[HTML][HTML] Botnet dataset with simultaneous attack activity

MAR Putra, DP Hostiadi, T Ahmad - Data in Brief, 2022 - Elsevier
The proposed dataset shows characteristics of simultaneous botnet attack activities. Botnet
network traffic has sequentially interconnected as formed as bidirectional network flow …

B-CAT: a model for detecting botnet attacks using deep attack behavior analysis on network traffic flows

MAR Putra, T Ahmad, DP Hostiadi - Journal of Big Data, 2024 - Springer
Threats on computer networks have been increasing rapidly, and irresponsible parties are
always trying to exploit vulnerabilities in the network to do various dangerous things. One …

Unsupervised Clustering for a Comparative Methodology of Machine Learning Models to Detect Domain-Generated Algorithms Based on an Alphanumeric Features …

M Hassaoui, M Hanini, S El Kafhali - Journal of Network and Systems …, 2024 - Springer
Abstract Domain Generation Algorithms (DGAs) are often used for generating huge amounts
of domain names to maintain command and control between the infected computer and the …

A New Approach Feature Selection for Intrusion Detection System Using Correlation Analysis

DP Hostiadi, YP Atmojo, RR Huizen… - … on Cybernetics and …, 2022 - ieeexplore.ieee.org
Threats and attacks on computer networks need to be handled properly in the cyber era.
Malicious activities can harm the availability of system resources to the company's financial …

[HTML][HTML] Botnet sequential activity detection with hybrid analysis

MAR Putra, T Ahmad, DP Hostiadi… - Egyptian Informatics …, 2024 - Elsevier
Botnet is one type of malware that infects devices to carry out illegal activities controlled by a
botmaster. Many previous studies detected botnets as a single activity while botnet activities …

Analyzing and detecting Botnet Attacks using Anomaly Detection with Machine Learning

RB Ramesh, SJJ Thangaraj - 2023 5th International …, 2023 - ieeexplore.ieee.org
Botnet attacks have become a significant danger in the digital landscape, posing a
significant risk to personnel and public. The ability to detect and mitigate botnet attacks is …

Traffic Classification with Machine Learning for Enhancing Cloud Security

MS Hossen, T Ahmad… - 2023 Intelligent Methods …, 2023 - ieeexplore.ieee.org
Cloud computing has revolutionized business operations by facilitating rapid access to
numerous resources and services. With this convenience, however, comes the challenge of …

Botnet Attack Analysis through Graph Visualization.

MAR Putra, T Ahmad, DP Hostiadi… - … Journal of Intelligent …, 2024 - search.ebscohost.com
Botnet attacks on computer networks require proper handling because they can have
dangerous consequences. Botnets are dynamic and able to evolve quickly. A botnet can …

AI-Based Approach to Firewall Rule Refinement on High-Performance Computing Service Network

JK Lee, T Hong, G Lee - Applied Sciences, 2024 - mdpi.com
High-performance computing (HPC) relies heavily on network security, particularly when
supercomputing services are provided via public networks. As supercomputer operators, we …

[PDF][PDF] Analysis of Weight-Based Voting Classifier for Intrusion Detection System

M Hasanah, RA Putri, MAR Putra, T Ahmad - International Journal of …, 2024 - inass.org
The evolution of technology and the internet has accelerated the pace of communication
and information exchange. Despite technological advancements, the significant weakness …