2018
DOI: 10.1007/978-3-319-92459-5_31
|View full text |Cite
|
Sign up to set email alerts
|

Self-adaptive System for the Corporate Area Network Resilience in the Presence of Botnet Cyberattacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…Based on the gathered Internet traffic features inherent to cyberattacks, the BotGRABBER system was able to produce the security scenarios according to cyberattacks performed by botnets in order to mitigate the attacks and ensure the network's resilient functioning. The proposed approach used the semi-supervised fuzzy c-means clustering, where the objects of clustering were the feature vectors which elements may indicate the appearance of cyber threats in the corporate area networks [25]. This paper presents the approach for the botnet detection of the low rate DDoS attacks via the BotGRABBER system.…”
Section: Results and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the gathered Internet traffic features inherent to cyberattacks, the BotGRABBER system was able to produce the security scenarios according to cyberattacks performed by botnets in order to mitigate the attacks and ensure the network's resilient functioning. The proposed approach used the semi-supervised fuzzy c-means clustering, where the objects of clustering were the feature vectors which elements may indicate the appearance of cyber threats in the corporate area networks [25]. This paper presents the approach for the botnet detection of the low rate DDoS attacks via the BotGRABBER system.…”
Section: Results and Analysismentioning
confidence: 99%
“…and are clustered and a result of the clustering is the assignment of each feature vector to a cluster, which is corresponding to a given cyberattack. The low-rate DDoS attacks identification based on the traffic self-similarity analysis is the part of botnets detection process performed by a self-adaptive system-BotGRABBER system [25]. It presents the framework for assuring the networks' resilience under the botnets' cyberattacks.…”
Section: The Proposed Methodsmentioning
confidence: 99%
“…Instead of classifying flow clusters in either a botnet flow or normal flow, the algorithm uses multiple clusters for the same traffic and a link algorithm to do the final classification. Self-adapting systems for detecting, clustering and classification of botnets is proposed by Lysenko et al [136], who use a semi-supervised fuzzy c-means clustering technique. The system is also able to double as mitigation as it can reconfigure corporate networks and execute more specific actions such as reducing request timeouts, decreasing allowed HTTP request size and blocking source hostname and IP addresses.…”
Section: Machine Learning and Network-based Detection Mechanismsmentioning
confidence: 99%
“…Very botnet-specific, can introduce additional latency at network edge. [5,84,98,136,176,[201][202][203][204][205]…”
Section: Mitigation Mechanism Advantages Disadvantages Papersmentioning
confidence: 99%
See 1 more Smart Citation