|
|
|
Xuan Dau Hoang and Quynh Chi Nguyen
In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection System...
ver más
|
|
|
|
|
|
|
Xuan Dau Hoang and Quynh Chi Nguyen
In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection System...
ver más
|
|
|
|
|
|
|
Tolijan Trajanovski and Ning Zhang
The leaked IoT botnet source-codes have facilitated the proliferation of different IoT botnet variants, some of which are equipped with new capabilities and may be difficult to detect. Despite the availability of solutions for automated analysis of IoT b...
ver más
|
|
|
|
|
|
|
Jun Park and Youngho Cho
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
ver más
|
|
|
|
|
|
|
Jaewoo Jeon and Youngho Cho
Once a botnet is constructed over the network, a bot master and bots start communicating by periodically exchanging messages, which is known as botnet C&C communication, in order to send botnet commands to bots, collect critical information stored in...
ver más
|
|
|
|
|
|
|
Yesta Medya Mahardhika, Amang Sudarsono, Ali Ridho Barakbah
Pág. 1 - 21
Botnet is a malicious software that often occurs at this time, and can perform malicious activities, such as DDoS, spamming, phishing, keylogging, clickfraud, steal personal information and important data. Botnets can replicate themselves without user co...
ver más
|
|
|
|
|
|
|
Shayan Taheri, Milad Salem and Jiann-Shiun Yuan
The advancements in the Internet has enabled connecting more devices into this technology every day. The emergence of the Internet of Things has aggregated this growth. Lack of security in an IoT world makes these devices hot targets for cyber criminals ...
ver más
|
|
|
|
|
|
|
Emmanuel C. Ogu, Olusegun A. Ojesanmi, Oludele Awodele and ?Shade Kuyoro
Botnets have carved a niche in contemporary networking and cybersecurity due to the impact of their operations. The botnet threat continues to evolve and adapt to countermeasures as the security landscape continues to shift. As research efforts attempt t...
ver más
|
|
|
|
|
|
|
Dimitrios Myridakis, Paul Myridakis and Athanasios Kakarountas
Recently, there has been a sharp increase in the production of smart devices and related networks, and consequently the Internet of Things. One concern for these devices, which is constantly becoming more critical, is their protection against attacks due...
ver más
|
|
|
|
|
|
|
Majda Wazzan, Daniyal Algazzawi, Omaima Bamasaq, Aiiad Albeshri and Li Cheng
Internet of Things (IoT) is promising technology that brings tremendous benefits if used optimally. At the same time, it has resulted in an increase in cybersecurity risks due to the lack of security for IoT devices. IoT botnets, for instance, have becom...
ver más
|
|
|
|
|
|
|
Christopher D. McDermott, John P. Isaacs and Andrei V. Petrovski
The growth of the Internet of Things (IoT), and demand for low-cost, easy-to-deploy devices, has led to the production of swathes of insecure Internet-connected devices. Many can be exploited and leveraged to perform large-scale attacks on the Internet, ...
ver más
|
|
|
|
|
|
|
Riaz Ullah Khan, Xiaosong Zhang, Rajesh Kumar, Abubakar Sharif, Noorbakhsh Amiri Golilarz and Mamoun Alazab
In recent years, the botnets have been the most common threats to network security since it exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been used to carry phishing links, to perform attacks and provide malicious...
ver más
|
|
|
|
|
|
|
Xingguo Li, Junfeng Wang and Xiaosong Zhang
With the help of botnets, intruders can implement a remote control on infected machines and perform various malicious actions. Domain Name System (DNS) is very famous for botnets to locate command and control (C and C) servers, which enormously strengthe...
ver más
|
|
|
|
|
|
|
Vaclav Oujezsky,Tomas Horvath,Vladislav Skorpil
Pág. 38 - 44
This paper addresses the issue of detecting unwanted traffic in data networks, namely the detection of botnet networks. In this paper, we focused on a time behavioral analysis, more specifically said ? lifespans of a simulated botnet netwo...
ver más
|
|
|
|
|
|
|
Kexiang Qian, Hongyu Yang, Ruyu Li, Weizhe Chen, Xi Luo and Lihua Yin
With the rapid growth of IoT devices, the threat of botnets is becoming increasingly worrying. There are more and more intelligent detection solutions for botnets that have been proposed with the development of artificial intelligence. However, due to th...
ver más
|
|
|
|
|
|
|
Sheeraz Ahmed, Zahoor Ali Khan, Syed Muhammad Mohsin, Shahid Latif, Sheraz Aslam, Hana Mujlid, Muhammad Adil and Zeeshan Najam
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and services, and damage corporate brands. Attackers use application layer DDoS attac...
ver más
|
|
|
|
|
|
|
Ashish Koirala, Rabindra Bista and Joao C. Ferreira
The Internet of Things (IoT) shares the idea of an autonomous system responsible for transforming physical computational devices into smart ones. Contrarily, storing and operating information and maintaining its confidentiality and security is a concerni...
ver más
|
|
|
|
|
|
|
Khalid Al-Begain, Murad Khan, Basil Alothman, Chibli Joumaa and Ebrahim Alrashed
The Internet of Things (IoT) has become an integral part of our daily life as it is growing in many fields, such as engineering, e-health, smart homes, smart buildings, agriculture, weather forecasting, etc. However, the growing number of IoT devices and...
ver más
|
|
|
|
|
|
|
Nejood Faisal Abdulsattar, Firas Abedi, Hayder M. A. Ghanimi, Sachin Kumar, Ali Hashim Abbas, Ali S. Abosinnee, Ahmed Alkhayyat, Mustafa Hamid Hassan and Fatima Hashim Abbas
Flying ad hoc networks (FANETs) or drone technologies have attracted great focus recently because of their crucial implementations. Hence, diverse research has been performed on establishing FANET implementations in disparate disciplines. Indeed, civil a...
ver más
|
|
|
|
|
|
|
Simon Nam Thanh Vu, Mads Stege, Peter Issam El-Habr, Jesper Bang and Nicola Dragoni
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things. Botnets have shown a capacity to perform substantial damage through distributed denial-of-servic...
ver más
|
|
|
|