2023
DOI: 10.1016/j.comnet.2023.109725
|View full text |Cite
|
Sign up to set email alerts
|

Real-time bot infection detection system using DNS fingerprinting and machine-learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 19 publications
0
1
0
Order By: Relevance
“…In the previous research, the botnet activity detection models used classification [1,8,18,24], clustering [25][26][27][28], and similarity. Research by [10,16] used the CTU-13 dataset by combining feature selection methods.…”
Section: Related Workmentioning
confidence: 99%
“…In the previous research, the botnet activity detection models used classification [1,8,18,24], clustering [25][26][27][28], and similarity. Research by [10,16] used the CTU-13 dataset by combining feature selection methods.…”
Section: Related Workmentioning
confidence: 99%
“…Taking into account the fact that the proposed traffic encapsulation system assumes the use of multi-factor authentication modules, two-way IP addresses verification, DNS caching services, as well as intelligent algorithms for predicting traffic consumption, it is proposed to use a decision-making system based on a tree structure [5,6]. This approach involves the use of nonparametric models that use sets of logical rules to predict the result [7].…”
Section: Development Of a Decision-making System Based On A Tree Stru...mentioning
confidence: 99%