Botnet in DDoS attacks: trends and challenges
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due
to rapid development of computer networks and associated infrastructure, and millions of …
to rapid development of computer networks and associated infrastructure, and millions of …
Botnets: A survey
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …
serious threat to the Internet. Such networks have been created to conduct large-scale …
Performance evaluation of Botnet DDoS attack detection using machine learning
Botnet is regarded as one of the most sophisticated vulnerability threats nowadays. A large
portion of network traffic is dominated by Botnets. Botnets are conglomeration of trade PCs …
portion of network traffic is dominated by Botnets. Botnets are conglomeration of trade PCs …
Machine learning based botnet detection using real-time extracted traffic features
S Ranjan - US Patent 8,682,812, 2014 - Google Patents
(57) ABSTRACT A method for identifying a botnet in a network, including analyzing historical
network data using a pre-determined heuristic to determine values of a feature in the …
network data using a pre-determined heuristic to determine values of a feature in the …
Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks
As more and more Internet-based attacks arise, organizations are responding by deploying
an assortment of security products that generate situational intelligence in the form of logs …
an assortment of security products that generate situational intelligence in the form of logs …
@ spam: the underground on 140 characters or less
In this work we present a characterization of spam on Twitter. We find that 8% of 25 million
URLs posted to the site point to phishing, malware, and scams listed on popular blacklists …
URLs posted to the site point to phishing, malware, and scams listed on popular blacklists …
Disclosure: detecting botnet command and control servers through large-scale netflow analysis
Botnets continue to be a significant problem on the Internet. Accordingly, a great deal of
research has focused on methods for detecting and mitigating the effects of botnets. Two of …
research has focused on methods for detecting and mitigating the effects of botnets. Two of …
A new approach to bot detection: striking the balance between precision and recall
The presence of bots has been felt in many aspects of social media. Twitter, one example of
social media, has especially felt the impact, with bots accounting for a large portion of its …
social media, has especially felt the impact, with bots accounting for a large portion of its …
Appsplayground: automatic security analysis of smartphone applications
Today's smartphone application markets host an ever increasing number of applications.
The sheer number of applications makes their review a daunting task. We propose …
The sheer number of applications makes their review a daunting task. We propose …
Detecting algorithmically generated malicious domain names
Recent Botnets such as Conficker, Kraken and Torpig have used DNS based" domain
fluxing" for command-and-control, where each Bot queries for existence of a series of …
fluxing" for command-and-control, where each Bot queries for existence of a series of …