Botnets: A survey
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …
serious threat to the Internet. Such networks have been created to conduct large-scale …
Botnet in DDoS attacks: trends and challenges
N Hoque, DK Bhattacharyya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due
to rapid development of computer networks and associated infrastructure, and millions of …
to rapid development of computer networks and associated infrastructure, and millions of …
Understanding the mirai botnet
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …
[HTML][HTML] A survey of emerging threats in cybersecurity
J Jang-Jaccard, S Nepal - Journal of computer and system sciences, 2014 - Elsevier
The exponential growth of the Internet interconnections has led to a significant growth of
cyber attack incidents often with disastrous and grievous consequences. Malware is the …
cyber attack incidents often with disastrous and grievous consequences. Malware is the …
Measurement and analysis of Hajime, a peer-to-peer IoT botnet
The Internet of Things (IoT) introduces an unprece-dented diversity and ubiquity to
networked computing. It also introduces new attack surfaces that are a boon to attackers …
networked computing. It also introduces new attack surfaces that are a boon to attackers …
Botnet communication patterns
Malicious botnets have become a common threat and pervade large parts of the Internet
today. Existing surveys and taxonomies focus on botnet topologies, command and control …
today. Existing surveys and taxonomies focus on botnet topologies, command and control …
A taxonomy of botnet behavior, detection, and defense
S Khattak, NR Ramay, KR Khan… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
A number of detection and defense mechanisms have emerged in the last decade to tackle
the botnet phenomenon. It is important to organize this knowledge to better understand the …
the botnet phenomenon. It is important to organize this knowledge to better understand the …
Discriminating DDoS attacks from flash crowds using flow correlation coefficient
Distributed Denial of Service (DDoS) attack is a critical threat to the Internet, and botnets are
usually the engines behind them. Sophisticated botmasters attempt to disable detectors by …
usually the engines behind them. Sophisticated botmasters attempt to disable detectors by …
Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools
T Mahmood, U Afzal - 2013 2nd national conference on …, 2013 - ieeexplore.ieee.org
The rapid growth of the Internet has brought with it an exponential increase in the type and
frequency of cyber attacks. Many well-known cybersecurity solutions are in place to …
frequency of cyber attacks. Many well-known cybersecurity solutions are in place to …
An enhancing framework for botnet detection using generative adversarial networks
C Yin, Y Zhu, S Liu, J Fei… - … Conference on Artificial …, 2018 - ieeexplore.ieee.org
The botnet, as one of the most formidable threats to cyber security, is often used to launch
large-scale attack sabotage. How to accurately identify the botnet, especially to improve the …
large-scale attack sabotage. How to accurately identify the botnet, especially to improve the …