Peerambush: Multi-layer perceptron to detect peer-to-peer botnet
AHH Kabla, AH Thamrin, M Anbar, S Manickam… - Symmetry, 2022 - mdpi.com
Due to emerging internet technologies that mostly depend on the decentralization concept,
such as cryptocurrencies, cyber attackers also use the decentralization concept to develop …
such as cryptocurrencies, cyber attackers also use the decentralization concept to develop …
A brief review of advanced monitoring mechanisms in peer-to-peer (P2P) Botnets
MA Al-Shareeda, S Manickam… - 2022 8th …, 2022 - ieeexplore.ieee.org
Due to threats from botnets, internet security is becoming less safe. An attack plan can only
be planned out to take down the botnet after the monitoring activities to understand the …
be planned out to take down the botnet after the monitoring activities to understand the …
C3PO: large-scale study of covert monitoring of C&C servers via over-permissioned protocol infiltration
Current techniques to monitor botnets towards disruption or takedown are likely to result in
inaccurate data gathered about the botnet or be detected by C&C orchestrators. Seeking a …
inaccurate data gathered about the botnet or be detected by C&C orchestrators. Seeking a …
Reliable recon in adversarial peer-to-peer botnets
The decentralized nature of Peer-to-Peer (P2P) botnets precludes traditional takedown
strategies, which target dedicated command infrastructure. P2P botnets replace this …
strategies, which target dedicated command infrastructure. P2P botnets replace this …
The study on the botnet and its prevention policies in the internet of things
Y Ji, L Yao, S Liu, H Yao, Q Ye… - 2018 IEEE 22nd …, 2018 - ieeexplore.ieee.org
With the rapid development of Internet of Things (IOT), IOT is more and more important. Also,
it faces serious security issues. This paper analyzes Mirai's architecture. The core …
it faces serious security issues. This paper analyzes Mirai's architecture. The core …
Review of advanced monitoring mechanisms in peer-to-peer (p2p) botnets
WY Shen, S Manickam, MA Al-Shareeda - arxiv preprint arxiv:2207.12936, 2022 - arxiv.org
Internet security is getting less secure because of the existing of botnet threats. An attack
plan can only be planned out to take down the botnet after the monitoring activities to …
plan can only be planned out to take down the botnet after the monitoring activities to …
On the resilience of P2P-based botnet graphs
P2P botnets represent another escalation level in the race of arms between criminals and
the research community. By utilizing a distributed P2P architecture they are resilient against …
the research community. By utilizing a distributed P2P architecture they are resilient against …
Next generation p2p botnets: Monitoring under adverse conditions
The effects of botnet attacks, over the years, have been devastating. From high volume
Distributed Denial of Service (DDoS) attacks to ransomware attacks, it is evident that …
Distributed Denial of Service (DDoS) attacks to ransomware attacks, it is evident that …
Sensorbuster: On identifying sensor nodes in p2p botnets
The ever-growing number of cyber attacks originating from botnets has made them one of
the biggest threat to the Internet ecosystem. Especially P2P-based botnets like ZeroAccess …
the biggest threat to the Internet ecosystem. Especially P2P-based botnets like ZeroAccess …
Zeus milker: circumventing the p2p zeus neighbor list restriction mechanism
The emerging trend of highly-resilient P2P botnets poses a huge security threat to our
modern society. Carefully designed countermeasures as applied in sophisticated P2P …
modern society. Carefully designed countermeasures as applied in sophisticated P2P …