A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks

M Alauthaman, N Aslam, L Zhang, R Alasem… - Neural Computing and …, 2018 - Springer
In recent years, Botnets have been adopted as a popular method to carry and spread many
malicious codes on the Internet. These malicious codes pave the way to execute many …

Analysis of a"/0" Stealth Scan from a Botnet

A Dainotti, A King, KC Claffy, F Papale… - Proceedings of the 2012 …, 2012 - dl.acm.org
Botnets are the most common vehicle of cyber-criminal activity. They are used for spamming,
phishing, denial of service attacks, brute-force cracking, stealing private information, and …

Cyber attack models for smart grid environments

P Eder-Neuhauser, T Zseby, J Fabini… - Sustainable Energy, Grids …, 2017 - Elsevier
Smart grids utilize communication technologies that make them vulnerable to cyber attacks.
Because the power grid is a critical infrastructure, it is a tempting target for sophisticated and …

Malware propagation in large-scale networks

S Yu, G Gu, A Barnawi, S Guo… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Malware is pervasive in networks, and poses a critical threat to network security. However,
we have very limited understanding of malware behavior in networks to date. In this paper …

Routing around congestion: Defeating DDoS attacks and adverse network conditions via reactive BGP routing

JM Smith, M Schuchard - 2018 IEEE Symposium on Security …, 2018 - ieeexplore.ieee.org
In this paper, we present Nyx, the first system to both effectively mitigate modern Distributed
Denial of Service (DDoS) attacks regardless of the amount of traffic under adversarial control …

Stealthy domain generation algorithms

Y Fu, L Yu, O Hambolu, I Ozcelik… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Botnets are groups of compromised computers that botmasters (botherders) use to launch
attacks over the Internet. To avoid detection, botnets use DNS fast flux to change the …

Detection method of domain names generated by DGAs based on semantic representation and deep neural network

C Xu, J Shen, X Du - Computers & Security, 2019 - Elsevier
Botnets have become one of the main threats to cyberspace security currently. More and
more bots utilize the domain generation algorithm (DGA) to generate malicious domain …

A low-cost distributed denial-of-service attack architecture

K Huang, LX Yang, X Yang, Y **ang, YY Tang - IEEE access, 2020 - ieeexplore.ieee.org
With the advent of Internet-of-Things (IoT) age, IoT-based distributed denial-of-service
(DDoS) attacks have become the mainstream of DDoS attacks. This paper is devoted to …

Have you SYN me? characterizing ten years of Internet scanning

H Griffioen, G Koursiounis, G Smaragdakis… - Proceedings of the 2024 …, 2024 - dl.acm.org
Port scanning is the de-facto method to enumerate active hosts and potentially exploitable
services on the Internet. Over the last years, several studies have quantified the ecosystem …

Information sources estimation in time-varying networks

Y Chai, Y Wang, L Zhu - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
Identifying information sources plays a significant role in network science and engineering.
However, existing source identification approaches generally focus on static networks …