HS Dutta, T Chakraborty - ACM/IMS Transactions on Data Science (TDS …, 2022 - dl.acm.org
Online media platforms have enabled users to connect with individuals and organizations, and share their thoughts. Other than connectivity, these platforms also serve multiple …
Capturing the distributed platform with remotely controlled compromised machines using botnet is extensively analyzed by various researchers. However, certain limitations need to …
Botnet is known as a dangerous threat in computer networks. Malicious activities from bots include phishing, sending spam messages, click misrepresentation, spreading malicious …
HA Thooriqoh, MN Azzmi, YA Tofan… - Jurnal Ilmiah Teknologi …, 2022 - juti.if.its.ac.id
Abstract Domain Name System (DNS) is an essential component in internet infrastructure to direct domains to IP addresses or conversely. Despite its important role in delivering internet …
E Alfasi, G Einziger - Proceedings of the 23rd International Conference …, 2022 - dl.acm.org
Volumetric attacks are a growing concern for current Internet services. These attacks overwhelm Internet services with requests that prevent legitimate users from accessing the …
Although these new technologies are being created to assist human progress, they still have security holes, which are used by those who wish to steal or destroy information from third …
This paper proposes three-stage botnet detection technique based on the anomaly and community detection. The first stage is a pragmatic node based distributed approach of …