Kumar, 2010 - Google Patents
Detecting bots in Internet chatKumar, 2010
- Document ID
- 9207921538430674483
- Author
- Kumar S
- Publication year
External Links
Snippet
Internet chat is a real-time communication tool that allows on-line users to communicate via text in virtual spaces, called chat rooms or channels. The abuse of Internet chat by bots also known as chat bots/chatterbots poses a serious threat to the users and quality of service …
- 238000004458 analytical method 0 abstract description 34
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/02—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
- H04L43/026—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gu et al. | BotSniffer: Detecting botnet command and control channels in network traffic | |
Khan et al. | A comprehensive study of email spam botnet detection | |
Gu et al. | Active botnet probing to identify obscure command and control channels | |
Kaur Chahal et al. | Distributed denial of service attacks: a threat or challenge | |
Hoque et al. | Botnet in DDoS attacks: trends and challenges | |
Egele et al. | Compa: Detecting compromised accounts on social networks. | |
Mahmoud et al. | A survey on botnet architectures, detection and defences. | |
Zhu et al. | Botnet research survey | |
Gu et al. | Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection | |
Gianvecchio et al. | Humans and bots in internet chat: measurement, analysis, and automated classification | |
Aiello et al. | DNS tunneling detection through statistical fingerprints of protocol messages and machine learning | |
Cao et al. | Detection of forwarding-based malicious URLs in online social networks | |
Yu et al. | Fool me if you can: Mimicking attacks and anti-attacks in cyberspace | |
Hu et al. | RB-Seeker: Auto-detection of Redirection Botnets. | |
US7577993B2 (en) | Methods and systems for detecting and preventing the spread of malware on instant messaging (IM) networks by using Bayesian filtering | |
Binsaeed et al. | Detecting spam in twitter microblogging services: A novel machine learning approach based on domain popularity | |
Xie et al. | HoneyIM: Fast detection and suppression of instant messaging malware in enterprise-like networks | |
Haddadi et al. | Botnet behaviour analysis: How would a data analytics‐based system with minimum a priori information perform? | |
Alauthman | An efficient approach to online bot detection based on a reinforcement learning technique | |
Lashkari et al. | A wide survey on botnet | |
Gu | Correlation-based botnet detection in enterprise networks | |
Yen | Detecting stealthy malware using behavioral features in network traffic | |
Naik et al. | Building a cognizant honeypot for detecting active fingerprinting attacks using dynamic fuzzy rule interpolation | |
Brezo et al. | Challenges and limitations in current botnet detection | |
Kumar | Detecting bots in Internet chat |