Articles with "botnet" as a keyword



Photo from wikipedia

Multi feature behavior approximation model based efficient botnet detection to mitigate financial frauds

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-020-01677-w

Abstract: Money laundering and other financial frauds are increasing day by day and the financial industries face various challenges from them. They construct botnets to generate such fraudulent attacks towards financial sectors. To mitigate such threats… read more here.

Keywords: behavior approximation; multi feature; feature behavior; botnet ... See more keywords
Photo from archive.org

A Novel Traffic Analysis Model for Botnet Discovery in Dynamic Network

Sign Up to like & get
recommendations!
Published in 2019 at "Arabian Journal for Science and Engineering"

DOI: 10.1007/s13369-018-3319-7

Abstract: In this paper, we propose a collaborative pattern-based filtering algorithm which is a behavior-based approach to detect bots in association with case-based reasoning and fuzzy pattern recognition techniques. Network traces are used as a pivotal… read more here.

Keywords: analysis model; network; novel traffic; botnet ... See more keywords
Photo from wikipedia

Analysis of Botnet Domain Names for IoT Cybersecurity

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2927355

Abstract: Botnets are widespread nowadays with the expansion of the Internet and commonly occur in many cyber-attacks, resulting in serious threats to network services and users’ properties. With the rapid development of the Internet of Things… read more here.

Keywords: domain names; botnet domain; names iot; botnet ... See more keywords
Photo by trnavskauni from unsplash

V-Sandbox for Dynamic Analysis IoT Botnet

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3014891

Abstract: With the increasing use of resource-constrained IoT devices, the number of IoT Botnets has exploded with many variations and ways of penetration. Nowadays, studies based on machine learning and deep learning have focused on dealing… read more here.

Keywords: iot botnet; sandbox dynamic; botnet; dynamic analysis ... See more keywords
Photo by masakaze from unsplash

Applications of artificial intelligence to detect android botnets: A Survey

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3187094

Abstract: With the growing popularity of Android smart devices, and especially with the recent advances brought on by the COVID-19 pandemic on digital adoption and transformation, the importance of protecting these devices has grown, as they… read more here.

Keywords: android botnets; applications artificial; android botnet; botnet detection ... See more keywords
Photo by photophotostock from unsplash

In-Depth Feature Selection for the Statistical Machine Learning-Based Botnet Detection in IoT Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3204001

Abstract: Attackers compromise insecure IoT devices to expand their botnets in order to launch more influential attacks against their victims. In various studies, machine learning has been used to detect IoT botnet attacks. In this paper,… read more here.

Keywords: machine; machine learning; iot; feature selection ... See more keywords

Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3226700

Abstract: A novel online Compromised Device Identification System (CDIS) is presented to identify IoT devices and/or IP addresses that are compromised by a Botnet attack, within a set of sources and destinations that transmit packets. The… read more here.

Keywords: auto associative; iot devices; traffic based; traffic ... See more keywords
Photo by cokdewisnu from unsplash

Reliable Machine Learning Model for IIoT Botnet Detection

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3253432

Abstract: Due to the growing number of Industrial Internet of Things (IoT) devices, network attacks like denial of service (DoS) and floods are rising for security and reliability issues. As a result of these attacks, IoT… read more here.

Keywords: iot devices; machine learning; proposed model; reliable machine ... See more keywords
Photo from wikipedia

Modeling and Analysis Botnet Propagation in Social Internet of Things

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2020.2984662

Abstract: The existence of botnet puts people in an extremely insecure environment, which has seriously affected the development of Internet of Things (IoT). In order to prevent the formation of a botnet, it is necessary to… read more here.

Keywords: propagation; internet things; botnet; botnet propagation ... See more keywords
Photo by radowanrehan from unsplash

Still Beheading Hydras: Botnet Takedowns Then and Now

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2015.2496176

Abstract: Devices infected with malicious software typically form botnet armies under the influence of one or more command and control (C&C) servers. The botnet problem reached such levels where federal law enforcement agencies have to step… read more here.

Keywords: methodology; botnet takedowns; botnet; still beheading ... See more keywords
Photo from wikipedia

DDoS Attacks With Randomized Traffic Innovation: Botnet Identification Challenges and Strategies

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2017.2692685

Abstract: Distributed Denial-of-Service (DDoS) attacks are usually launched through the botnet, an “army” of compromised nodes hidden in the network. Inferential tools for DDoS mitigation should accordingly enable an early and reliable discrimination of the normal… read more here.

Keywords: traffic; ddos attacks; botnet identification; botnet ... See more keywords