NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium 2020
DOI: 10.1109/noms47738.2020.9110332
|View full text |Cite
|
Sign up to set email alerts
|

Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…As an example, a universal firmware vulnerability observer (UFO) has been used to detect for verifying firmware security and discovering hidden backdoor in an IoT device [93]. M-ID3 and M-ID4 are methods that detect DER botnet devices (e.g., [94]) and DER worm devices communicating with the smart inverter, respectively. MR1 refers to a fast recovery strategy for a malware-infected smart inverter.…”
Section: B Malware Defense (Attacks #2-#6)mentioning
confidence: 99%
“…As an example, a universal firmware vulnerability observer (UFO) has been used to detect for verifying firmware security and discovering hidden backdoor in an IoT device [93]. M-ID3 and M-ID4 are methods that detect DER botnet devices (e.g., [94]) and DER worm devices communicating with the smart inverter, respectively. MR1 refers to a fast recovery strategy for a malware-infected smart inverter.…”
Section: B Malware Defense (Attacks #2-#6)mentioning
confidence: 99%