2014
DOI: 10.1016/j.cose.2014.07.007
|View full text |Cite
|
Sign up to set email alerts
|

Cylindrical Coordinates Security Visualization for multiple domain command and control botnet detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…Furthermore, as seen in the literature, another technique seeks to analyse network traffic for traffic/packets that exhibit behaviours that deviate from the normal, observable network behaviour (an anomaly), such as those proposed by Wang et al [76], Boukhtouta et al [77], Zhao et al [78] and Caglayan et al [79]. Anomalous behaviours could also be analysed in relation to hypertext transfer protocol (HTTP) traffic, such as noted by Jiaet al [80], Mathew et al [81], Choi et al [82] and Eslahi et al [83]; domain name service (DNS) query patterns and properties, such as by Seo et al [84] and Futai et al [85]; and transmission control protocol (TCP) requests, such as that looked into by Abdullah et al [86]. Some other techniques discovered in the literature involve the graphical analysis and interpretation of the associations and interactions of bots, in a bid to forecast their potentials, understand the structure of their C&C, amongst others, as proposed by Wang and Paschalidis (2014) [87]; or the analysis of search engine log files, as proposed by Zhang et al [88].…”
Section: Analysis-basedmentioning
confidence: 99%
“…Furthermore, as seen in the literature, another technique seeks to analyse network traffic for traffic/packets that exhibit behaviours that deviate from the normal, observable network behaviour (an anomaly), such as those proposed by Wang et al [76], Boukhtouta et al [77], Zhao et al [78] and Caglayan et al [79]. Anomalous behaviours could also be analysed in relation to hypertext transfer protocol (HTTP) traffic, such as noted by Jiaet al [80], Mathew et al [81], Choi et al [82] and Eslahi et al [83]; domain name service (DNS) query patterns and properties, such as by Seo et al [84] and Futai et al [85]; and transmission control protocol (TCP) requests, such as that looked into by Abdullah et al [86]. Some other techniques discovered in the literature involve the graphical analysis and interpretation of the associations and interactions of bots, in a bid to forecast their potentials, understand the structure of their C&C, amongst others, as proposed by Wang and Paschalidis (2014) [87]; or the analysis of search engine log files, as proposed by Zhang et al [88].…”
Section: Analysis-basedmentioning
confidence: 99%
“…Additionally, the work by Seo et al in [8] and by Alonso et al [9] present novel approaches to detect attacks to the DNS service. The former proposes a visualisation tool that is capable of detecting botnet behaviour based on DNS requests.…”
Section: Related Workmentioning
confidence: 99%
“…Detecting and preventing DDoS attacks is an ongoing research topic. A current approach for DDoS attacks detection is by means of visualisation techniques [7], [8]; however, the main drawback is that visualisation could be overwhelming for administrators. However, machine learning techniques could complement visualisations providing further information and alerts that could ease the visual inspections whenever an undergoing attack is in place.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation