DCA for bot detection

  title={DCA for bot detection},
  author={Yousof Al-Hammadi and Uwe Aickelin and Julie Greensmith},
  journal={2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence)},
Ensuring the security of computers is a non-trivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emerged in the form of networks of hijacked zombie machines used to perform complex distributed attacks such as denial of service and to obtain sensitive data such as password information. These zombie machines are said to be infected with a dasiahotpsila - a malicious piece of software which is installed on a host machine and is… CONTINUE READING
Highly Cited
This paper has 40 citations. REVIEW CITATIONS
Recent Discussions
This paper has been referenced on Twitter 1 time over the past 90 days. VIEW TWEETS


Publications citing this paper.
Showing 1-10 of 29 extracted citations


Publications referenced by this paper.
Showing 1-10 of 14 references

Botnets as a Vehicle for Online Crime

  • N. Ianelli, A. Hackworth
  • CERT Coordination Center”
  • 2005
1 Excerpt

Extrusion Detection: Security Monitoring for Internal Intrusions

  • R. Bejtlich
  • Addison-Wesley Professional
  • 2005
1 Excerpt

Analysis of Internet Relay Chat Usage by DDoS Zombies

  • S. Racine
  • Master’s Thesis. Swiss Federal Institute of…
  • 2004
2 Excerpts

Similar Papers

Loading similar papers…