Malware traffic classification using convolutional neural network for representation learning

W Wang, M Zhu, X Zeng, X Ye… - 2017 International …, 2017 - ieeexplore.ieee.org
Traffic classification is the first step for network anomaly detection or network based intrusion
detection system and plays an important role in network security domain. In this paper we …

Hybrid botnet detection based on host and network analysis

S Almutairi, S Mahfoudh, S Almutairi… - Journal of Computer …, 2020 - Wiley Online Library
Botnet is one of the most dangerous cyber‐security issues. The botnet infects unprotected
machines and keeps track of the communication with the command and control server to …

Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification

F Haddadi, AN Zincir-Heywood - IEEE Systems journal, 2014 - ieeexplore.ieee.org
Botnets represent one of the most aggressive threats against cyber security. Different
techniques using different feature sets have been proposed for botnet traffic analysis and …

On botnet behaviour analysis using GP and C4. 5

F Haddadi, D Runkel, AN Zincir-Heywood… - Proceedings of the …, 2014 - dl.acm.org
Botnets represent a destructive cyber security threat that aim to hide their malicious activities
within legitimate Internet traffic. Part of what makes botnets so affective is that they often …

[PDF][PDF] Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic

S Al-Mashhadi, M Anbar, I Hasbullah… - PeerJ Computer …, 2021 - peerj.com
Botnets can simultaneously control millions of Internet-connected devices to launch
damaging cyber-attacks that pose significant threats to the Internet. In a botnet, bot-masters …

Botnet detection system analysis on the effect of botnet evolution and feature representation

F Haddadi, AN Zincir-Heywood - … of the Companion Publication of the …, 2015 - dl.acm.org
Botnets are known as one of the main destructive threats that have been active since 2003
in various forms. The ability to upgrade the structure and algorithms on the fly is part of what …

Botnet behaviour analysis: How would a data analytics‐based system with minimum a priori information perform?

F Haddadi, AN Zincir‐Heywood - International Journal of …, 2017 - Wiley Online Library
Botnets, as one of the most aggressive threats, has used different techniques, topologies,
and communication protocols in different stages of their lifecycle since 2003. Hence …

A comprehensive detection approach of wannacry: principles, rules and experiments

G Lu, Y Liu, Y Chen, C Zhang, Y Gao… - … Conference on Cyber …, 2020 - ieeexplore.ieee.org
Recently, cybercrime has become an important research issue in the field of cybersecurity.
And ransomware is considered one of the main categories of cybercrime. The Wannacry …

Peer to peer botnet detection based on network traffic analysis

S Almutairi, S Mahfoudh… - 2016 8th IFIP International …, 2016 - ieeexplore.ieee.org
One of the most serious cyber-security threats is the botnet. The botnet runs in the
background of the compromised machine and maintains the communication with the C&C …

[PDF][PDF] Recent Techniques Used To Detect Botnet Activities Within The Network Using Netflow Data And Botnet Detection In Virtual Environments

O Ucan - systems.uomisan.edu.iq
Botnet in recent days has become the talking point for malware researchers for its
coordinated network of attack vectors spread across the cyber space. They are mostly driven …