Survey of approaches and features for the identification of HTTP-based botnet traffic

D Acarali, M Rajarajan, N Komninos… - Journal of network and …, 2016 - Elsevier
Botnet use is on the rise, with a growing number of botmasters now switching to the HTTP-
based C&C infrastructure. This offers them more stealth by allowing them to blend in with …

Distributed Denial of Service Attacks on Cloud Computing Environment‎

IT Aziz, IH Abdulqadder… - Cihan University …, 2022 - journals.cihanuniversity.edu.iq
This paper aimed to identify the various kinds of distributed denial of service attacks (DDoS)
attacks, their destructive capabilities, and most of all, how best these issues could be counter …

Identifying malicious botnet traffic using logistic regression

R Bapat, A Mandya, X Liu, B Abraham… - 2018 systems and …, 2018 - ieeexplore.ieee.org
An important source of cyber-attacks is malware, which proliferates in different forms such as
botnets. The botnet malware typically looks for vulnerable devices across the Internet, rather …

A comparison of machine learning approaches to detect botnet traffic

B Abraham, A Mandya, R Bapat, F Alali… - … Joint Conference on …, 2018 - ieeexplore.ieee.org
During the past decade, botnets have become one of the most significant threats in the field
of network security. A botnet attack typically works by infecting a device with malware and …

[HTML][HTML] Autonomous integration of TSN-unaware applications with QoS requirements in TSN networks

M Fluechter, S Lindner, L Osswald, J Arnaud… - Computer …, 2024 - Elsevier
Modern industrial networks transport both best-effort and real-time traffic. Time-Sensitive
Networking (TSN) was introduced by the IEEE TSN Task Group as an enhancement to …

Detection of HTTP flooding attacks in cloud using fuzzy bat clustering

T Raja Sree, S Mary Saira Bhanu - Neural Computing and Applications, 2020 - Springer
Cloud computing plays a major role in reducing the expenditure of infrastructural costs on
the basis of pay per use model. Security is the major concern wherein detection of security …

Protecting clock synchronization: Adversary detection through network monitoring

E Lisova, M Gutiérrez, W Steiner… - Journal of Electrical …, 2016 - Wiley Online Library
Nowadays, industrial networks are often used for safety‐critical applications with real‐time
requirements. Such applications usually have a time‐triggered nature with message …

Correlation-based HTTP Botnet detection using network communication histogram analysis

M Eslahi, WZ Abidin, MV Naseri - 2017 IEEE Conference on …, 2017 - ieeexplore.ieee.org
The latest generation of Botnets use HTTP protocol and port 80 as their communication
medium to impersonate themselves as normal web users and avoid current security …

Network traffic classification based on periodic behavior detection

J Koumar, T Čejka - 2022 18th International Conference on …, 2022 - ieeexplore.ieee.org
Even though encryption hides the content of communication from network monitoring and
security systems, this paper shows a feasible way to retrieve useful information about the …

Modeling, analysis, and characterization of periodic traffic on a campus edge network

M Haffey, M Arlitt, C Williamson - 2018 IEEE 26th International …, 2018 - ieeexplore.ieee.org
Traffic in today's edge networks is diverse, exhibiting many different patterns. This paper
focuses on periodic network traffic, which is often used by known network services (eg …