2010 IEEE International Conference on Systems, Man and Cybernetics 2010
DOI: 10.1109/icsmc.2010.5641914
|View full text |Cite
|
Sign up to set email alerts
|

A discovery of sequential attack patterns of malware in botnets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0
1

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 2 publications
0
6
0
1
Order By: Relevance
“…The dataset has already been studied and analyzed as follows. Roysid et al [5] brought up the ideas to detect se quential attack patterns using the PrefixSpan method for malware identification based on 2009 CCC dataset. Later on, the correlation analysis between 10 spamming botnets is presented and based on analysis of 3 weeks of spam email in their Darknets and Honeypots (2010 CCC Dataset) by [6].…”
Section: Reference [4] Explains the Purpose Of Cyber Clean Centermentioning
confidence: 99%
“…The dataset has already been studied and analyzed as follows. Roysid et al [5] brought up the ideas to detect se quential attack patterns using the PrefixSpan method for malware identification based on 2009 CCC dataset. Later on, the correlation analysis between 10 spamming botnets is presented and based on analysis of 3 weeks of spam email in their Darknets and Honeypots (2010 CCC Dataset) by [6].…”
Section: Reference [4] Explains the Purpose Of Cyber Clean Centermentioning
confidence: 99%
“…Both aforementioned works demonstrate that, some anti-virus software can significantly improve detection rates with training on older malware. The research conducted by Rosyid et al [11] is focused on detecting malicious attack patterns in botnets attacking a honeypot during the year 2009. After extracting the log files of malware sequences, they then apply the PrefixSpan algorithm to discover subsequence patterns.…”
Section: Related Workmentioning
confidence: 99%
“…The research conducted by Rosyid et al [11] is focused on detecting malicious attack patterns in botnets. They use a set of sequential attacks which was recorded by a honeypot during the year 2009.…”
Section: Related Workmentioning
confidence: 99%