[HTML][HTML] Phishing attacks survey: Types, vectors, and technical approaches

R Alabdan - Future internet, 2020‏ - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …

Botnet in DDoS attacks: trends and challenges

N Hoque, DK Bhattacharyya… - … Surveys & Tutorials, 2015‏ - ieeexplore.ieee.org
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due
to rapid development of computer networks and associated infrastructure, and millions of …

[HTML][HTML] A survey of emerging threats in cybersecurity

J Jang-Jaccard, S Nepal - Journal of computer and system sciences, 2014‏ - Elsevier
The exponential growth of the Internet interconnections has led to a significant growth of
cyber attack incidents often with disastrous and grievous consequences. Malware is the …

Botnets: A survey

SSC Silva, RMP Silva, RCG Pinto, RM Salles - Computer Networks, 2013‏ - Elsevier
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …

[کتاب][B] Data mining and machine learning in cybersecurity

S Dua, X Du - 2016‏ - books.google.com
From basic concepts in machine learning and data mining to advanced problems in the
machine learning domain, this book provides a unified reference for specific machine …

An overview of IP flow-based intrusion detection

A Sperotto, G Schaffrath, R Sadre… - … surveys & tutorials, 2010‏ - ieeexplore.ieee.org
Intrusion detection is an important area of research. Traditionally, the approach taken to find
attacks is to inspect the contents of every packet. However, packet inspection cannot easily …

Identifying propagation sources in networks: State-of-the-art and comparative studies

J Jiang, S Wen, S Yu, Y **ang… - … Surveys & Tutorials, 2016‏ - ieeexplore.ieee.org
It has long been a significant but difficult problem to identify propagation sources based on
limited knowledge of network structures and the varying states of network nodes. In practice …

A survey of botnet and botnet detection

M Feily, A Shahrestani… - 2009 third international …, 2009‏ - ieeexplore.ieee.org
Among the various forms of malware, botnets are emerging as the most serious threat
against cyber-security as they provide a distributed platform for several illegal activities such …

Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques

M Gelgi, Y Guan, S Arunachala, M Samba Siva Rao… - Sensors, 2024‏ - mdpi.com
Internet of Things (IoT) technology has become an inevitable part of our daily lives. With the
increase in usage of IoT Devices, manufacturers continuously develop IoT technology …

A survey of network flow applications

B Li, J Springer, G Bebis, MH Gunes - Journal of Network and Computer …, 2013‏ - Elsevier
It has been over 16 years since Cisco's NetFlow was patented in 1996. Extensive research
has been conducted since then and many applications have been developed. In this survey …