Survey on Unified Threat Management (UTM) Systems for Home Networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

Demystifying the transferability of adversarial attacks in computer networks

E Nowroozi, Y Mekdad… - … on Network and …, 2022 - ieeexplore.ieee.org
Convolutional Neural Networks (CNNs) models are one of the most frequently used deep
learning networks, and extensively used in both academia and industry. Recent studies …

[HTML][HTML] DGA-based botnets detection using DNS traffic mining

AM Manasrah, T Khdour, R Freehat - Journal of King Saud University …, 2022 - Elsevier
Botnet is a network of infected workstations that are remotely managed by BotMaster via the
command and control (C&C) server. Botnets pose a serious threat to network security since …

[PDF][PDF] Analysis of Botnet Attack Communication Pattern Behavior on Computer Networks.

MAR Putra, T Ahmad, DP Hostiadi - International Journal of Intelligent …, 2022 - inass.org
Botnets are a severe threat to a computer network, affecting various aspects of security
systems, including spreading malicious programs, phishing, sending spam messages, and …

[PDF][PDF] A signature-based botnet (emotet) detection mechanism

F Suthar, N Patel, S Khanna - Int. J. Eng. Trends Technol, 2022 - researchgate.net
The Internet has become an essential part of life, especially after the COVID-19 pandemic.
The increasing use of technology brings new challenges. Cyber security has emerged as a …

B-CAT: a model for detecting botnet attacks using deep attack behavior analysis on network traffic flows

MAR Putra, T Ahmad, DP Hostiadi - Journal of Big Data, 2024 - Springer
Threats on computer networks have been increasing rapidly, and irresponsible parties are
always trying to exploit vulnerabilities in the network to do various dangerous things. One …

Unsupervised Clustering for a Comparative Methodology of Machine Learning Models to Detect Domain-Generated Algorithms Based on an Alphanumeric Features …

M Hassaoui, M Hanini, S El Kafhali - Journal of Network and Systems …, 2024 - Springer
Abstract Domain Generation Algorithms (DGAs) are often used for generating huge amounts
of domain names to maintain command and control between the infected computer and the …

On DGA detection and classification using P4 programmable switches

A AlSabeh, K Friday, E Kfoury, J Crichigno… - Computers & …, 2024 - Elsevier
Abstract Domain Generation Algorithms (DGAs) are highly effective strategies employed by
malware to establish connections with Command and Control (C2) servers. Mitigating DGAs …

UTL_DGA22-a dataset for DGA botnet detection and classification

TA Tuan, NV Anh, TT Luong, HV Long - Computer Networks, 2023 - Elsevier
The DGA botnet prevention is a burning topic in cybersecurity, with two problems: detection
and classification. The DGA botnet dataset plays an essential role in the research allowing …

A novel framework for generating personalized network datasets for nids based on traffic aggregation

P Velarde-Alvarado, H Gonzalez, R Martínez-Peláez… - Sensors, 2022 - mdpi.com
In this paper, we addressed the problem of dataset scarcity for the task of network intrusion
detection. Our main contribution was to develop a framework that provides a complete …