Multilayer framework for botnet detection using machine learning algorithms

WNH Ibrahim, S Anuar, A Selamat, O Krejcar… - IEEE …, 2021 - ieeexplore.ieee.org
A botnet is a malware program that a hacker remotely controls called a botmaster. Botnet
can perform massive cyber-attacks such as DDOS, SPAM, click-fraud, information, and …

BotCluster: A session-based P2P botnet clustering system on NetFlow

CY Wang, CL Ou, YE Zhang, FM Cho, PH Chen… - Computer Networks, 2018 - Elsevier
This study presents a session-based P2P botnet clustering system implemented on
MapReduce for aggregating malicious hosts within NetFlow traffic logs. The proposed botnet …

Network-based detection of Android malicious apps

S Garg, SK Peddoju, AK Sarje - International Journal of Information …, 2017 - Springer
Users leverage mobile devices for their daily Internet needs by running various mobile
applications (apps) such as social networking, e-mailing, news-reading, and video/audio …

Analysis of P2P, IRC and HTTP traffic for botnets detection

B AsSadhan, A Bashaiwth, J Al-Muhtadi… - Peer-to-Peer Networking …, 2018 - Springer
Botnets are widespread and have become a major threat to network security. A botnet is a
group of infected computers that are controlled by a botmaster. Botnet's members use …

A comparison of stream mining algorithms on botnet detection

GH Ribeiro, ER de Faria Paiva, RS Miani - Proceedings of the 15th …, 2020 - dl.acm.org
Recent botnet activities targeting IoT infrastructure and turning computing devices into
cryptocurrency miners indicate an increase in the botnet attack surface and capabilities …

Streaming Botnet traffic analysis using bio-inspired active learning

S Khanchi, N Zincir-Heywood… - NOMS 2018-2018 IEEE …, 2018 - ieeexplore.ieee.org
Non-stationary network traffic, together with stealth occurrences of malicious behaviors,
make analyzing network traffic challenging. In this research, a machine learning framework …

[HTML][HTML] BOTNET DETECTION USING INDEPENDENT COMPONENT ANALYSIS

WN Ibrahim, MS Anuar, A Selamat… - IIUM Engineering …, 2022 - journals.iium.edu.my
Botnet is a significant cyber threat that continues to evolve. Botmasters continue to improve
the security framework strategy for botnets to go undetected. Newer botnet source code runs …

A routing table poisoning model for peer-to-peer (P2P) botnets

SK Tetarave, S Tripathy, E Kalaimannan, C John… - IEEE …, 2019 - ieeexplore.ieee.org
Due to the global increase in mobile devices and cellular networks such as 3G, 4G, or LTE-A
networks, the concept of the interpenetration of peer-to-peer (P2P) overlay networks in …

A comprehensive survey on big data technology based cybersecurity analytics systems

S Saravanan, G Prakash - Applied Soft Computing and Communication …, 2021 - Springer
The traffic data in Internet is enormous as most of the population in the world uses Internet
nowadays. Due to the improvement in the speed of modern communication links in Internet …

Peer to peer botnet detection based on network traffic analysis

S Almutairi, S Mahfoudh… - 2016 8th IFIP International …, 2016 - ieeexplore.ieee.org
One of the most serious cyber-security threats is the botnet. The botnet runs in the
background of the compromised machine and maintains the communication with the C&C …