نتایج جستجو برای: botnet detection
تعداد نتایج: 566813 فیلتر نتایج به سال:
Despite the increasing botnet threat, research in the area of botmaster traceback is limited. The four main obstacles are 1) the low-traffic nature of the bot-to-botmaster link; 2) chains of “stepping stones;” 3) the use of encryption along these chains; and 4) mixing with traffic from other bots. Most existing traceback approaches can address one or two of these issues, but no single approach ...
As Internet of Things (IoT) devices with security issues are connected to 5G mobile networks, the importance IoT Botnet detection research in network environments is increasing. However, existing focused on AI-based wired environments. In addition, related ML-based have been conducted up 4G. Therefore, this paper conducts a study traffic core network. The binary and multiclass classification wa...
Email has become an integral part of everyday life. Without a second thought we receive bills, bank statements, and sales promotions all to our inbox. Each email has hidden features that can be extracted. In this paper, we present a new mechanism to characterize an email without using content or context called Email Shape Analysis. We explore the applications of the email shape by carrying out ...
Botnets based on the Domain Generation Algorithm (DGA) mechanism pose great challenges to main current detection methods because of their strong concealment and robustness. However, complexity DGA family imbalance samples continue impede research detection. In existing work, sample size each is regarded as most important determinant resampling proportion; thus, differences in characteristics va...
We consider the problem of using flow-level data for detection of botnet command and control (C&C) activity. We find that current approaches do not consider timingbased calibration of the C&C traffic traces prior to using this traffic to salt a background traffic trace. Thus, timing-based features of the C&C traffic may be artificially distinctive, potentially leading to (unrealistically) optim...
Email has become an integral part of everyday life. Without a second thought we receive bills, bank statements, and sales promotions all to our inbox. Each email has hidden features that can be extracted. In this paper, we present a new mechanism to characterize an email without using content or context called Email Shape Analysis. We explore the applications of the email shape by carrying out ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید