Botnet attacks classification in AMI networks with recursive feature elimination (RFE) and machine learning algorithms
O Kornyo, M Asante, R Opoku, K Owusu-Agyemang… - Computers & …, 2023 - Elsevier
Abstract STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Escalation of
privilege) in advance metering infrastructure (AMI) and cloud computing have been …
privilege) in advance metering infrastructure (AMI) and cloud computing have been …
Botnet and p2p botnet detection strategies: a review
H Dhayal, J Kumar - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
Among various network attacks, botnet led attacks are considered as the most serious
threats. A botnet, ie, the network of compromised computers is able to perform large scale …
threats. A botnet, ie, the network of compromised computers is able to perform large scale …
Botnet forensic analysis using machine learning
A Bijalwan - Security and Communication Networks, 2020 - Wiley Online Library
Botnet forensic analysis helps in understanding the nature of attacks and the modus
operandi used by the attackers. Botnet attacks are difficult to trace because of their rapid …
operandi used by the attackers. Botnet attacks are difficult to trace because of their rapid …
Features representation of botnet detection using machine learning approaches
PC Tikekar, SS Sherekar… - 2021 International …, 2021 - ieeexplore.ieee.org
Over the past ten years, Botnet has been an emerging threat that is increasing day by day &
has gained popularity amongst researchers. Botnet detection is a very challenging task, so …
has gained popularity amongst researchers. Botnet detection is a very challenging task, so …
A feature extraction method for P2P botnet detection using graphic symmetry concept
Z Yang, B Wang - Symmetry, 2019 - mdpi.com
A DDoS (Distributed Denial of Service) attack makes use of a botnet to launch attacks and
cause node congestion of wireless sensor networks, which is a common and serious threat …
cause node congestion of wireless sensor networks, which is a common and serious threat …
Hawkware: Network intrusion detection based on behavior analysis with ANNs on an IoT device
The network-based Intrusion detection system (NIDS) plays a key role in Internet of Things
(IoT) as most IoT services are network-driven. However, the existing NIDSes for IoT systems …
(IoT) as most IoT services are network-driven. However, the existing NIDSes for IoT systems …
Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets
The problem of detection of malicious network traffic is adversarial in nature. Accurate
detection of stealthy Peer-to-Peer botnets is an ongoing research problem. Past research on …
detection of stealthy Peer-to-Peer botnets is an ongoing research problem. Past research on …
Proactive preservation of world heritage by crowdsourcing and 3D reconstruction technology
H Shishido, Y Ito, Y Kawamura, T Matsui… - … Conference on Big …, 2017 - ieeexplore.ieee.org
Since over one million tourists annually visit the Angkor ruins, the effect on the buildings
from the vibrations caused by these tourists is a huge problem for maintaining them. Such …
from the vibrations caused by these tourists is a huge problem for maintaining them. Such …
PeerDigger: Digging stealthy P2P hosts through traffic analysis in real-time
P2P technology has been widely applied in many areas due to its excellent properties.
Some botnets also shift towards the decentralized architectures, since they provide a better …
Some botnets also shift towards the decentralized architectures, since they provide a better …
[PDF][PDF] Hybrid approach for botnet detection using k-means and k-medoids with Hopfield neural network
AA Obeidat - … Journal of Communication Networks and Information …, 2017 - researchgate.net
In the last few years, a number of attacks and malicious activities have been attributed to
common channels between users. A botnet is considered as an important carrier of …
common channels between users. A botnet is considered as an important carrier of …