Arastouie et al., 2013 - Google Patents
Detecting Botnets in View of an Efficient Method.Arastouie et al., 2013
- Document ID
- 17973749776953070251
- Author
- Arastouie N
- Arastooie N
- Salimi E
- Soltanali S
- Publication year
- Publication venue
- International Journal of Advanced Research in Computer Science
External Links
Snippet
With the increasing expansion of Botnets, techniques for identifying and analyzing the behavior of bots extensively can be seen. There are a variety of Tools and techniques to identify Botnets classified into two categories, anomaly-based and signature-based …
- 238000001514 detection method 0 abstract description 26
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Almutairi et al. | Hybrid botnet detection based on host and network analysis | |
Masdari et al. | A survey and taxonomy of DoS attacks in cloud computing | |
US9762596B2 (en) | Heuristic botnet detection | |
Zeidanloo et al. | A taxonomy of botnet detection techniques | |
US9473528B2 (en) | Identification of malware sites using unknown URL sites and newly registered DNS addresses | |
Yen et al. | Traffic aggregation for malware detection | |
Tyagi et al. | A wide scale survey on botnet | |
Ghafir et al. | A survey on botnet command and control traffic detection | |
Amini et al. | A survey on Botnet: Classification, detection and defense | |
Arukonda et al. | The innocent perpetrators: reflectors and reflection attacks | |
Haddadi et al. | DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment | |
JP2018194880A (en) | Information processing apparatus, unauthorized activity classification method and program for classifying unauthorized activity | |
Alparslan et al. | BotNet detection: Enhancing analysis by using data mining techniques | |
Bdair et al. | Brief of intrusion detection systems in detecting ICMPv6 attacks | |
Seo et al. | A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems | |
Shafee | Botnets and their detection techniques | |
Saad et al. | Rule-based detection technique for ICMPv6 anomalous behaviour | |
Limarunothai et al. | Trends and challenges of botnet architectures and detection techniques | |
Kumar | Botnet detection techniques and research challenges | |
Bansal et al. | Botnet forensics framework: Is your system a bot | |
Abdulla et al. | Setting a worm attack warning by using machine learning to classify netflow data | |
Rajan et al. | Performance Analysis on Web based traffic control for DDoS attacks | |
Singhrova | A host based intrusion detection system for DDoS attack in WLAN | |
Almomani et al. | Botnet behavior and detection techniques: A review | |
Arastouie et al. | Detecting Botnets in View of an Efficient Method. |