Detecting and preventing cyber insider threats: A survey
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …
security threats, the majority of which are originated by insiders. As insiders reside behind …
Botnet in DDoS attacks: trends and challenges
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due
to rapid development of computer networks and associated infrastructure, and millions of …
to rapid development of computer networks and associated infrastructure, and millions of …
Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions
A Singh, BB Gupta - International Journal on Semantic Web and …, 2022 - igi-global.com
The demand for Internet security has escalated in the last two decades because the rapid
proliferation in the number of Internet users has presented attackers with new detrimental …
proliferation in the number of Internet users has presented attackers with new detrimental …
Understanding the mirai botnet
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …
Deep neural networks for bot detection
The problem of detecting bots, automated social media accounts governed by software but
disguising as human users, has strong implications. For example, bots have been used to …
disguising as human users, has strong implications. For example, bots have been used to …
An empirical comparison of botnet detection methods
The results of botnet detection methods are usually presented without any comparison.
Although it is generally accepted that more comparisons with third-party methods may help …
Although it is generally accepted that more comparisons with third-party methods may help …
From {Throw-Away} traffic to bots: Detecting the rise of {DGA-Based} malware
Many botnet detection systems employ a blacklist of known command and control (C&C)
domains to detect bots and block their traffic. Similar to signature-based virus detection, such …
domains to detect bots and block their traffic. Similar to signature-based virus detection, such …
Attacks against process control systems: risk assessment, detection, and response
In the last years there has been an increasing interest in the security of process control and
SCADA systems. Furthermore, recent computer attacks such as the Stuxnet worm, have …
SCADA systems. Furthermore, recent computer attacks such as the Stuxnet worm, have …
Machine learning based botnet detection using real-time extracted traffic features
S Ranjan - US Patent 8,682,812, 2014 - Google Patents
(57) ABSTRACT A method for identifying a botnet in a network, including analyzing historical
network data using a pre-determined heuristic to determine values of a feature in the …
network data using a pre-determined heuristic to determine values of a feature in the …
Botnets: A survey
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …
serious threat to the Internet. Such networks have been created to conduct large-scale …