A survey on malicious domains detection through DNS data analysis

Y Zhauniarovich, I Khalil, T Yu, M Dacier - ACM Computing Surveys …, 2018 - dl.acm.org
Malicious domains are one of the major resources required for adversaries to run attacks
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …

Domain name system security and privacy: A contemporary survey

A Khormali, J Park, H Alasmary, A Anwar, M Saad… - Computer Networks, 2021 - Elsevier
Abstract The Domain Name System (DNS) is one of the most important components of
today's Internet, and is the standard naming convention between human-readable domain …

Algorithmically generated malicious domain names detection based on n-grams features

A Cucchiarelli, C Morbidoni, L Spalazzi… - Expert Systems with …, 2021 - Elsevier
Botnets are one of the major cyber infections used in several criminal activities. In most
botnets, a Domain Generation Algorithm (DGA) is used by bots to make DNS queries aimed …

ConnSpoiler: Disrupting C&C communication of IoT-based botnet through fast detection of anomalous domain queries

L Yin, X Luo, C Zhu, L Wang, Z Xu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The development of Internet of Things (IoT) dramatically facilitates the integration of
computing systems with the physical world. However, as IoT devices are more easy to …

Scalable framework for cyber threat situational awareness based on domain name systems data analysis

R Vinayakumar, P Poornachandran… - Big data in engineering …, 2018 - Springer
There are myriad of security solutions that have been developed to tackle the Cyber Security
attacks and malicious activities in digital world. They are firewalls, intrusion detection and …

Routing around congestion: Defeating DDoS attacks and adverse network conditions via reactive BGP routing

JM Smith, M Schuchard - 2018 IEEE Symposium on Security …, 2018 - ieeexplore.ieee.org
In this paper, we present Nyx, the first system to both effectively mitigate modern Distributed
Denial of Service (DDoS) attacks regardless of the amount of traffic under adversarial control …

Fuzzy neural network optimization and network traffic forecasting based on improved differential evolution

Y Hou, L Zhao, H Lu - Future Generation Computer Systems, 2018 - Elsevier
The traditional fuzzy neural network often uses BP algorithm to optimize parameters when
conducting parameter identification. However, BP algorithm tends to be trapped in local …

Finding domain-generation algorithms by looking at length distribution

M Mowbray, J Hagen - 2014 IEEE international symposium on …, 2014 - ieeexplore.ieee.org
In order to detect malware that uses domain fluxing to circumvent blacklisting, it is useful to
be able to discover new domain-generation algorithms (DGAs) that are being used to …

Analysis of botnet domain names for IoT cybersecurity

W Li, J Jin, JH Lee - IEEE Access, 2019 - ieeexplore.ieee.org
Botnets are widespread nowadays with the expansion of the Internet and commonly occur in
many cyber-attacks, resulting in serious threats to network services and users' properties …

[HTML][HTML] Analysis of intrusion detection approaches for network traffic anomalies with comparative analysis on botnets (2008–2020)

S Ahmad, S Jha, A Alam, M Alharbi… - Security and …, 2022 - hindawi.com
Botnets are conglomerations of traded PCs (bots) that are remotely controlled by its
originator (botmaster) under a command-and-control (C&C) foundation. Botnets are the …