Machine learning-based botnet detection in software-defined network: A systematic review

K Shinan, K Alsubhi, A Alzahrani, MU Ashraf - Symmetry, 2021 - mdpi.com
In recent decades, the internet has grown and changed the world tremendously, and this, in
turn, has brought about many cyberattacks. Cybersecurity represents one of the most …

Botnet detection via mining of traffic flow characteristics

G Kirubavathi, R Anitha - Computers & Electrical Engineering, 2016 - Elsevier
Botnet is one of the most serious threats to cyber security as it provides a distributed platform
for several illegal activities. Regardless of the availability of numerous methods proposed to …

A survey on botnets: Incentives, evolution, detection and current trends

SN Thanh Vu, M Stege, PI El-Habr, J Bang, N Dragoni - Future Internet, 2021 - mdpi.com
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained
prominence in an era of pervasive computing and the Internet of Things. Botnets have …

Distributed Denial of Service Attacks on Cloud Computing Environment‎

IT Aziz, IH Abdulqadder… - Cihan University …, 2022 - journals.cihanuniversity.edu.iq
This paper aimed to identify the various kinds of distributed denial of service attacks (DDoS)
attacks, their destructive capabilities, and most of all, how best these issues could be counter …

Identifying malicious botnet traffic using logistic regression

R Bapat, A Mandya, X Liu, B Abraham… - 2018 systems and …, 2018 - ieeexplore.ieee.org
An important source of cyber-attacks is malware, which proliferates in different forms such as
botnets. The botnet malware typically looks for vulnerable devices across the Internet, rather …

Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification

F Haddadi, AN Zincir-Heywood - IEEE Systems journal, 2014 - ieeexplore.ieee.org
Botnets represent one of the most aggressive threats against cyber security. Different
techniques using different feature sets have been proposed for botnet traffic analysis and …

An empirical study of HTTP-based financial botnets

AK Sood, S Zeadally, RJ Enbody - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Cyber criminals are covertly attacking critical infrastructures, and botnets are a common
component of those attacks. In recent years, botnets have been shifting their focus from …

Utilizing netflow data to detect slow read attacks

C Kemp, C Calvert… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Attackers can leverage several techniques to compromise computer networks, ranging from
sophisticated malware to DDoS (Distributed Denial of Service) attacks that target the …

Using ensemble learning technique for detecting botnet on IoT

A Rezaei - SN Computer Science, 2021 - Springer
Despite the growing reputation and the ubiquitous nature of the IoT, it poses significant
challenges as it is also considered a convenient platform for cyberattacks. The connection of …

Machine learning for HTTP botnet detection using classifier algorithms

RFM Dollah, MA Faizal, F Arif… - Journal of …, 2018 - jtec.utem.edu.my
Recently, HTTP based Botnet threat has become a serious problem for computer security
experts as bots can infect victim's computer quick and stealthily. By using HTTP protocol …