Labeling network flows according to source applications

KD Ray, AJ Thomas, MD Harris - US Patent 11,277,416, 2022 - Google Patents
An enterprise security system is improved by instrumenting endpoints to explicitly label
network flows according to sources of network traffic. When a network message from an …

Blackmarket-driven collusion on online media: a survey

HS Dutta, T Chakraborty - ACM/IMS Transactions on Data Science (TDS …, 2022 - dl.acm.org
Online media platforms have enabled users to connect with individuals and organizations,
and share their thoughts. Other than connectivity, these platforms also serve multiple …

[PDF][PDF] Pattern Analysis and Regressive Linear Measure for Botnet Detection.

B Padmavathi, B Muthukumar - Computer Systems Science & …, 2022 - cdn.techscience.cn
Capturing the distributed platform with remotely controlled compromised machines using
botnet is extensively analyzed by various researchers. However, certain limitations need to …

Analyzing The Effect of Network Traffic Segmentation on The Accuracy of Botnet Activity Detection

MAR Putra, UL Yuhana, T Ahmad… - 2022 International …, 2022 - ieeexplore.ieee.org
Botnet is known as a dangerous threat in computer networks. Malicious activities from bots
include phishing, sending spam messages, click misrepresentation, spreading malicious …

Malicious Traffic Detection In Dns Infrastructure Using Decision Tree Algorithm

HA Thooriqoh, MN Azzmi, YA Tofan… - Jurnal Ilmiah Teknologi …, 2022 - juti.if.its.ac.id
Abstract Domain Name System (DNS) is an essential component in internet infrastructure to
direct domains to IP addresses or conversely. Despite its important role in delivering internet …

Botnet Mapping Based on Intersections of Traces

E Alfasi, G Einziger - Proceedings of the 23rd International Conference …, 2022 - dl.acm.org
Volumetric attacks are a growing concern for current Internet services. These attacks
overwhelm Internet services with requests that prevent legitimate users from accessing the …

Intrusion detection system in IoT networks using deep learning classification

OAA Al-Sumaidaee - 2022 - openaccess.altinbas.edu.tr
Although these new technologies are being created to assist human progress, they still have
security holes, which are used by those who wish to steal or destroy information from third …

[PDF][PDF] A Three-Stage Botnet Detection Technique using Random and Obrazom Graphs

K Akilandeswari, GA Basha, L Baranivel - academia.edu
This paper proposes three-stage botnet detection technique based on the anomaly and
community detection. The first stage is a pragmatic node based distributed approach of …