Skip to main content
5388 search results for:

Botnet 

sort by |
"newest" sorts results by publication date. "most relevant" also considers factors like how often the search phrase is in the result.
  1. 18-04-2024 | Online First

    A comprehensive node-based botnet detection framework for IoT network

    The number of cyber-attacks targeting the Internet of Things (IoT) has elevated in the last decade. This is due to the inherent security vulnerabilities inside IoT endpoints, as well as the broad acceptance and usage of Industrial IoT. In this …

  2. 01-04-2024 | OriginalPaper

    On Feature Selection Algorithms for Effective Botnet Detection

    The threats of botnets are becoming a growing concern infecting more and more computers every day. Although botnets can be detected from their behavioral patterns, it is becoming more challenging to differentiate the behavior between the malicious …

  3. Open Access 01-12-2024 | OriginalPaper

    B-CAT: a model for detecting botnet attacks using deep attack behavior analysis on network traffic flows

    Threats on computer networks have been increasing rapidly, and irresponsible parties are always trying to exploit vulnerabilities in the network to do various dangerous things. One way to exploit vulnerabilities in a computer network is by …

  4. 01-03-2024 | OriginalPaper

    DT-ARO: Decision Tree-Based Artificial Rabbits Optimization to Mitigate IoT Botnet Exploitation

    The rapid growth of Artificial Intelligence (AI) algorithms has created the opportunity to solve complex problems such as Internet of Things (IoT) botnet attacks. The severity of IoT botnet attacks is a critical challenge for improving the smart …

  5. 27-11-2023 | OriginalPaper

    BotDetector: a system for identifying DGA-based botnet with CNN-LSTM

    Botnets are one of the major threats to network security nowadays. To carry out malicious actions remotely, they heavily rely on Command and Control channels. DGA-based botnets use a domain generation algorithm to generate a significant number of …

  6. 23-02-2024 | Online First

    Security-aware IoT botnet attack detection framework using dilated and cascaded deep learning mechanism with conditional adversarial autoencoder-based features

    The “Internet of Things (IoT)” technology has been utilized in various industries in the past few years. As the IoT technology has diverse and small devices connected to it, IoT gadgets are vulnerable to several attacks. These networks are …

  7. 14-02-2024 | Online First

    Robust Botnet Detection Approach for Known and Unknown Attacks in IoT Networks Using Stacked Multi-classifier and Adaptive Thresholding

    The detection of security attacks holds significant importance in IoT networks, primarily due to the escalating number of interconnected devices and the sensitive nature of the transmitted data. This paper introduces a novel methodology designed …

  8. 2024 | OriginalPaper | Chapter

    Leveraging Graph Neural Networks for Botnet Detection

    Guarding the cyberinfrastructure is critical to ensure the proper transmission and availability of computer network services, information, and data. The proliferation in the number of cyber attacks launched on the cyberinfrastructure by making …

    Author:
    Ahmed Mohamed Saad Emam Saad
    Published in:
    Advanced Engineering, Technology and Applications (2024)
  9. 2024 | OriginalPaper | Chapter

    IoT Botnet Attacks Detection and Classification Based on Ensemble Learning

    With the vigorous development of the IoT, botnet attacks against the IoT have become more frequent and diverse, and the research on attack prevention and detection has become more difficult. This paper proposes an IoT botnet attack detection model …

    Authors:
    Yongzhong Cao, Zhihui Wang, Hongwei Ding, Jiale Zhang, Bin Li
    Published in:
    Artificial Intelligence and Robotics (2024)
  10. 13-06-2023 | OriginalPaper

    BotDefender: A Collaborative Defense Framework Against Botnet Attacks using Network Traffic Analysis and Machine Learning

    Botnets, an army of remotely controlled compromised devices called bots, routinely cause severe damage to infrastructures and organizations. Since the attacker uses millions of diverse internet-enabled devices and always has extra resources to …

  11. 30-08-2023 | OriginalPaper

    A review on graph-based approaches for network security monitoring and botnet detection

    This survey paper provides a comprehensive overview of recent research and development in network security that uses graphs and graph-based data representation and analytics. The paper focuses on the graph-based representation of network traffic …

  12. 2024 | OriginalPaper | Chapter

    Botnet Detection Method Based on NSA and DRN

    Botnets are one of the most serious cybersecurity threats facing organizations today. Although the analysis and detection of botnets have achieved a lot of research results, it still has problems such as strong concealment and difficult …

    Authors:
    Zhanhong Yin, Renchao Qin, Chengzhuo Ye, Fei He, Lan Zhang
    Published in:
    Neural Information Processing (2024)
  13. 2023 | OriginalPaper | Chapter

    Analysis of Data Obtained from the Mobile Botnet

    As the use of mobile devices increases, the security risks associated with them also steadily increase. One of the most serious threats is the presence of mobile botnets, which are a group of devices controlled by cybercriminals to launch attacks …

    Authors:
    Jaroslaw Kobiela, Piotr Urbaniec
    Published in:
    Advances in Mobile Computing and Multimedia Intelligence (2023)
  14. 2023 | OriginalPaper | Chapter

    Autoencoder-Based Botnet Detection for Enhanced IoT Security

    The Internet of Things (IoT) has revolutionized various industries by connecting everyday objects to the internet, enabling them to collect and share data. However, the rapid growth of IoT devices has also introduced significant security …

    Authors:
    Radhika Mahajan, Manoj Kumar
    Published in:
    Sustainable Development through Machine Learning, AI and IoT (2023)
  15. 2024 | OriginalPaper | Chapter

    CNN-LSTM: A Deep Learning Model to Detect Botnet Attacks in Internet of Things

    The Internet of Things has seen massive growth in recent years. This growth can be primarily linked to the advancement in technology with special attribution to the 5G technology. IoTs are present virtually everywhere. We can use them not just in …

    Authors:
    Chetanya Kunndra, Arjun Choudhary, Prashant Mathur, Kapil Pareek, Gaurav Choudhary
    Published in:
    Cryptology and Network Security with Machine Learning (2024)
  16. 2023 | OriginalPaper | Chapter

    A Machine Learning-Based Botnet Malicious Domain Detection Technique for New Business

    In the new network business, the danger of botnets should not be underestimated. Botnets often generate malicious domain names through DGAs to enable communication with command and control servers (C&C) and then receive commands from the …

    Authors:
    Aohan Mei, Zekun Chen, Jing Zhao, Dequan Yang
    Published in:
    Data Science (2023)
  17. 23-08-2023 | OriginalPaper

    ACNN-BOT: An Ant Colony Inspired Feature Selection Approach for ANN Based Botnet Detection

    With the growth and development of Internet and wireless communication, Internet-of-Things (IoT) has become a prominent technology for smart devices. In general, IoT systems are treated as badly secured because of always on nature of connectivity …

  18. 2023 | OriginalPaper | Chapter

    The Lightweight Botnet Detection Model Based on the Improved UNet

    Botnet detection tasks in many network devices require deployment of a large number of detection models. Deep learning-based Botnet detection models are big and resource-intensive. Besides, the UNet is primarily used for two-dimensional inputs but …

    Authors:
    Chengjie Li, Yunchun Zhang, Zixuan Li, Fan Feng, Zikun Liao, Xiaohui Cui
    Published in:
    Digital Forensics and Cyber Crime (2023)
  19. 2023 | OriginalPaper | Chapter

    A Large Scale IoT Botnet Attack Detection Using Ensemble Learning

    The escalation of the newer technology called Internet of Things (IoT), introduced numerous benefits to people. However, it has also raised the risk of cybercriminal attacks. For instance, it has allowed criminals to access confidential …

    Authors:
    B. Jwalin, S. Saravanan
    Published in:
    Advanced Computing (2023)
  20. 2023 | OriginalPaper | Chapter

    Structural Node Representation Learning for Detecting Botnet Nodes

    Private consumers, small businesses, and even large enterprises are all more at risk from botnets. These botnets are known for spearheading Distributed Denial-Of-Service (DDoS) attacks, spamming large populations of users, and causing critical …

    Authors:
    Justin Carpenter, Janet Layne, Edoardo Serra, Alfredo Cuzzocrea, Carmine Gallo
    Published in:
    Computational Science and Its Applications – ICCSA 2023 (2023)

Filter search results

Search Operators:

„ ... ... “ Finds documents with exactly this word group, in exactly this word order and spelling (e.g., "employer branding").
AND Finds documents with both search terms (e.g., sales AND bonus).
OR Finds documents with one or the other search term (e.g., porsche OR volkswagen).
Blank Space Finds documents with all search terms. Blank space is understood as AND (e.g., man robot production).
NOT Finds documents with no appearance of the word behind NOT (e.g., ford NOT "harrison ford").
COUNT(...)>n Finds documents where the search term is mentioned at least "n" times."n" may be any number (e.g., COUNT(gear)>8).
NEAR(..., ..., ) Finds documents with both search terms in any word order, permitting "n" words as a maximum distance between them. Best choose between 15 and 30 (e.g., NEAR(recruit, professionals, 20)).
* Finds documents with the search term in word versions or composites. The star * marks whether you wish them BEFORE, BEHIND, or BEFORE and BEHIND the search term (e.g., lightweight*, *lightweight, *lightweight*).
? Finds documents with the search termn in different spellings."?" allows only one character (e.g., organi?ation).
& + - Special characters are understood as AND (e.g., Miller Bros. & Sons).

You can use operators in your search query to narrow down your results even more.

Tap the operator, or hover the mouse pointer over it, to read more about how it works.