García et al., 2014 - Google Patents
Survey on network‐based botnet detection methodsGarcía et al., 2014
View PDF- Document ID
- 285571720171268476
- Author
- García S
- Zunino A
- Campo M
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
Botnets are an important security problem on the Internet. They continuously evolve their structure, protocols and attacks. This survey analyzes and compares the most important efforts carried out in a network‐based detection area. It accomplishes four tasks: first, the …
- 238000001514 detection method 0 title abstract description 175
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6251—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on a criterion of topology preservation, e.g. multidimensional scaling, self-organising maps
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| García et al. | Survey on network‐based botnet detection methods | |
| Khraisat et al. | A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges | |
| US11463457B2 (en) | Artificial intelligence (AI) based cyber threat analyst to support a cyber security appliance | |
| Oprea et al. | Made: Security analytics for enterprise threat detection | |
| Oprea et al. | Detection of early-stage enterprise infection by mining large-scale log data | |
| Almutairi et al. | Hybrid botnet detection based on host and network analysis | |
| Ring et al. | Detection of slow port scans in flow-based network traffic | |
| Rizvi et al. | Application of artificial intelligence to network forensics: Survey, challenges and future directions | |
| Ghorbani et al. | Network intrusion detection and prevention: concepts and techniques | |
| Stevanovic et al. | Machine learning for identifying botnet network traffic | |
| Corona et al. | Information fusion for computer security: State of the art and open issues | |
| Mangino et al. | Internet-scale insecurity of consumer internet of things: An empirical measurements perspective | |
| Kumar et al. | Intrusion detection systems: a review | |
| Paulauskas et al. | Local outlier factor use for the network flow anomaly detection | |
| Garcıa | Identifying, modeling and detecting botnet behaviors in the network | |
| Boero et al. | Statistical fingerprint‐based intrusion detection system (SF‐IDS) | |
| Faber et al. | Autoencoder-based ids for cloud and mobile devices | |
| Drašar et al. | Similarity as a central approach to flow‐based anomaly detection | |
| Alavizadeh et al. | A survey on threat situation awareness systems: framework, techniques, and insights | |
| Rimmer et al. | Open-world network intrusion detection | |
| Kheir et al. | Behavioral fine-grained detection and classification of P2P bots | |
| Abaid et al. | Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study | |
| Zekrifa | Hybrid Intrusion Detection System | |
| Ongun | Resilient machine learning methods for cyber-attack detection | |
| Laabid | Botnet command & control detection in iot networks |