|
|
|
Riaz Ullah Khan, Xiaosong Zhang, Rajesh Kumar, Abubakar Sharif, Noorbakhsh Amiri Golilarz and Mamoun Alazab
In recent years, the botnets have been the most common threats to network security since it exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been used to carry phishing links, to perform attacks and provide malicious...
ver más
|
|
|
|
|
|
|
Xingguo Li, Junfeng Wang and Xiaosong Zhang
With the help of botnets, intruders can implement a remote control on infected machines and perform various malicious actions. Domain Name System (DNS) is very famous for botnets to locate command and control (C and C) servers, which enormously strengthe...
ver más
|
|
|
|
|
|
|
Kexiang Qian, Hongyu Yang, Ruyu Li, Weizhe Chen, Xi Luo and Lihua Yin
With the rapid growth of IoT devices, the threat of botnets is becoming increasingly worrying. There are more and more intelligent detection solutions for botnets that have been proposed with the development of artificial intelligence. However, due to th...
ver más
|
|
|
|
|
|
|
Tolijan Trajanovski and Ning Zhang
The leaked IoT botnet source-codes have facilitated the proliferation of different IoT botnet variants, some of which are equipped with new capabilities and may be difficult to detect. Despite the availability of solutions for automated analysis of IoT b...
ver más
|
|
|
|
|
|
|
Simon Nam Thanh Vu, Mads Stege, Peter Issam El-Habr, Jesper Bang and Nicola Dragoni
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things. Botnets have shown a capacity to perform substantial damage through distributed denial-of-servic...
ver más
|
|
|
|
|
|
|
Jiyeon Kim, Minsun Shim, Seungah Hong, Yulim Shin and Eunjung Choi
As the number of Internet of Things (IoT) devices connected to the network rapidly increases, network attacks such as flooding and Denial of Service (DoS) are also increasing. These attacks cause network disruption and denial of service to IoT devices. H...
ver más
|
|
|
|
|
|
|
Georgios Spathoulas, Nikolaos Giachoudis, Georgios-Paraskevas Damiris and Georgios Theodoridis
Internet of Things is one of the most significant latest developments in computer science. It is common for modern computing infrastructures to partially consist of numerous low power devices that are characterized by high diversity in both hardware and ...
ver más
|
|
|
|
|
|
|
Emmanuel C. Ogu, Olusegun A. Ojesanmi, Oludele Awodele and ?Shade Kuyoro
Botnets have carved a niche in contemporary networking and cybersecurity due to the impact of their operations. The botnet threat continues to evolve and adapt to countermeasures as the security landscape continues to shift. As research efforts attempt t...
ver más
|
|
|
|
|
|
|
Marios Anagnostopoulos and John André Seem
Covert channel communications are of vital importance for the ill-motivated purposes of cyber-crooks. Through these channels, they are capable of communicating in a stealthy way, unnoticed by the defenders and bypassing the security mechanisms of protect...
ver más
|
|
|
|
|
|
|
Xuan Dau Hoang and Quynh Chi Nguyen
In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection System...
ver más
|
|
|
|
|
|
|
Xuan Dau Hoang and Quynh Chi Nguyen
In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection System...
ver más
|
|
|
|
|
|
|
Majda Wazzan, Daniyal Algazzawi, Omaima Bamasaq, Aiiad Albeshri and Li Cheng
Internet of Things (IoT) is promising technology that brings tremendous benefits if used optimally. At the same time, it has resulted in an increase in cybersecurity risks due to the lack of security for IoT devices. IoT botnets, for instance, have becom...
ver más
|
|
|
|
|
|
|
Jaewoo Jeon and Youngho Cho
Once a botnet is constructed over the network, a bot master and bots start communicating by periodically exchanging messages, which is known as botnet C&C communication, in order to send botnet commands to bots, collect critical information stored in...
ver más
|
|
|
|
|
|
|
Daniel S. Berman, Anna L. Buczak, Jeffrey S. Chavis and Cherita L. Corbett
This survey paper describes a literature review of deep learning (DL) methods for cyber security applications. A short tutorial-style description of each DL method is provided, including deep autoencoders, restricted Boltzmann machines, recurrent neural ...
ver más
|
|
|
|
|
|
|
Imtiaz Ullah, Ayaz Ullah and Mazhar Sajjad
The tremendous number of Internet of Things (IoT) applications, with their ubiquity, has provided us with unprecedented productivity and simplified our daily life. At the same time, the insecurity of these technologies ensures that our daily lives are su...
ver más
|
|
|
|
|
|
|
Murat Ogul and Selçuk Baktir
Due to widespread adoption of mobile communications devices and increasingly high throughput capacity of cellular networks, Third-Generation (3G) and Long Term Evolution (LTE) are becoming ever more popular. Millions of smart phones with 3G capabilities ...
ver más
|
|
|
|
|
|
|
Yelyzaveta Meleshko
Pág. 52 - 57
The subject matter of the research is the process of identifying information attacks on the recommendation system. The goal of this work is to develop a method for detecting information attack objects in a recommendation system based on the analysis of t...
ver más
|
|
|
|
|
|
|
Jun Park and Youngho Cho
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
ver más
|
|
|
|
|
|
|
Yesta Medya Mahardhika, Amang Sudarsono, Ali Ridho Barakbah
Pág. 1 - 21
Botnet is a malicious software that often occurs at this time, and can perform malicious activities, such as DDoS, spamming, phishing, keylogging, clickfraud, steal personal information and important data. Botnets can replicate themselves without user co...
ver más
|
|
|
|