García et al., 2014 - Google Patents
Survey on network‐based botnet detection methodsGarcía et al., 2014
View PDF- Document ID
- 285571720171268476
- Author
- García S
- Zunino A
- Campo M
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
Botnets are an important security problem on the Internet. They continuously evolve their structure, protocols and attacks. This survey analyzes and compares the most important efforts carried out in a network‐based detection area. It accomplishes four tasks: first, the …
- 238000001514 detection method 0 title abstract description 175
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6251—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on a criterion of topology preservation, e.g. multidimensional scaling, self-organising maps
Similar Documents
Publication | Publication Date | Title |
---|---|---|
García et al. | Survey on network‐based botnet detection methods | |
Khraisat et al. | A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges | |
US11463457B2 (en) | Artificial intelligence (AI) based cyber threat analyst to support a cyber security appliance | |
Oprea et al. | Made: Security analytics for enterprise threat detection | |
Oprea et al. | Detection of early-stage enterprise infection by mining large-scale log data | |
Ring et al. | Detection of slow port scans in flow-based network traffic | |
Ghorbani et al. | Network intrusion detection and prevention: concepts and techniques | |
Stevanovic et al. | Machine learning for identifying botnet network traffic | |
Kumar et al. | Intrusion detection systems: a review | |
Mangino et al. | Internet-scale insecurity of consumer internet of things: An empirical measurements perspective | |
Paulauskas et al. | Local outlier factor use for the network flow anomaly detection | |
Rizvi et al. | Application of artificial intelligence to network forensics: Survey, challenges and future directions | |
Garcıa | Identifying, modeling and detecting botnet behaviors in the network | |
Drašar et al. | Similarity as a central approach to flow‐based anomaly detection | |
Faber et al. | Autoencoder-based ids for cloud and mobile devices | |
Zang et al. | Attack scenario reconstruction via fusing heterogeneous threat intelligence | |
Alavizadeh et al. | A survey on threat situation awareness systems: framework, techniques, and insights | |
Rimmer et al. | Open-world network intrusion detection | |
Kheir et al. | Behavioral fine-grained detection and classification of P2P bots | |
Abaid et al. | Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study | |
Ongun | Resilient machine learning methods for cyber-attack detection | |
Zekrifa | Hybrid Intrusion Detection System | |
Yong et al. | Understanding botnet: From mathematical modelling to integrated detection and mitigation framework | |
Laabid | Botnet command & control detection in iot networks | |
Ramaki et al. | Towards event aggregation for reducing the volume of logged events during IKC stages of APT attacks |