Botnets: A survey

SSC Silva, RMP Silva, RCG Pinto, RM Salles - Computer Networks, 2013 - Elsevier
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …

Botnet detection techniques: review, future trends, and issues

A Karim, RB Salleh, M Shiraz, SAA Shah… - Journal of Zhejiang …, 2014 - Springer
In recent years, the Internet has enabled access to widespread remote services in the
distributed computing environment; however, integrity of data transmission in the distributed …

Botnet detection based on anomaly and community detection

J Wang, IC Paschalidis - IEEE Transactions on Control of …, 2016 - ieeexplore.ieee.org
We introduce a novel two-stage approach for the important cybersecurity problem of
detecting the presence of a botnet and identifying the compromised nodes (the bots), ideally …

The good, the bad and the bait: Detecting and characterizing clickbait on youtube

S Zannettou, S Chatzis, K Papadamou… - 2018 IEEE Security …, 2018 - ieeexplore.ieee.org
The use of deceptive techniques in user-generated video portals is ubiquitous.
Unscrupulous uploaders deliberately mislabel video descriptors aiming at increasing their …

That ain't you: Blocking spearphishing through behavioral modelling

G Stringhini, O Thonnard - … Conference on Detection of Intrusions and …, 2015 - Springer
One of the ways in which attackers steal sensitive information from corporations is by
sending spearphishing emails. A typical spearphishing email appears to be sent by one of …

Spam and criminal activity

M Alazab, R Broadhurst - Trends and issues in crime and …, 2016 - search.informit.org
The rapid growth of the internet is transforming how we engage and communicate. It also
creates new opportunities for fraud and data theft. One way cybercriminals exploit the …

A comprehensive study of email spam botnet detection

WZ Khan, MK Khan, FTB Muhaya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
The problem of email spam has grown significantly over the past few years. It is not just a
nuisance for users but also it is damaging for those who fall for scams and other attacks. This …

Quit playing games with my heart: Understanding online dating scams

JM Huang, G Stringhini, P Yong - … , DIMVA 2015, Milan, Italy, July 9-10 …, 2015 - Springer
Online dating sites are experiencing a rise in popularity, with one in five relationships in the
United States starting on one of these sites. Online dating sites provide a valuable platform …

Malicious spam emails developments and authorship attribution

M Alazab, R Layton, R Broadhurst… - 2013 fourth cybercrime …, 2013 - ieeexplore.ieee.org
The Internet is a decentralized structure that offers speedy communication, has a global
reach and provides anonymity, a characteristic invaluable for committing illegal activities. In …

Understanding the detection of view fraud in video content portals

M Marciel, R Cuevas, A Banchs, R González… - Proceedings of the 25th …, 2016 - dl.acm.org
While substantial effort has been devoted to understand fraudulent activity in traditional
online advertising (search and banner), more recent forms such as video ads have received …