Dynamics of information diffusion and its applications on complex networks
The ongoing rapid expansion of the Word Wide Web (WWW) greatly increases the
information of effective transmission from heterogeneous individuals to various systems …
information of effective transmission from heterogeneous individuals to various systems …
Botnets: A survey
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …
serious threat to the Internet. Such networks have been created to conduct large-scale …
Understanding the mirai botnet
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …
[PDF][PDF] Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-
of-service (DDoS), identity theft, and phishing. Most of the current botnet detection …
of-service (DDoS), identity theft, and phishing. Most of the current botnet detection …
Your botnet is my botnet: analysis of a botnet takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the
root cause of a large number of security problems on the Internet. A particularly …
root cause of a large number of security problems on the Internet. A particularly …
Botnet detection based on traffic behavior analysis and flow intervals
Botnets represent one of the most serious cybersecurity threats faced by organizations
today. Botnets have been used as the main vector in carrying many cyber crimes reported in …
today. Botnets have been used as the main vector in carrying many cyber crimes reported in …
Measurement and analysis of Hajime, a peer-to-peer IoT botnet
The Internet of Things (IoT) introduces an unprece-dented diversity and ubiquity to
networked computing. It also introduces new attack surfaces that are a boon to attackers …
networked computing. It also introduces new attack surfaces that are a boon to attackers …
The Circle of life: A {large-scale} study of the {IoT} malware lifecycle
O Alrawi, C Lever, K Valakuzhy, K Snow… - 30th USENIX Security …, 2021 - usenix.org
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …
An efficient reinforcement learning-based Botnet detection approach
The use of bot malware and botnets as a tool to facilitate other malicious cyber activities (eg
distributed denial of service attacks, dissemination of malware and spam, and click fraud) …
distributed denial of service attacks, dissemination of malware and spam, and click fraud) …
Detecting algorithmically generated malicious domain names
Recent Botnets such as Conficker, Kraken and Torpig have used DNS based" domain
fluxing" for command-and-control, where each Bot queries for existence of a series of …
fluxing" for command-and-control, where each Bot queries for existence of a series of …