Darknet traffic big-data analysis and network management for real-time automating of the malicious intent detection process by a weight agnostic neural networks …

K Demertzis, K Tsiknas, D Takezis, C Skianis, L Iliadis - Electronics, 2021 - mdpi.com
Attackers are perpetually modifying their tactics to avoid detection and frequently leverage
legitimate credentials with trusted tools already deployed in a network environment, making …

Botnet detection using negative selection algorithm, convolution neural network and classification methods

S Hosseini, AE Nezhad, H Seilani - Evolving Systems, 2022 - Springer
Botnet is a network and internet risk. It is necessary to detect botnet by analyzing and
monitoring in order to quickly prevent them. Most approaches are proposed to detect bots …

On security threats of botnets to cyber systems

T Lange, H Kettani - 2019 6th International Conference on …, 2019 - ieeexplore.ieee.org
As the dynamics of cyber warfare continue to change, it is very important to be aware of the
issues currently confronting cyberspace. One threat which continues to grow in the danger it …

An efficient botnet detection with the enhanced support vector neural network

S Jagadeesan, B Amutha - Measurement, 2021 - Elsevier
As the botnet makes the way for many illegal activities, it is considered as the most critical
threats to cybersecurity. Although many detection models have been presented by the …

Associated random neural networks for collective classification of nodes in botnet attacks

E Gelenbe, M Nakıp - arXiv preprint arXiv:2303.13627, 2023 - arxiv.org
Botnet attacks are a major threat to networked systems because of their ability to turn the
network nodes that they compromise into additional attackers, leading to the spread of high …

Effectiveness of entropy-based DDoS prevention for software defined networks

CS Whittle, H Liu - 2021 IEEE International Symposium on …, 2021 - ieeexplore.ieee.org
This work investigates entropy-based prevention of Distributed Denial-of-Service (DDoS)
attacks for Software Defined Networks (SDN). The experiments are conducted on a virtual …

Análisis criminológico de la delincuencia con criptomonedas cometida por grupos criminales y su aproximación desde los sistemas inteligentes

P Saldaña Taboada - 2023 - digibug.ugr.es
El origen de las criptomonedas tuvo lugar con la creación del Bitcoin por Satoshi Nakamoto.
Su aparición se vio impulsada por la crisis económica del año 2008 que ocasionó un …

[PDF][PDF] Behaviour based botnet detection with traffic analysis and flow intervals at the host level

S Padhiar, R Patel - Indonesian Journal of Electrical Engineering and …, 2023 - academia.edu
We proposed a host-based approach that detects a host, that has been compromised by
observing the flow of in-out bound traffic. To prove the existence of command and control …

DNS Tunnel Problem In Cybersecurity

G Gürsoy, A Varol, A Nasab - 2024 12th International …, 2024 - ieeexplore.ieee.org
The Domain Name System (DNS) is the most important building block of the Internet.
Websites, file transfer applications, and e-mail services use the DNS service. Therefore …

Critical analysis of botnet detection techniques for web applications

PC Tikekar, SS Sherekar… - … Conference on Innovative …, 2019 - ieeexplore.ieee.org
A botnet is a collection of computers in co-ordinated way to perform certain malicious
activity. Recently, Botnet have become one of the most critical challenges. Every day botnet …