Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-020-01677-w
Abstract: Money laundering and other financial frauds are increasing day by day and the financial industries face various challenges from them. They construct botnets to generate such fraudulent attacks towards financial sectors. To mitigate such threats…
read more here.
Keywords:
behavior approximation;
multi feature;
feature behavior;
botnet ... See more keywords
Photo from archive.org
Sign Up to like & get
recommendations!
1
Published in 2019 at "Arabian Journal for Science and Engineering"
DOI: 10.1007/s13369-018-3319-7
Abstract: In this paper, we propose a collaborative pattern-based filtering algorithm which is a behavior-based approach to detect bots in association with case-based reasoning and fuzzy pattern recognition techniques. Network traces are used as a pivotal…
read more here.
Keywords:
analysis model;
network;
novel traffic;
botnet ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2927355
Abstract: Botnets are widespread nowadays with the expansion of the Internet and commonly occur in many cyber-attacks, resulting in serious threats to network services and users’ properties. With the rapid development of the Internet of Things…
read more here.
Keywords:
domain names;
botnet domain;
names iot;
botnet ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3014891
Abstract: With the increasing use of resource-constrained IoT devices, the number of IoT Botnets has exploded with many variations and ways of penetration. Nowadays, studies based on machine learning and deep learning have focused on dealing…
read more here.
Keywords:
iot botnet;
sandbox dynamic;
botnet;
dynamic analysis ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3187094
Abstract: With the growing popularity of Android smart devices, and especially with the recent advances brought on by the COVID-19 pandemic on digital adoption and transformation, the importance of protecting these devices has grown, as they…
read more here.
Keywords:
android botnets;
applications artificial;
android botnet;
botnet detection ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3204001
Abstract: Attackers compromise insecure IoT devices to expand their botnets in order to launch more influential attacks against their victims. In various studies, machine learning has been used to detect IoT botnet attacks. In this paper,…
read more here.
Keywords:
machine;
machine learning;
iot;
feature selection ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3226700
Abstract: A novel online Compromised Device Identification System (CDIS) is presented to identify IoT devices and/or IP addresses that are compromised by a Botnet attack, within a set of sources and destinations that transmit packets. The…
read more here.
Keywords:
auto associative;
iot devices;
traffic based;
traffic ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3253432
Abstract: Due to the growing number of Industrial Internet of Things (IoT) devices, network attacks like denial of service (DoS) and floods are rising for security and reliability issues. As a result of these attacks, IoT…
read more here.
Keywords:
iot devices;
machine learning;
proposed model;
reliable machine ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2020.2984662
Abstract: The existence of botnet puts people in an extremely insecure environment, which has seriously affected the development of Internet of Things (IoT). In order to prevent the formation of a botnet, it is necessary to…
read more here.
Keywords:
propagation;
internet things;
botnet;
botnet propagation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2015.2496176
Abstract: Devices infected with malicious software typically form botnet armies under the influence of one or more command and control (C&C) servers. The botnet problem reached such levels where federal law enforcement agencies have to step…
read more here.
Keywords:
methodology;
botnet takedowns;
botnet;
still beheading ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2017.2692685
Abstract: Distributed Denial-of-Service (DDoS) attacks are usually launched through the botnet, an “army” of compromised nodes hidden in the network. Inferential tools for DDoS mitigation should accordingly enable an early and reliable discrimination of the normal…
read more here.
Keywords:
traffic;
ddos attacks;
botnet identification;
botnet ... See more keywords