![](images/graphics/blank.gif)
Botnet detection
-
This scholarly research paper addresses the crucial and complex challenge of detecting and categorizing Internet of Things (IoT) botnets through the utilization of machine learning algorithms. The study is focused on conducting meticulous analysis and manipulation of IoT botnet data, with a specific emphasis placed on the widely acknowledged IoT23 dataset.
12p
visystrom
22-11-2023
8
5
Download
-
Domain Generation Algorithm (DGA) is the group of algorithms that generate domain names for attack activities in botnets. In this paper, we present a Bi-LSTM deep learning model based on Attention mechanism to detect DGA-generated domains.
12p
vineville
08-02-2023
6
2
Download
-
In this paper, we have set up an approach to detect botnet of IoT devices using three one-class classi¯er ML algorithms. The algorithms are: one-class support vector machine (OCSVM), elliptic envelope (EE), and local outlier factor (LOF).
20p
redemption
20-12-2021
20
1
Download
-
By analyzing the emerging needs as described above, this thesis specified the research target as to propose a feature having a novel yet efficient and low complex ity graph structure in detecting multi-arch IoT botnet with high accuracy.
30p
capheviahe27
23-02-2021
8
3
Download
-
The paper present: method for detecting anomalous domain names, with focus on algorithmically generated domain names which are frequently associated with malicious activities such as fast flux service networks, particularly for bot networks (or botnets), malware, and phishing. Our method is based on learning a (null hypothesis) probability model based on a large set of domain names that have been white listed by some reliable authority.
11p
kethamoi1
17-11-2019
19
0
Download
-
Fast flux networks represent a special type of botnets that are used to provide highly available web services to a backend server, which usually hosts malicious content. Detection of fast flux networks continues to be a challenging issue because of the similar behavior between these networks and other legitimate infrastructures, such as CDNs and server farms. This paper proposes Fast Flux Watch (FF-Watch), a mechanism for online detection of fast flux agents. FF-Watch is envisioned to exist as a software agent at leaf routers that connect stub networks to the Internet.
7p
kethamoi1
17-11-2019
23
1
Download
-
An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic
Botnets are large networks of bots (compromised machines) that are under the control of a small number of bot masters. They pose a significant threat to Internet’s communications and applications. A botnet relies on command and control (C2) communications channels traffic between its members for its attack execution. C2 traffic occurs prior to any attack; hence, the detection of botnet’s C2 traffic enables the detection of members of the botnet before any real harm happens. We analyze C2 traffic and find that it exhibits a periodic behavior.
14p
kethamoi1
17-11-2019
23
1
Download
-
As more users are connected to the Internet and conduct their daily activities electronically, computer users have become the target of an underground economy that infects hosts with malware or adware for financial gain. Unfortunately, even a single visit to an infected web site enables the attacker to detect vulnerabilities in the user’s applications and force the download a multitude of malware binaries.
9p
doiroimavanchuadc
06-02-2013
54
2
Download
-
Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Review Article Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures
11p
sting08
20-02-2012
55
5
Download
-
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date.
482p
manhhakcqt
15-04-2011
250
58
Download