Distributed denial of service attack prediction: Challenges, open issues and opportunities

AB de Neira, B Kantarci, M Nogueira - Computer Networks, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is one of the biggest cyber threats.
DDoS attacks have evolved in quantity and volume to evade detection and increase …

A proactive approach to protect cloud computing environment against a distributed denial of service (DDoS) attack

MM Ahmed, A El-Hajjar - AI, Blockchain and Self-Sovereign Identity in …, 2023 - Springer
The current range of technological and physical advances mostly rely on load dispersion as
well as demand delays which modern security solutions are equipped to defend against …

The Hidden Enemy: A Botnet Taxonomy

S Padhiar, A Shah, R Patel - … of the International Conference on Paradigms …, 2023 - Springer
Botnet poses a persistent and well-recognized threat to all Internet users. Botnets have
developed from being a curiosity to highly sophisticated tools for illegally earning money …

A novel botnet attack detection for IoT networks based on communication graphs

DC Muñoz, AC Valiente - Cybersecurity, 2023 - Springer
Intrusion detection systems have been proposed for the detection of botnet attacks. Various
types of centralized or distributed cloud-based machine learning and deep learning models …

[PDF][PDF] BotSward: Centrality Measures for Graph-Based Bot Detection Using Machine Learning.

K Shinan, K Alsubhi, MU Ashraf - Computers, Materials & Continua, 2023 - researchgate.net
The number of botnet malware attacks on Internet devices has grown at an equivalent rate to
the number of Internet devices that are connected to the Internet. Bot detection using …

Botnet detection in internet of things (IOT) by swarm intelligence (SI) algorithm

S Thota, D Menaka - AIP Conference Proceedings, 2023 - pubs.aip.org
Internet of Things is well known as IoT is changing human life smarter, comfort that support
to communicate and exchange of data by 'things' and 'devices' through Internet. Sensors as …

Unlocking the Potential: The Crucial Role of Data Preprocessing in Big Data Analytics

P Kantha, VK Sinha, D Srivastava… - 2023 1st DMIHER …, 2023 - ieeexplore.ieee.org
Access to the internet can significantly enhance the capabilities and opportunities in the field
of data mining. It provides a vast source of data, tools, and resources that can be leveraged …

Blockchain Based Peer to Peer Botnet Detection Using Louvain Algorithm

AT Sandra, A Ashok, RT Nair - 2023 14th International …, 2023 - ieeexplore.ieee.org
Peer-to-peer botnets have evolved to be one of the biggest threats to network security due to
their use as the foundation for several cybercrimes. The problem of detecting P2P botnets …

Check for

MF Alghenaim¹, NAA Bakar¹, FA Rahim… - Data Science and …, 2023 - books.google.com
The proliferation of the internet and computing devices has drawn much attention during the
Covid-19 pandemic stay home and work, and this has led the organization to adapt to …

[PDF][PDF] ALGORITHMICALLY GENERATED MALICIOUS DOMAIN DETECTION USING N-GRAMS EMBEDDING AND ATTENTION-BASED BIDIRECTIONAL GATED …

AS HARIAJI, AS GIRSANG - Journal of Theoretical and Applied Information …, 2023 - jatit.org
Botnets are one of the recent main cyber security threats. In order to avoid detection, botnets
use Domain Generation Algorithm (DGA) to generate malicious domain names and maintain …