Botnets: A survey

SSC Silva, RMP Silva, RCG Pinto, RM Salles - Computer Networks, 2013 - Elsevier
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …

Survey on botnet detection techniques: Classification, methods, and evaluation

Y **ng, H Shu, H Zhao, D Li… - Mathematical Problems in …, 2021 - Wiley Online Library
With the continuous evolution of the Internet, as well as the development of the Internet of
Things, smart terminals, cloud platforms, and social platforms, botnets showing the …

Graphsmote: Imbalanced node classification on graphs with graph neural networks

T Zhao, X Zhang, S Wang - Proceedings of the 14th ACM international …, 2021 - dl.acm.org
Node classification is an important research topic in graph learning. Graph neural networks
(GNNs) have achieved state-of-the-art performance of node classification. However, existing …

Heterogeneous graph neural networks for malicious account detection

Z Liu, C Chen, X Yang, J Zhou, X Li… - Proceedings of the 27th …, 2018 - dl.acm.org
We present, GEM, the first heterogeneous graph neural network approach for detecting
malicious accounts at Alipay, one of the world's leading mobile cashless payment platform …

Aiding the detection of fake accounts in large scale social online services

Q Cao, M Sirivianos, X Yang, T Pregueiro - 9th USENIX symposium on …, 2012 - usenix.org
Users increasingly rely on the trustworthiness of the information exposed on Online Social
Networks (OSNs). In addition, OSN providers base their business models on the …

A nonparametric view of network models and Newman–Girvan and other modularities

PJ Bickel, A Chen - Proceedings of the National Academy of Sciences, 2009 - pnas.org
Prompted by the increasing interest in networks in many fields, we present an attempt at
unifying points of view and analyses of these objects coming from the social sciences …

Uncovering large groups of active malicious accounts in online social networks

Q Cao, X Yang, J Yu, C Palow - Proceedings of the 2014 ACM SIGSAC …, 2014 - dl.acm.org
The success of online social networks has attracted a constant interest in attacking and
exploiting them. Attackers usually control malicious accounts, including both fake and …

Detecting algorithmically generated malicious domain names

S Yadav, AKK Reddy, ALN Reddy… - Proceedings of the 10th …, 2010 - dl.acm.org
Recent Botnets such as Conficker, Kraken and Torpig have used DNS based" domain
fluxing" for command-and-control, where each Bot queries for existence of a series of …

[PDF][PDF] Volley: Automated data placement for geo-distributed cloud services

S Agarwal, J Dunagan, N Jain, S Saroiu, A Wolman… - NSDI, 2010 - usenix.org
As cloud services grow to span more and more globally distributed datacenters, there is an
increasingly urgent need for automated mechanisms to place application data across these …

Detecting algorithmically generated domain-flux attacks with DNS traffic analysis

S Yadav, AKK Reddy, ALN Reddy… - IEEE/Acm Transactions …, 2012 - ieeexplore.ieee.org
Recent botnets such as Conficker, Kraken, and Torpig have used DNS-based “domain
fluxing” for command-and-control, where each Bot queries for existence of a series of …