2018 8th IEEE International Conference on Control System, Computing and Engineering (ICCSCE) 2018
DOI: 10.1109/iccsce.2018.8684959
|View full text |Cite
|
Sign up to set email alerts
|

A Rule-based Approach to Detect Botnets based on DNS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…15. Many researchers adopted these evaluation metrics in their work (Soltanaghaei & Kharrazi, 2015;Kwon et al, 2016;Alieyan, 2018;Shi & Sun, 2020).…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…15. Many researchers adopted these evaluation metrics in their work (Soltanaghaei & Kharrazi, 2015;Kwon et al, 2016;Alieyan, 2018;Shi & Sun, 2020).…”
Section: Resultsmentioning
confidence: 99%
“…Since the bot or botnet tries to connect with the botmaster in different predefined periods, the average entropy for the source IP is essential to distinguish between benign and malicious traffic. Furthermore, we use the same time value, 5 s, for flow analysis based on a previous study (Alieyan, 2018). Equation (2) calculates the average domain entropy feature (F1).…”
Section: Enriched Features Calculations (Feature Engineering) Stepmentioning
confidence: 99%
See 1 more Smart Citation
“…Botnets for example are used for launching attacks of distributed denial-of-service (DDoS). They are used for identifying thefts, sending spam and phishing emails (Ammar et al, 2018;Almomani et al, 2015Almomani et al, , 2013Almomani, 2018;Alieyan et al, 2018;Alauthaman et al, 2018;Alauthman et al, 2020;Alieyan et al, 2019;Al-Kasassbeh et al, 2020;Alauthman and Albesani, 2019;Al-Nawasrah et al, 2020). Fast flux networks (FFNs) serve as a kind of botnet.…”
Section: Introductionmentioning
confidence: 99%