2012
DOI: 10.1504/ijwmc.2012.046776
|View full text |Cite
|
Sign up to set email alerts
|

Detection and prevention of botnets and malware in an enterprise network

Abstract: Abstract:One of the most significant threats faced by enterprise networks today is from Bots. A Bot is a program that operates as an agent for a user and runs automated tasks over the internet, at a much higher rate than would be possible for a human alone. A collection of Bots in a network, used for malicious purposes is referred to as a Botnet. Bot attacks can range from localized attacks like key-logging to network intensive attacks like Distributed Denial of Service (DDoS). In this paper, we suggest a nove… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…DTW works directly upon numeric time series, and does not need the discretization provided by the Haar Transform (though the wavelets could be used to pre-process the signal before computing DTW). This method has received minimal investigation for malware classification (Naval et al, 2014), but has been used for related tasks such as estimating the prevalence or malware infection (Kang et al, 2016) and detecting botnets (Thakur et al, 2012). Its description is also representative of a simpler common ground between the prior work in this area (Han et al, 2015;Baysa et al, 2013;Sorokin, 2011;Shanmugam et al, 2013).…”
Section: Haar Wavelet Transformmentioning
confidence: 99%
“…DTW works directly upon numeric time series, and does not need the discretization provided by the Haar Transform (though the wavelets could be used to pre-process the signal before computing DTW). This method has received minimal investigation for malware classification (Naval et al, 2014), but has been used for related tasks such as estimating the prevalence or malware infection (Kang et al, 2016) and detecting botnets (Thakur et al, 2012). Its description is also representative of a simpler common ground between the prior work in this area (Han et al, 2015;Baysa et al, 2013;Sorokin, 2011;Shanmugam et al, 2013).…”
Section: Haar Wavelet Transformmentioning
confidence: 99%
“…Temporary Storing on Local Disk: Another feasible way to minimize the attack is avoiding the constant connection to the internet. It can be possible by storing the file on local disk temporarily for one session and once all the operations of that session is done then update the cloud database [29]. However, This requires larger size of local disk which will be capable enough to store the session's information.…”
Section: Distributed Storagementioning
confidence: 99%
“…x. The Message Authentication Code (MAC) (for full details refer [11]) for each packet of data is calculated and then compared to the MAC previously assigned to each packet and synced with (B). This is performed as a check for any tampering of data to alert the whole system.…”
Section: Multi-path Routing Of Fragmented Data Transfermentioning
confidence: 99%
“…Bots in a network can be detected and removed using Standalone algorithm and network algorithm. [11] 4. Secure communications in cognitive radio [4].…”
Section: Existing Network Security Measuresmentioning
confidence: 99%