[go: up one dir, main page]

García et al., 2014 - Google Patents

Survey on network‐based botnet detection methods

García et al., 2014

View PDF
Document ID
285571720171268476
Author
García S
Zunino A
Campo M
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

Botnets are an important security problem on the Internet. They continuously evolve their structure, protocols and attacks. This survey analyzes and compares the most important efforts carried out in a network‐based detection area. It accomplishes four tasks: first, the …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6232Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
    • G06K9/6251Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on a criterion of topology preservation, e.g. multidimensional scaling, self-organising maps

Similar Documents

Publication Publication Date Title
García et al. Survey on network‐based botnet detection methods
Khraisat et al. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
US11463457B2 (en) Artificial intelligence (AI) based cyber threat analyst to support a cyber security appliance
Oprea et al. Made: Security analytics for enterprise threat detection
Oprea et al. Detection of early-stage enterprise infection by mining large-scale log data
Ring et al. Detection of slow port scans in flow-based network traffic
Ghorbani et al. Network intrusion detection and prevention: concepts and techniques
Stevanovic et al. Machine learning for identifying botnet network traffic
Kumar et al. Intrusion detection systems: a review
Mangino et al. Internet-scale insecurity of consumer internet of things: An empirical measurements perspective
Paulauskas et al. Local outlier factor use for the network flow anomaly detection
Rizvi et al. Application of artificial intelligence to network forensics: Survey, challenges and future directions
Garcıa Identifying, modeling and detecting botnet behaviors in the network
Drašar et al. Similarity as a central approach to flow‐based anomaly detection
Faber et al. Autoencoder-based ids for cloud and mobile devices
Zang et al. Attack scenario reconstruction via fusing heterogeneous threat intelligence
Alavizadeh et al. A survey on threat situation awareness systems: framework, techniques, and insights
Rimmer et al. Open-world network intrusion detection
Kheir et al. Behavioral fine-grained detection and classification of P2P bots
Abaid et al. Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study
Ongun Resilient machine learning methods for cyber-attack detection
Zekrifa Hybrid Intrusion Detection System
Yong et al. Understanding botnet: From mathematical modelling to integrated detection and mitigation framework
Laabid Botnet command & control detection in iot networks
Ramaki et al. Towards event aggregation for reducing the volume of logged events during IKC stages of APT attacks