2012
DOI: 10.2991/978-94-91216-71-8_4
|View full text |Cite
|
Sign up to set email alerts
|

Network Forensics: Detection and Mitigation of Botnet Malicious Code via Darknet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…The authors of Ref. [13] demonstrated darknet monitoring in LAN. Unused IP addresses in their campus networks were defined as darknet.…”
Section: Darknet-monitoring-based Malware Detection On Lanmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors of Ref. [13] demonstrated darknet monitoring in LAN. Unused IP addresses in their campus networks were defined as darknet.…”
Section: Darknet-monitoring-based Malware Detection On Lanmentioning
confidence: 99%
“…The authors of Ref. [13] reported that darknet monitoring in LAN is effective for identifying the infected hosts, i.e., detecting malware, which can be found in Section 2.2 in detail. We believe that darknet-monitoring-based malware detection in LAN of ICS is effective compared to general networks and the Internet since normal communications on ICS networks are static compared to general networks.…”
Section: Introduction 11 Background and Motivationmentioning
confidence: 99%