Botnet in DDoS attacks: trends and challenges

N Hoque, DK Bhattacharyya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due
to rapid development of computer networks and associated infrastructure, and millions of …

Botnets: A survey

SSC Silva, RMP Silva, RCG Pinto, RM Salles - Computer Networks, 2013 - Elsevier
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …

Performance evaluation of Botnet DDoS attack detection using machine learning

TA Tuan, HV Long, LH Son, R Kumar… - Evolutionary …, 2020 - Springer
Botnet is regarded as one of the most sophisticated vulnerability threats nowadays. A large
portion of network traffic is dominated by Botnets. Botnets are conglomeration of trade PCs …

Machine learning based botnet detection using real-time extracted traffic features

S Ranjan - US Patent 8,682,812, 2014 - Google Patents
(57) ABSTRACT A method for identifying a botnet in a network, including analyzing historical
network data using a pre-determined heuristic to determine values of a feature in the …

Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks

TF Yen, A Oprea, K Onarlioglu, T Leetham… - Proceedings of the 29th …, 2013 - dl.acm.org
As more and more Internet-based attacks arise, organizations are responding by deploying
an assortment of security products that generate situational intelligence in the form of logs …

@ spam: the underground on 140 characters or less

C Grier, K Thomas, V Paxson, M Zhang - … of the 17th ACM conference on …, 2010 - dl.acm.org
In this work we present a characterization of spam on Twitter. We find that 8% of 25 million
URLs posted to the site point to phishing, malware, and scams listed on popular blacklists …

Disclosure: detecting botnet command and control servers through large-scale netflow analysis

L Bilge, D Balzarotti, W Robertson, E Kirda… - Proceedings of the 28th …, 2012 - dl.acm.org
Botnets continue to be a significant problem on the Internet. Accordingly, a great deal of
research has focused on methods for detecting and mitigating the effects of botnets. Two of …

A new approach to bot detection: striking the balance between precision and recall

F Morstatter, L Wu, TH Nazer… - 2016 IEEE/ACM …, 2016 - ieeexplore.ieee.org
The presence of bots has been felt in many aspects of social media. Twitter, one example of
social media, has especially felt the impact, with bots accounting for a large portion of its …

Appsplayground: automatic security analysis of smartphone applications

V Rastogi, Y Chen, W Enck - Proceedings of the third ACM conference …, 2013 - dl.acm.org
Today's smartphone application markets host an ever increasing number of applications.
The sheer number of applications makes their review a daunting task. We propose …

Detecting algorithmically generated malicious domain names

S Yadav, AKK Reddy, ALN Reddy… - Proceedings of the 10th …, 2010 - dl.acm.org
Recent Botnets such as Conficker, Kraken and Torpig have used DNS based" domain
fluxing" for command-and-control, where each Bot queries for existence of a series of …