2013
DOI: 10.1016/j.cose.2013.04.007
|View full text |Cite
|
Sign up to set email alerts
|

Botnet detection based on traffic behavior analysis and flow intervals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
182
0
6

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 289 publications
(190 citation statements)
references
References 3 publications
0
182
0
6
Order By: Relevance
“…In [103], authors propose an approach to detect botnet activities through traffic behavior analysis. They classify traffic behavior using machine learning strategy.…”
Section: Basis Of Defense Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [103], authors propose an approach to detect botnet activities through traffic behavior analysis. They classify traffic behavior using machine learning strategy.…”
Section: Basis Of Defense Methodsmentioning
confidence: 99%
“…Traffic Behavior Analysis [103] Detecting botnet activities by classifying the traffic behavior using machine learning strategy.…”
Section: Defense Against Ddos Attacks In Wsns and Manetsmentioning
confidence: 99%
“…The suggested structure spots and interprets IRC movement within unprocessed network traffic and, by examining a group of expressive factors, enables an organizer to group and segregate regular activity occurrences from botnet-associated ones. In [12] suggests a novel methodology to spot botnet movement relying on traffic performance investigation by grouping network traffic manners applying machine learning techniques. Traffic activities investigation techniques do not rely upon the packets consignment, which signifies that they can operate with encrypted network interaction protocols.…”
Section: Related Workmentioning
confidence: 99%
“…Network-based detection [18] techniques are based on the analysis of network flow to detect infected machines. Network traffic can be analyzed at the packet and network flow level.…”
Section: Network-based Detectionmentioning
confidence: 99%