Botnets: A survey

SSC Silva, RMP Silva, RCG Pinto, RM Salles - Computer Networks, 2013 - Elsevier
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …

Survey and taxonomy of botnet research through life-cycle

RA Rodríguez-Gómez, G Maciá-Fernández… - ACM Computing …, 2013 - dl.acm.org
Of all current threats to cybersecurity, botnets are at the top of the list. In consequence,
interest in this problem is increasing rapidly among the research community and the number …

Botnet detection using graph-based feature clustering

S Chowdhury, M Khanzadeh, R Akula, F Zhang… - Journal of Big Data, 2017 - Springer
Detecting botnets in a network is crucial because bots impact numerous areas such as cyber
security, finance, health care, law enforcement, and more. Botnets are becoming more …

[HTML][HTML] The evolution of Mirai botnet scans over a six-year period

A Affinito, S Zinno, G Stanco, A Botta… - Journal of Information …, 2023 - Elsevier
The proliferation of Internet of Things devices has resulted in an increase in security
vulnerabilities and network attacks. The Mirai botnet is a well-known example of a network …

Machine learning-based early detection of IoT botnets using network-edge traffic

A Kumar, M Shridhar, S Swaminathan, TJ Lim - Computers & Security, 2022 - Elsevier
In this work, we present an IoT botnet detection solution, EDIMA, consisting of a set of
lightweight modules designed to be deployed at the edge gateway installed in home …

Botdet: A system for real time botnet command and control traffic detection

I Ghafir, V Prenosil, M Hammoudeh, T Baker… - IEEE …, 2018 - ieeexplore.ieee.org
Over the past decade, the digitization of services transformed the healthcare sector leading
to a sharp rise in cybersecurity threats. Poor cybersecurity in the healthcare sector, coupled …

DDoS botnet prevention using blockchain in software defined internet of things

Q Shafi, A Basit - … Bhurban conference on applied sciences and …, 2019 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks have two defense perspectives firstly, to defend
your network, resources and other information assets from this disastrous attack. Secondly …

A novel intrusion detection system for internet of things network security

AK Bediya, R Kumar - Journal of Information Technology Research …, 2021 - igi-global.com
Internet of things (IoT) comprises a developing ecosystem of responsive and interconnected
devices, sensors, networks, and software. The internet of things keeps on extending with the …

Secured communication using virtual private network (VPN)

PJ Ezra, S Misra, A Agrawal, J Oluranti… - Cyber Security and …, 2022 - Springer
The evolution and era of the latest programs and services, collectively with the enlargement
of encrypted communications, make it difficult for site visitors within a safety enterprise …

Artificial intelligence and machine learning in cybersecurity: Applications, challenges, and opportunities for mis academics

R Sen, G Heim, Q Zhu - … of the Association for Information Systems, 2022 - aisel.aisnet.org
The availability of massive amounts of data, fast computers, and superior machine learning
(ML) algorithms has spurred interest in artificial intelligence (AI). It is no surprise, then, that …