2016 International Conference on Inventive Computation Technologies (ICICT) 2016
DOI: 10.1109/inventive.2016.7830080
|View full text |Cite
|
Sign up to set email alerts
|

Botnet and botnet detection techniques in cyber realm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(18 citation statements)
references
References 8 publications
0
15
0
Order By: Relevance
“…We analyze the similarity of network traffic to detect bots of the botnet. It is commonly known that the communication of most botnets is based on Transmission Control Protocol (TCP) [2], such as Waledac botnet [3], storm botnet [4], Conficker botnet [10], and Zeus botnet [9]. erefore, the research of our method mainly focuses on TCP flows.…”
Section: Detection Framework and Implementationmentioning
confidence: 99%
See 2 more Smart Citations
“…We analyze the similarity of network traffic to detect bots of the botnet. It is commonly known that the communication of most botnets is based on Transmission Control Protocol (TCP) [2], such as Waledac botnet [3], storm botnet [4], Conficker botnet [10], and Zeus botnet [9]. erefore, the research of our method mainly focuses on TCP flows.…”
Section: Detection Framework and Implementationmentioning
confidence: 99%
“…Suppose there are two flows F i and F j , R(F i , F j ) refers to the communication relationship between F i and F j , as defined in (2). e communication relationship indicates whether the two flows have the same mapping of source IP address or destination IP address.…”
Section: Bot Detection Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…Covers only generalised botnet types and few specific recent types, such as cloud botnets and social botnets ( [7]) or covers P2P botnets only ( [21]). ( [7]-25 references from 2015-2015) ( [7]- 36,[2005][2006][2007][2008][2009][2010][2011][2012][2013] Covers more kinds of botnet types such as IoT botnets, mobile botnets, VANET-based botnets and their related challenges and trends.…”
Section: Paper Main Contribution and Reference Metricsmentioning
confidence: 99%
“…Other surveys and detection comparisons, such as [17,21,[24][25][26][27][33][34][35][36], also focus on detection and mitigation mechanisms. Common among them is that they primarily focus on detection techniques and comparing the effectiveness of the techniques in limited scenarios.…”
Section: Paper Main Contribution and Reference Metricsmentioning
confidence: 99%