On botnet behaviour analysis using GP and C4. 5

F Haddadi, D Runkel, AN Zincir-Heywood… - Proceedings of the …, 2014 - dl.acm.org
Botnets represent a destructive cyber security threat that aim to hide their malicious activities
within legitimate Internet traffic. Part of what makes botnets so affective is that they often …

[PDF][PDF] Salting public traces with attack traffic to test flow classifiers

ZB Celik, J Raghuram, G Kesidis, DJ Miller - 4th Workshop on Cyber …, 2011 - usenix.org
We consider the problem of using flow-level data for detection of botnet command and
control (C&C) activity. We find that current approaches do not consider timingbased …

Botnet detection system analysis on the effect of botnet evolution and feature representation

F Haddadi, AN Zincir-Heywood - … of the Companion Publication of the …, 2015 - dl.acm.org
Botnets are known as one of the main destructive threats that have been active since 2003
in various forms. The ability to upgrade the structure and algorithms on the fly is part of what …

Umysł kontra umysł-zagrożenia i metody walki ze złośliwym oprogramowaniem

T Gierszewski - Przegląd Telekomunikacyjny+ Wiadomości …, 2015 - mostwiedzy.pl
Zaprezentowano aktualny stan wiedzy na temat malware–złośliwego oprogramowania. Na
początku przedstawiane są definicje malware oraz motywacja osób rozwijających takie …

[引用][C] Investigating a behaviour analysis-based early warning system to identify botnets using machine learning algorithms

F Haddadi - 2016

[引用][C] Poster: Stigmalware: Investigating the Prevalence of Malware in the Clinical Domain

SR Gouravajhala, A Rahmati, E Chavis, DF Kune… - 2012