In the present paper we describe a new, updated and refined dataset specifically tailored to train and evaluate machine learning based malware traffic analysis algorithms. To generate …
We report about a HTTP botnet detection strategy based on a behavioral analysis of raw traffic data with the aim at minimizing resources necessary for the detection. It involves the …
Self-propagating malware has been infecting thousands of IoT devices and causing security breaches worldwide. Mitigating and cleaning self-propagating malware is important but …
O Savenko, S Lysenko, A Kryshchuk… - 2013 IEEE 7th …, 2013 - ieeexplore.ieee.org
A new approach for the botnet detection based on multi-agent system is proposed. For increasing of the efficiency of botnet detection the multi-agent system was involved that …
U Gupta - arXiv preprint arXiv:1507.07816, 2015 - arxiv.org
Virtualization started to gain traction in the domain of information technology in the early 2000s when managing resource distribution was becoming an uphill task for developers. As …
U Gupta - arXiv preprint arXiv:1506.03753, 2015 - arxiv.org
Authentication forms the gateway to any secure system. Together with integrity, confidentiality and authorization it helps in preventing any sort of intrusions into the system …
A Aich, A Sen - Int. J. Grid Distrib. Comput, 2015 - academia.edu
Recently, Cloud computing is most powerful research area because of its flexibility and cost efficiency. The environment provides dynamic, easily scalable services. Although cloud …