A survey of network flow applications

B Li, J Springer, G Bebis, MH Gunes - Journal of Network and Computer …, 2013 - Elsevier
It has been over 16 years since Cisco's NetFlow was patented in 1996. Extensive research
has been conducted since then and many applications have been developed. In this survey …

Big data analytics for security

AA Cárdenas, PK Manadhata… - IEEE security & privacy, 2013 - ieeexplore.ieee.org
Big data is changing the landscape of security tools for network monitoring, security
information and event management, and forensics; however, in the eternal arms race of …

Forensics and deep learning mechanisms for botnets in internet of things: A survey of challenges and solutions

N Koroniotis, N Moustafa, E Sitnikova - IEEE Access, 2019 - ieeexplore.ieee.org
The constant miniaturization of hardware and an increase in power efficiency, have made
possible the integration of intelligence into ordinary devices. This trend of augmenting so …

[HTML][HTML] Botnet detection using graph-based feature clustering

S Chowdhury, M Khanzadeh, R Akula, F Zhang… - Journal of Big Data, 2017 - Springer
Detecting botnets in a network is crucial because bots impact numerous areas such as cyber
security, finance, health care, law enforcement, and more. Botnets are becoming more …

Detecting malicious domain names using deep learning approaches at scale

R Vinayakumar, KP Soman… - Journal of Intelligent & …, 2018 - content.iospress.com
Threats related to computer security constantly evolving and attacking the networks and
internet all the time. New security threats and the sophisticated methods that hackers use …

A cloud computing based network monitoring and threat detection system for critical infrastructures

Z Chen, G Xu, V Mahalingam, L Ge, J Nguyen, W Yu… - Big Data Research, 2016 - Elsevier
Critical infrastructure systems perform functions and missions that are essential for our
national economy, health, and security. These functions are vital to commerce, government …

[HTML][HTML] A survey of cloud-based network intrusion detection analysis

N Keegan, SY Ji, A Chaudhary, C Concolato… - … -centric Computing and …, 2016 - Springer
As network traffic grows and attacks become more prevalent and complex, we must find
creative new ways to enhance intrusion detection systems (IDSes). Recently, researchers …

Survey on network‐based botnet detection methods

S García, A Zunino, M Campo - Security and Communication …, 2014 - Wiley Online Library
Botnets are an important security problem on the Internet. They continuously evolve their
structure, protocols and attacks. This survey analyzes and compares the most important …

BotChase: Graph-based bot detection using machine learning

A Abou Daya, MA Salahuddin… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Bot detection using machine learning (ML), with network flow-level features, has been
extensively studied in the literature. However, existing flow-based approaches typically incur …

Effective multitask deep learning for iot malware detection and identification using behavioral traffic analysis

S Ali, O Abusabha, F Ali, M Imran… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Despite the benefits of the Internet of Things (IoT), the growing influx of IoT-specific malware
coordinating large-scale cyberattacks via infected IoT devices has created a substantial …