls filter network connections. For data forensics and botnet removal applications, it is important to establish the information source.
Brooks, Richard   +4 more
core   +1 more source

Design of Universal Botnet Experimental Platform [PDF]

open access: yesJisuanji gongcheng, 2018
Botnet research in open networks has many drawbacks,such as uncontrollable process,difficult to scale,and unable to repeat experiments.In order to solve this problem,the requirement and design principle of the universal botnet experimental platform with ...
LI Dawei
doaj   +1 more source

BotCloud: Detecting botnets using MapReduce [PDF]

open access: yes2011 IEEE International Workshop on Information Forensics and Security, 2011
Botnets are a major threat of the current Internet. Understanding the novel generation of botnets relying on peer-to-peer networks is crucial for mitigating this threat. Nowadays, botnet traffic is mixed with a huge volume of benign traffic due to almost ubiquitous high speed networks.
Jerome Francois   +4 more
openaire   +1 more source

A Threat to Cyber Resilience : A Malware Rebirthing Botnet [PDF]

open access: yes, 2011
This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures
Brand, Murray   +2 more
core   +2 more sources

Image and video analysis using graph neural network for Internet of Medical Things and computer vision applications

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma   +4 more
wiley   +1 more source

Master of puppets: analyzing and attacking a botnet for fun and profit [PDF]

open access: yes, 2015
A botnet is a network of compromised machines (bots), under the control of an attacker. Many of these machines are infected without their owners’ knowledge, and botnets are the driving force behind several misuses and criminal activities on the ...
Saito, Genki, Stringhini, Gianluca
core  

Home - About - Disclaimer - Privacy