Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,423,533 papers from all fields of science
Search
Sign In
Create Free Account
BotHunter
BotHunter is a free utility for Unix, which aims at detecting botnet activity within a network. It does so by analyzing network traffic and comparing…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Botnet
Unix
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Diagnosing bot infections using Bayesian inference
Ayesha Binte Ashfaq
,
Zainab Abaid
,
Maliha Ismail
,
Muhammad Umar Aslam
,
A. Syed
,
S. A. Khayam
Journal of Computer Virology and Hacking…
2018
Corpus ID: 3464076
Prior research in botnet detection has used the bot lifecycle to build detection systems. These systems, however, use rule-based…
Expand
2016
2016
Sub-Botnet Cordination Using Tokens in a Switched Network
Brandon Shirley
,
C. Mano
2016
Corpus ID: 8850553
—Botnets have evolved to incorporate peer-to-peer communication for the purpose of better hiding the administrative source of the…
Expand
2016
2016
Diagnosing bot infections using Bayesian inference
A. Ashfaq
,
Zainab Abaid
,
Maliha Ismail
,
Muhammad Umar Aslam
,
A. Syed
,
S. A. Khayam
Journal of Computer Virology and Hacking…
2016
Corpus ID: 255165391
Prior research in botnet detection has used the bot lifecycle to build detection systems. These systems, however, use rule-based…
Expand
2015
2015
Early detection of high entropy traffic
Han Zhang
,
C. Papadopoulos
IEEE Conference on Communications and Network…
2015
Corpus ID: 14406741
High entropy (HE) traffic may result from encrypted traffic such as C&C botnet communication. Such traffic also tends to be…
Expand
2014
2014
NICE : Network Intrusion detection and Counter measure selection in virtual network systems
2014
Corpus ID: 267882210
The area of detecting malicious behavious has been well explored in the following approaches. SPOT focuses on the detection of…
Expand
2012
2012
NetGator: Malware Detection Using Program Interactive Challenges
Brian Schulte
,
Haris Andrianakis
,
Kun Sun
,
A. Stavrou
International Conference on Detection of…
2012
Corpus ID: 17111193
Internet-borne threats have evolved from easy to detect denial of service attacks to zero-day exploits used for targeted…
Expand
2012
2012
A Study of Botnets: Systemization of Knowledge and Correlation-based Detection
S. Bano
2012
Corpus ID: 63891913
Botnets have been the cause of some of the gravest cyberthreats in recent times. Despite research and commercial efforts to curb…
Expand
2009
2009
Malware Characterization through Alert Pattern Discovery
Steven Cheung
,
A. Valdes
USENIX Workshop on Large-Scale Exploits and…
2009
Corpus ID: 17326318
We present a novel alert correlation approach based on the factor analysis statistical technique for malware characterization…
Expand
2009
2009
Directions in Network-Based Security Monitoring
Phillip A. Porras
IEEE Security & Privacy Magazine
2009
Corpus ID: 16263035
This article outlines some recently emerging research in network-based malicious software detection. The author discusses…
Expand
2008
2008
Next-Generation Botnet Detection and Response
Wenke Lee
2008
Corpus ID: 61362623
Abstract : In this project, we developed dynamic DNS monitoring heuristics to identify domains used for botnet command and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE