2019 16th Conference on Electrical Machines, Drives and Power Systems (ELMA) 2019
DOI: 10.1109/elma.2019.8771644
|View full text |Cite
|
Sign up to set email alerts
|

An approach for host based botnet detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…The highest total for the type of centered communication behaviors is performed in DDoS activity. Is considering the purpose of the attack is to flood the target [2,8,9,28]. In addition, bots like Nerris in Scenario number 9 do much communication, with fourteen thousands of the total targets.…”
Section: Communication Behaviormentioning
confidence: 99%
See 2 more Smart Citations
“…The highest total for the type of centered communication behaviors is performed in DDoS activity. Is considering the purpose of the attack is to flood the target [2,8,9,28]. In addition, bots like Nerris in Scenario number 9 do much communication, with fourteen thousands of the total targets.…”
Section: Communication Behaviormentioning
confidence: 99%
“…A botnet consists of a collection of computers that have been infected and forms a network communication [3][4][5][6]. Infected computers are known as bots or zombies and are controlled by botmaster [4,[6][7][8] that communicate to bot-client via a communication channel [3,9] to attack a computer target. Bot's malicious activities can be in the form of distributed denial of service (DDoS), spreading malware, phishing, sending spam messages, and misrepresentation of multi-layer adaptive clicks [1,[10][11][12][13].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the first group, GAs with binary coding were studied [10] - [11]. In the second group, respectively, GAs with valid coding [12] - [13]. In [12], it was shown that in the first group it is possible to achieve higher efficiency of searching for extreme values on the set of feasible solutions.…”
Section: Review and Analysis Of Previous Studiesmentioning
confidence: 99%
“…Different organizations, such as companies and schools, build up networks to exchange information within the organizations. Network security has become one of the major concerns of most people and organizations when using computers and other Internet-enabled devices to access online resources and store valuable data [1].…”
Section: Introductionmentioning
confidence: 99%