2016
DOI: 10.1016/j.aej.2016.04.004
|View full text |Cite
|
Sign up to set email alerts
|

Detection of randomized bot command and control traffic on an end-point host

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(16 citation statements)
references
References 5 publications
0
16
0
Order By: Relevance
“…the compromised machine) could be either computers, mobile phones etc. [5,[38][39][40]. Botnets attacks escalate geometrically as criminals have found them a safe-haven to perpetuate attacks for several reasons.…”
Section: Smart Meter Data and Electricity Theftmentioning
confidence: 99%
See 3 more Smart Citations
“…the compromised machine) could be either computers, mobile phones etc. [5,[38][39][40]. Botnets attacks escalate geometrically as criminals have found them a safe-haven to perpetuate attacks for several reasons.…”
Section: Smart Meter Data and Electricity Theftmentioning
confidence: 99%
“…Hence, an intrusion detection systems (IDSs) are required as another level of protection [41]. An efficient IDSs must first uncover the behaviours of the bots to aid the design, detection and blocking mechanism [38,39]. This is done by exploring the communication patterns of the bots C&C channel which is its weakest link, since it is the only link the bot-master communicates with its bots, and block them before any serious harm is done [5,39,42,43].…”
Section: Smart Meter Data and Electricity Theftmentioning
confidence: 99%
See 2 more Smart Citations
“…Although the detection of the configuration of a communication channel between a host infected by malicious code and a C&C server has been the focus of several studies, including [3,7,26], these detection methods may encounter an increase in false positives or false negatives when the C&C channel occurs irregularly. The methodology here proposes the APChain algorithm to alleviate the existing problems by using connection time intervals, frequencies, and standard deviations to perform behavioral profiling and thus detect abnormal behavior.…”
Section: Candc Channel Detection [Case Study A]mentioning
confidence: 99%