19   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Riaz Ullah Khan, Xiaosong Zhang, Rajesh Kumar, Abubakar Sharif, Noorbakhsh Amiri Golilarz and Mamoun Alazab    
In recent years, the botnets have been the most common threats to network security since it exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been used to carry phishing links, to perform attacks and provide malicious... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Xingguo Li, Junfeng Wang and Xiaosong Zhang    
With the help of botnets, intruders can implement a remote control on infected machines and perform various malicious actions. Domain Name System (DNS) is very famous for botnets to locate command and control (C and C) servers, which enormously strengthe... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Kexiang Qian, Hongyu Yang, Ruyu Li, Weizhe Chen, Xi Luo and Lihua Yin    
With the rapid growth of IoT devices, the threat of botnets is becoming increasingly worrying. There are more and more intelligent detection solutions for botnets that have been proposed with the development of artificial intelligence. However, due to th... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Tolijan Trajanovski and Ning Zhang    
The leaked IoT botnet source-codes have facilitated the proliferation of different IoT botnet variants, some of which are equipped with new capabilities and may be difficult to detect. Despite the availability of solutions for automated analysis of IoT b... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Simon Nam Thanh Vu, Mads Stege, Peter Issam El-Habr, Jesper Bang and Nicola Dragoni    
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things. Botnets have shown a capacity to perform substantial damage through distributed denial-of-servic... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jiyeon Kim, Minsun Shim, Seungah Hong, Yulim Shin and Eunjung Choi    
As the number of Internet of Things (IoT) devices connected to the network rapidly increases, network attacks such as flooding and Denial of Service (DoS) are also increasing. These attacks cause network disruption and denial of service to IoT devices. H... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Georgios Spathoulas, Nikolaos Giachoudis, Georgios-Paraskevas Damiris and Georgios Theodoridis    
Internet of Things is one of the most significant latest developments in computer science. It is common for modern computing infrastructures to partially consist of numerous low power devices that are characterized by high diversity in both hardware and ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Emmanuel C. Ogu, Olusegun A. Ojesanmi, Oludele Awodele and ?Shade Kuyoro    
Botnets have carved a niche in contemporary networking and cybersecurity due to the impact of their operations. The botnet threat continues to evolve and adapt to countermeasures as the security landscape continues to shift. As research efforts attempt t... ver más
Revista: Information    Formato: Electrónico

 
en línea
Marios Anagnostopoulos and John André Seem    
Covert channel communications are of vital importance for the ill-motivated purposes of cyber-crooks. Through these channels, they are capable of communicating in a stealthy way, unnoticed by the defenders and bypassing the security mechanisms of protect... ver más
Revista: Information    Formato: Electrónico

 
en línea
Xuan Dau Hoang and Quynh Chi Nguyen    
In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection System... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Xuan Dau Hoang and Quynh Chi Nguyen    
In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection System... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Majda Wazzan, Daniyal Algazzawi, Omaima Bamasaq, Aiiad Albeshri and Li Cheng    
Internet of Things (IoT) is promising technology that brings tremendous benefits if used optimally. At the same time, it has resulted in an increase in cybersecurity risks due to the lack of security for IoT devices. IoT botnets, for instance, have becom... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jaewoo Jeon and Youngho Cho    
Once a botnet is constructed over the network, a bot master and bots start communicating by periodically exchanging messages, which is known as botnet C&C communication, in order to send botnet commands to bots, collect critical information stored in... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Daniel S. Berman, Anna L. Buczak, Jeffrey S. Chavis and Cherita L. Corbett    
This survey paper describes a literature review of deep learning (DL) methods for cyber security applications. A short tutorial-style description of each DL method is provided, including deep autoencoders, restricted Boltzmann machines, recurrent neural ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Imtiaz Ullah, Ayaz Ullah and Mazhar Sajjad    
The tremendous number of Internet of Things (IoT) applications, with their ubiquity, has provided us with unprecedented productivity and simplified our daily life. At the same time, the insecurity of these technologies ensures that our daily lives are su... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Murat Ogul and Selçuk Baktir    
Due to widespread adoption of mobile communications devices and increasingly high throughput capacity of cellular networks, Third-Generation (3G) and Long Term Evolution (LTE) are becoming ever more popular. Millions of smart phones with 3G capabilities ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jun Park and Youngho Cho    
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Yelyzaveta Meleshko     Pág. 52 - 57
The subject matter of the research is the process of identifying information attacks on the recommendation system. The goal of this work is to develop a method for detecting information attack objects in a recommendation system based on the analysis of t... ver más

 
en línea
Yesta Medya Mahardhika, Amang Sudarsono, Ali Ridho Barakbah     Pág. 1 - 21
Botnet is a malicious software that often occurs at this time, and can perform malicious activities, such as DDoS, spamming, phishing, keylogging, clickfraud, steal personal information and important data. Botnets can replicate themselves without user co... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »