نتایج جستجو برای: botnet detection

تعداد نتایج: 566813  

2008
Daniel Ramsbrock Xinyuan Wang Xuxian Jiang

Despite the increasing botnet threat, research in the area of botmaster traceback is limited. The four main obstacles are 1) the low-traffic nature of the bot-to-botmaster link; 2) chains of “stepping stones;” 3) the use of encryption along these chains; and 4) mixing with traffic from other bots. Most existing traceback approaches can address one or two of these issues, but no single approach ...

Journal: :Computers, materials & continua 2022

As Internet of Things (IoT) devices with security issues are connected to 5G mobile networks, the importance IoT Botnet detection research in network environments is increasing. However, existing focused on AI-based wired environments. In addition, related ML-based have been conducted up 4G. Therefore, this paper conducts a study traffic core network. The binary and multiclass classification wa...

2010
Paul Sroufe Santi Phithakkitnukoon Ram Dantu João W. Cangussu

Email has become an integral part of everyday life. Without a second thought we receive bills, bank statements, and sales promotions all to our inbox. Each email has hidden features that can be extracted. In this paper, we present a new mechanism to characterize an email without using content or context called Email Shape Analysis. We explore the applications of the email shape by carrying out ...

Journal: :Asian Journal of Research in Computer Science 2019

Journal: :Tsinghua Science & Technology 2021

Botnets based on the Domain Generation Algorithm (DGA) mechanism pose great challenges to main current detection methods because of their strong concealment and robustness. However, complexity DGA family imbalance samples continue impede research detection. In existing work, sample size each is regarded as most important determinant resampling proportion; thus, differences in characteristics va...

2011
Z. Berkay Celik Jayaram Raghuram George Kesidis David J. Miller

We consider the problem of using flow-level data for detection of botnet command and control (C&C) activity. We find that current approaches do not consider timingbased calibration of the C&C traffic traces prior to using this traffic to salt a background traffic trace. Thus, timing-based features of the C&C traffic may be artificially distinctive, potentially leading to (unrealistically) optim...

2012
Ram Dantu

Email has become an integral part of everyday life. Without a second thought we receive bills, bank statements, and sales promotions all to our inbox. Each email has hidden features that can be extracted. In this paper, we present a new mechanism to characterize an email without using content or context called Email Shape Analysis. We explore the applications of the email shape by carrying out ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید