Botnet Fingerprinting: A Frequency Distributions Scheme for Lightweight Bot Detection
暂无分享,去创建一个
Stefano Secci | Mathieu Bouet | Vania Conan | Agathe Blaise | V. Conan | M. Bouet | Stefano Secci | Agathe Blaise
[1] Gaurav Sharma,et al. A Novel Approach for Efficient SVM Classification with Histogram Intersection Kernel , 2013, BMVC.
[2] Martin Rehak,et al. Identifying and modeling botnet C&C behaviors , 2014, ACySE '14.
[3] Yoshua Bengio,et al. Random Search for Hyper-Parameter Optimization , 2012, J. Mach. Learn. Res..
[4] Muhammad Sher,et al. Flow-based intrusion detection: Techniques and challenges , 2017, Comput. Secur..
[5] Raouf Boutaba,et al. A comprehensive survey on machine learning for networking: evolution, applications and research opportunities , 2018, Journal of Internet Services and Applications.
[6] Retantyo Wardoyo,et al. Time Complexity Analysis of Support Vector Machines (SVM) in LibSVM , 2015 .
[7] Yong Hou,et al. SVM Based MLP Neural Network Algorithm and Application in Intrusion Detection , 2011, AICI.
[8] Ashraf Matrawy,et al. A Survey on Botnet Architectures, Detection and Defences , 2015, Int. J. Netw. Secur..
[9] Maninder Singh,et al. Detecting bot-infected machines using DNS fingerprinting , 2019, Digit. Investig..
[10] landland. Mid year update , 2014 .
[11] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[12] Ahmed A. Abd El-Latif,et al. Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario , 2020, IEEE Transactions on Network and Service Management.
[13] Jing Wang,et al. Botnet Detection Based on Anomaly and Community Detection , 2017, IEEE Transactions on Control of Network Systems.
[14] Gürsel Serpen,et al. Complexity Analysis of Multilayer Perceptron Neural Network Embedded into a Wireless Sensor Network , 2014, Complex Adaptive Systems.
[15] Stefano Secci,et al. BotFP: FingerPrints Clustering for Bot Detection , 2020, NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium.
[16] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[17] Radu State,et al. SAFEM: Scalable analysis of flows with entropic measures and SVM , 2012, 2012 IEEE Network Operations and Management Symposium.
[18] Alejandro Zunino,et al. An empirical comparison of botnet detection methods , 2014, Comput. Secur..
[19] Ming-Yang Su,et al. A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach , 2009, Comput. Secur..
[20] Ahmed A. Abd El-Latif,et al. A Fully Automatic Player Detection Method Based on One-Class SVM , 2013, IEICE Trans. Inf. Syst..
[21] Futai Zou,et al. Detecting Malware Based on DNS Graph Mining , 2015, Int. J. Distributed Sens. Networks.
[22] T. V. Lakshman,et al. Unsupervised machine learning for network-centric anomaly detection in IoT , 2019, Big-DAMA@CoNEXT.
[23] Radu State,et al. BotGM: Unsupervised graph mining to detect botnets in traffic flows , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).
[24] A. Nur Zincir-Heywood,et al. Exploring a service-based normal behaviour profiling system for botnet detection , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).
[25] Raouf Boutaba,et al. A Graph-Based Machine Learning Approach for Bot Detection , 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).
[26] Xiuli Shao,et al. Detecting P2P botnets by discovering flow dependency in C&C traffic , 2014, Peer-to-Peer Netw. Appl..
[27] Mohammad Marufuzzaman,et al. Botnet detection using graph-based feature clustering , 2017, Journal of Big Data.
[28] Mark Crovella,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM '04.
[29] Jalal Al-Muhtadi,et al. Analysis of P2P, IRC and HTTP traffic for botnets detection , 2018, Peer-to-Peer Netw. Appl..
[30] Wei Lu,et al. Detecting Network Anomalies Using CUSUM and EM Clustering , 2009, ISICA.
[31] Kunle Olukotun,et al. Map-Reduce for Machine Learning on Multicore , 2006, NIPS.
[32] Marco Mellia,et al. A Survey on Big Data for Network Traffic Monitoring and Analysis , 2019, IEEE Transactions on Network and Service Management.
[33] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[34] Prateek Mittal,et al. BotGrep: Finding P2P Bots with Structured Graph Analysis , 2010, USENIX Security Symposium.