2016
DOI: 10.1007/s00521-016-2531-1
|View full text |Cite
|
Sign up to set email alerts
|

Fast-flux hunter: a system for filtering online fast-flux botnet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(20 citation statements)
references
References 13 publications
0
20
0
Order By: Relevance
“…e literature [72] proposed a real-time online Fast-Flux botnet filtering system, aiming to improve the detection of unknown "zero-day" online fast-flux botnets. Fast-Flux botnet domain was distinguished from the legal domain in an online mode based on new rules, characteristics, or classes.…”
Section: Fnnmentioning
confidence: 99%
“…e literature [72] proposed a real-time online Fast-Flux botnet filtering system, aiming to improve the detection of unknown "zero-day" online fast-flux botnets. Fast-Flux botnet domain was distinguished from the legal domain in an online mode based on new rules, characteristics, or classes.…”
Section: Fnnmentioning
confidence: 99%
“…Mathematical and data mining techniques were applied on a set of features that are extracted from the monitored traffic in order to achieve near real-time fast flux detection. A system called Fast-flux hunter was proposed in [12]. The system combines supervised and unsupervised online knowledge learning based system for fast flux detection based on features extracted from passive DNS traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Domain-fluxing uses a DGA to generate many domain names and then attempts to communicate with a small section of the generated domains [37]. Bilge et al [8] explains that the use of domain names gives the attackers the flexibility and redundancy of migrating their servers with ease.…”
Section: Domain-flux and Ip-fluxmentioning
confidence: 99%