Dynamics of information diffusion and its applications on complex networks

ZK Zhang, C Liu, XX Zhan, X Lu, CX Zhang, YC Zhang - Physics Reports, 2016 - Elsevier
The ongoing rapid expansion of the Word Wide Web (WWW) greatly increases the
information of effective transmission from heterogeneous individuals to various systems …

Botnets: A survey

SSC Silva, RMP Silva, RCG Pinto, RM Salles - Computer Networks, 2013 - Elsevier
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …

Understanding the mirai botnet

M Antonakakis, T April, M Bailey, M Bernhard… - 26th USENIX security …, 2017 - usenix.org
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …

Measurement and analysis of Hajime, a peer-to-peer IoT botnet

S Herwig, K Harvey, G Hughey, R Roberts… - Network and Distributed …, 2019 - par.nsf.gov
The Internet of Things (IoT) introduces an unprece-dented diversity and ubiquity to
networked computing. It also introduces new attack surfaces that are a boon to attackers …

The Circle of life: A {large-scale} study of the {IoT} malware lifecycle

O Alrawi, C Lever, K Valakuzhy, K Snow… - 30th USENIX Security …, 2021 - usenix.org
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …

An efficient reinforcement learning-based Botnet detection approach

M Alauthman, N Aslam, M Al-Kasassbeh… - Journal of Network and …, 2020 - Elsevier
The use of bot malware and botnets as a tool to facilitate other malicious cyber activities (eg
distributed denial of service attacks, dissemination of malware and spam, and click fraud) …

Botnet detection based on traffic behavior analysis and flow intervals

D Zhao, I Traore, B Sayed, W Lu, S Saad, A Ghorbani… - computers & …, 2013 - Elsevier
Botnets represent one of the most serious cybersecurity threats faced by organizations
today. Botnets have been used as the main vector in carrying many cyber crimes reported in …

[PDF][PDF] Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection

G Gu, R Perdisci, J Zhang, W Lee - 2008 - usenix.org
Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-
of-service (DDoS), identity theft, and phishing. Most of the current botnet detection …

Your botnet is my botnet: analysis of a botnet takeover

B Stone-Gross, M Cova, L Cavallaro, B Gilbert… - Proceedings of the 16th …, 2009 - dl.acm.org
Botnets, networks of malware-infected machines that are controlled by an adversary, are the
root cause of a large number of security problems on the Internet. A particularly …

Big data analytics framework for peer-to-peer botnet detection using random forests

K Singh, SC Guntuku, A Thakur, C Hota - Information Sciences, 2014 - Elsevier
Network traffic monitoring and analysis-related research has struggled to scale for massive
amounts of data in real time. Some of the vertical scaling solutions provide good …