On botnet behaviour analysis using GP and C4. 5
F Haddadi, D Runkel, AN Zincir-Heywood… - Proceedings of the …, 2014 - dl.acm.org
Botnets represent a destructive cyber security threat that aim to hide their malicious activities
within legitimate Internet traffic. Part of what makes botnets so affective is that they often …
within legitimate Internet traffic. Part of what makes botnets so affective is that they often …
[PDF][PDF] Salting public traces with attack traffic to test flow classifiers
We consider the problem of using flow-level data for detection of botnet command and
control (C&C) activity. We find that current approaches do not consider timingbased …
control (C&C) activity. We find that current approaches do not consider timingbased …
Botnet detection system analysis on the effect of botnet evolution and feature representation
F Haddadi, AN Zincir-Heywood - … of the Companion Publication of the …, 2015 - dl.acm.org
Botnets are known as one of the main destructive threats that have been active since 2003
in various forms. The ability to upgrade the structure and algorithms on the fly is part of what …
in various forms. The ability to upgrade the structure and algorithms on the fly is part of what …
Umysł kontra umysł-zagrożenia i metody walki ze złośliwym oprogramowaniem
T Gierszewski - Przegląd Telekomunikacyjny+ Wiadomości …, 2015 - mostwiedzy.pl
Zaprezentowano aktualny stan wiedzy na temat malware–złośliwego oprogramowania. Na
początku przedstawiane są definicje malware oraz motywacja osób rozwijających takie …
początku przedstawiane są definicje malware oraz motywacja osób rozwijających takie …