Detecting and preventing cyber insider threats: A survey

L Liu, O De Vel, QL Han, J Zhang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …

Botnet in DDoS attacks: trends and challenges

N Hoque, DK Bhattacharyya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due
to rapid development of computer networks and associated infrastructure, and millions of …

Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions

A Singh, BB Gupta - International Journal on Semantic Web and …, 2022 - igi-global.com
The demand for Internet security has escalated in the last two decades because the rapid
proliferation in the number of Internet users has presented attackers with new detrimental …

Understanding the mirai botnet

M Antonakakis, T April, M Bailey, M Bernhard… - 26th USENIX security …, 2017 - usenix.org
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …

Deep neural networks for bot detection

S Kudugunta, E Ferrara - Information Sciences, 2018 - Elsevier
The problem of detecting bots, automated social media accounts governed by software but
disguising as human users, has strong implications. For example, bots have been used to …

An empirical comparison of botnet detection methods

S Garcia, M Grill, J Stiborek, A Zunino - computers & security, 2014 - Elsevier
The results of botnet detection methods are usually presented without any comparison.
Although it is generally accepted that more comparisons with third-party methods may help …

From {Throw-Away} traffic to bots: Detecting the rise of {DGA-Based} malware

M Antonakakis, R Perdisci, Y Nadji… - 21st USENIX Security …, 2012 - usenix.org
Many botnet detection systems employ a blacklist of known command and control (C&C)
domains to detect bots and block their traffic. Similar to signature-based virus detection, such …

Attacks against process control systems: risk assessment, detection, and response

AA Cárdenas, S Amin, ZS Lin, YL Huang… - Proceedings of the 6th …, 2011 - dl.acm.org
In the last years there has been an increasing interest in the security of process control and
SCADA systems. Furthermore, recent computer attacks such as the Stuxnet worm, have …

Machine learning based botnet detection using real-time extracted traffic features

S Ranjan - US Patent 8,682,812, 2014 - Google Patents
(57) ABSTRACT A method for identifying a botnet in a network, including analyzing historical
network data using a pre-determined heuristic to determine values of a feature in the …

Botnets: A survey

SSC Silva, RMP Silva, RCG Pinto, RM Salles - Computer Networks, 2013 - Elsevier
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …