Data analytics on network traffic flows for botnet behaviour detection

DC Le, AN Zincir-Heywood… - 2016 IEEE symposium …, 2016 - ieeexplore.ieee.org
Botnets represent one of the most destructive cybersecurity threats. Given the evolution of
the structures and protocols botnets use, many machine learning approaches have been …

Benchmarking evolutionary computation approaches to insider threat detection

DC Le, S Khanchi, AN Zincir-Heywood… - Proceedings of the …, 2018 - dl.acm.org
Insider threat detection represents a challenging problem to companies and organizations
where malicious actions are performed by authorized users. This is a highly skewed data …

Botnet behaviour analysis: How would a data analytics‐based system with minimum a priori information perform?

F Haddadi, AN Zincir‐Heywood - International Journal of …, 2017 - Wiley Online Library
Botnets, as one of the most aggressive threats, has used different techniques, topologies,
and communication protocols in different stages of their lifecycle since 2003. Hence …

Internet traffic profiling

S Fernandes, S Fernandes - … Evaluation for Network Services, Systems and …, 2017 - Springer
This chapter takes you on a journey on Internet traffic, from understanding its profile (ie, by
modeling and analysis) to generating packets or flows (either real or synthetic), in diverse …

[PDF][PDF] Multiclass machine learning based botnet detection in software defined networks

F Tariq, S Baig - Int J Comput Sci Netw Secur (IJCSNS), 2019 - researchgate.net
Continuously evolving nature of botnet by using innovative approaches and technologies
derives the need for continuous improvement of botnet detection solutions. The state of the …

[PDF][PDF] Rozprawa doktorska

K Informatyka, TI TELEKOMUNIKACJA… - bip.pw.edu.pl
Malware (malicious software) is a serious threat to the modern Internet. Criminals use it to
send unsolicited messages, extort ransom by encrypting files, or steal bank login …

[引用][C] Investigating a behaviour analysis-based early warning system to identify botnets using machine learning algorithms

F Haddadi - 2016