Botnet in DDoS attacks: trends and challenges

N Hoque, DK Bhattacharyya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due
to rapid development of computer networks and associated infrastructure, and millions of …

Botnets: A survey

SSC Silva, RMP Silva, RCG Pinto, RM Salles - Computer Networks, 2013 - Elsevier
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …

Anomal-E: A self-supervised network intrusion detection system based on graph neural networks

E Caville, WW Lo, S Layeghy, M Portmann - Knowledge-based systems, 2022 - Elsevier
This paper investigates graph neural networks (GNNs) applied for self-supervised intrusion
and anomaly detection in computer networks. GNNs are a deep learning approach for graph …

Private set intersection in the internet setting from lightweight oblivious PRF

M Chase, P Miao - Annual International Cryptology Conference, 2020 - Springer
We present a new protocol for two-party private set intersection (PSI) with semi-honest
security in the plain model and one-sided malicious security in the random oracle model …

Scalable private set intersection based on OT extension

B Pinkas, T Schneider, M Zohner - ACM Transactions on Privacy and …, 2018 - dl.acm.org
Private set intersection (PSI) allows two parties to compute the intersection of their sets
without revealing any information about items that are not in the intersection. It is one of the …

BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors

W Wang, Y Shang, Y He, Y Li, J Liu - Information Sciences, 2020 - Elsevier
The Botnets have become one of the most serious threats to cyber infrastructure. Most
existing work on detecting botnets is based on flow-based traffic analysis by mining their …

Identifying encrypted malware traffic with contextual flow data

B Anderson, D McGrew - Proceedings of the 2016 ACM workshop on …, 2016 - dl.acm.org
Identifying threats contained within encrypted network traffic poses a unique set of
challenges. It is important to monitor this traffic for threats and malware, but do so in a way …

When private set intersection meets big data: an efficient and scalable protocol

C Dong, L Chen, Z Wen - Proceedings of the 2013 ACM SIGSAC …, 2013 - dl.acm.org
Large scale data processing brings new challenges to the design of privacy-preserving
protocols: how to meet the increasing requirements of speed and throughput of modern …

More efficient oblivious transfer and extensions for faster secure computation

G Asharov, Y Lindell, T Schneider… - Proceedings of the 2013 …, 2013 - dl.acm.org
Protocols for secure computation enable parties to compute a joint function on their private
inputs without revealing anything but the result. A foundation for secure computation is …

Big data analytics framework for peer-to-peer botnet detection using random forests

K Singh, SC Guntuku, A Thakur, C Hota - Information Sciences, 2014 - Elsevier
Network traffic monitoring and analysis-related research has struggled to scale for massive
amounts of data in real time. Some of the vertical scaling solutions provide good …