[go: up one dir, main page]

Kumar, 2010 - Google Patents

Detecting bots in Internet chat

Kumar, 2010

Document ID
9207921538430674483
Author
Kumar S
Publication year

External Links

Snippet

Internet chat is a real-time communication tool that allows on-line users to communicate via text in virtual spaces, called chat rooms or channels. The abuse of Internet chat by bots also known as chat bots/chatterbots poses a serious threat to the users and quality of service …
Continue reading at openscholar.uga.edu (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/02Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
    • H04L43/026Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems

Similar Documents

Publication Publication Date Title
Gu et al. BotSniffer: Detecting botnet command and control channels in network traffic
Khan et al. A comprehensive study of email spam botnet detection
Gu et al. Active botnet probing to identify obscure command and control channels
Kaur Chahal et al. Distributed denial of service attacks: a threat or challenge
Hoque et al. Botnet in DDoS attacks: trends and challenges
Egele et al. Compa: Detecting compromised accounts on social networks.
Mahmoud et al. A survey on botnet architectures, detection and defences.
Zhu et al. Botnet research survey
Gu et al. Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
Gianvecchio et al. Humans and bots in internet chat: measurement, analysis, and automated classification
Aiello et al. DNS tunneling detection through statistical fingerprints of protocol messages and machine learning
Cao et al. Detection of forwarding-based malicious URLs in online social networks
Yu et al. Fool me if you can: Mimicking attacks and anti-attacks in cyberspace
Hu et al. RB-Seeker: Auto-detection of Redirection Botnets.
US7577993B2 (en) Methods and systems for detecting and preventing the spread of malware on instant messaging (IM) networks by using Bayesian filtering
Binsaeed et al. Detecting spam in twitter microblogging services: A novel machine learning approach based on domain popularity
Xie et al. HoneyIM: Fast detection and suppression of instant messaging malware in enterprise-like networks
Haddadi et al. Botnet behaviour analysis: How would a data analytics‐based system with minimum a priori information perform?
Alauthman An efficient approach to online bot detection based on a reinforcement learning technique
Lashkari et al. A wide survey on botnet
Gu Correlation-based botnet detection in enterprise networks
Yen Detecting stealthy malware using behavioral features in network traffic
Naik et al. Building a cognizant honeypot for detecting active fingerprinting attacks using dynamic fuzzy rule interpolation
Brezo et al. Challenges and limitations in current botnet detection
Kumar Detecting bots in Internet chat