Results 41 to 50 of about 14,194 (229)
MONDEO: Multistage Botnet Detection
Mobile devices have widespread to become the most used piece of technology. Due to their characteristics, they have become major targets for botnet-related malware. FluBot is one example of botnet malware that infects mobile devices. In particular, FluBot is a DNS-based botnet that uses Domain Generation Algorithms (DGA) to establish communication with
Dias, Duarte +2 more
openaire +2 more sources
Botnet Identification Technology Based on Fuzzy Clustering [PDF]
A Botnet that combining worms,backdoors,and Trojans has become the backing of Advanced Persistent Threat(APT) attacks because it can be used by attackers to send spam,perform denial of service attacks,and steal sensitive information.Existing Botnet ...
CHEN Ruidong,ZHAO Lingyuan,ZHANG Xiaosong
doaj +1 more source
The Architectural Dynamics of Encapsulated Botnet Detection (EDM)
Botnet is one of the numerous attacks ravaging the networking environment. Its approach is said to be brutal and dangerous to network infrastructures as well as client systems. Since the introduction of botnet, different design methods have been employed
Osagie, Amenze Joy +1 more
core +1 more source
Modular neural network for edge-based detection of early-stage IoT botnet
The Internet of Things (IoT) has led to rapid growth in smart cities. However, IoT botnet-based attacks against smart city systems are becoming more prevalent.
Duaa Alqattan +5 more
doaj +1 more source
A Covert Data Transport Protocol
Both enterprise and national firewalls filter network connections. For data forensics and botnet removal applications, it is important to establish the information source.
Brooks, Richard +4 more
core +1 more source
Design of Universal Botnet Experimental Platform [PDF]
Botnet research in open networks has many drawbacks,such as uncontrollable process,difficult to scale,and unable to repeat experiments.In order to solve this problem,the requirement and design principle of the universal botnet experimental platform with ...
LI Dawei
doaj +1 more source
BotCloud: Detecting botnets using MapReduce [PDF]
Botnets are a major threat of the current Internet. Understanding the novel generation of botnets relying on peer-to-peer networks is crucial for mitigating this threat. Nowadays, botnet traffic is mixed with a huge volume of benign traffic due to almost ubiquitous high speed networks.
Jerome Francois +4 more
openaire +1 more source
A Threat to Cyber Resilience : A Malware Rebirthing Botnet [PDF]
This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures
Brand, Murray +2 more
core +2 more sources
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma +4 more
wiley +1 more source
Master of puppets: analyzing and attacking a botnet for fun and profit [PDF]
A botnet is a network of compromised machines (bots), under the control of an attacker. Many of these machines are infected without their owners’ knowledge, and botnets are the driving force behind several misuses and criminal activities on the ...
Saito, Genki, Stringhini, Gianluca
core

