The Architectural Dynamics of Encapsulated Botnet Detection (EDM)
نویسندگان
چکیده
منابع مشابه
Adaptability of IRC Botnet Detection Method to P2P Botnet Detection
This report mainly discusses the adaptability of the IRC-based Bot detection method to be used in the P2P-based Bot detection. The first section introduces the IRC-based bot and the newly appeared P2P-based bot to see their difference. The second section shows the related work and the traditional method of BOTNET detection. The third section discusses the methodology used by the IRC based Botne...
متن کاملEarly Stage Botnet Detection and Containment via Mathematical Modeling and Prediction of Botnet Propagation Dynamics
The research that we discuss in this technical report shows that mathematical models of botnet propagation dynamics are a viable means of detecting early stage botnet infections in an enterprise network, and thus an effective tool for containing those botnet infections in a timely fashion. The main idea that underlies this research is to localize weakly connected subgraphs within a graph that m...
متن کاملBotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle
Nowadays, botnets are considered as essential tools for planning serious cyberattacks. Botnets are used to perform various malicious activities such as DDoSattacks and sending spam emails. Different approaches are presented to detectbotnets; however most of them may be ineffective when there are only a fewinfected hosts in monitored network, as they rely on similarity in...
متن کاملBotnet Detection Framework
Botnet ia a collection on network of bots. i.e the collection of zombie computers which are controlled by a single person or group known as bot master or herder. This paper focuses on botnet detection framework and proposed a generic framework for botnet detection. The proposed framework is based on the approach of passively monitoring network traffic. This paer also show the flow chart of Gene...
متن کاملHybrid Botnet Detection Mechanism
Botnets have emerged as one of the biggest threats to internet security in the recent years. They have confounded security researchers because of their mobile and secretive behavior. A Botnet is a network of zombie machines remotely controlled by a command server or a Botmaster. These compromised host machines may be used for sending spam, launching DOS attacks, spying or stealing information. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Asian Journal of Research in Computer Science
سال: 2019
ISSN: 2581-8260
DOI: 10.9734/ajrcos/2018/v2i430078