Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,276,763 papers from all fields of science
Search
Sign In
Create Free Account
BotHunter
BotHunter is a free utility for Unix, which aims at detecting botnet activity within a network. It does so by analyzing network traffic and comparing…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Botnet
Unix
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
How to choose from different botnet detection systems?
Fariba Haddadi
,
Duong-Tien Phan
,
N. Zincir-Heywood
IEEE/IFIP Network Operations and Management…
2016
Corpus ID: 18172623
Given that botnets represent one of the most aggressive threats against cybersecurity, various detection approaches have been…
Expand
2016
2016
Sub-Botnet Cordination Using Tokens in a Switched Network
Brandon Shirley
,
C. Mano
2016
Corpus ID: 8850553
—Botnets have evolved to incorporate peer-to-peer communication for the purpose of better hiding the administrative source of the…
Expand
2015
2015
BotFlex: A community-driven tool for botnet detection
Sheharbano Khattak
,
Zaafar Ahmed
,
A. Syed
,
S. A. Khayam
Journal of Network and Computer Applications
2015
Corpus ID: 267790641
2015
2015
On the Effectiveness of Different Botnet Detection Approaches
Fariba Haddadi
,
Duc Le Cong
,
Laura Porter
,
Nur Zincir-Heywood
Information Security Practice and Experience
2015
Corpus ID: 32926832
Botnets represent one of the most significant threats against cyber security. They employ different techniques, topologies and…
Expand
2014
2014
NICE : Network Intrusion detection and Counter measure selection in virtual network systems
2014
Corpus ID: 267882210
The area of detecting malicious behavious has been well explored in the following approaches. SPOT focuses on the detection of…
Expand
2013
2013
Detecting encrypted botnet traffic
Han Zhang
,
C. Papadopoulos
,
D. Massey
Proceedings IEEE INFOCOM
2013
Corpus ID: 5932044
Bot detection methods that rely on deep packet inspection (DPI) can be foiled by encryption. Encryption, however, increases…
Expand
2012
2012
NetGator: Malware Detection Using Program Interactive Challenges
Brian Schulte
,
Haris Andrianakis
,
Kun Sun
,
A. Stavrou
International Conference on Detection of…
2012
Corpus ID: 17111193
Internet-borne threats have evolved from easy to detect denial of service attacks to zero-day exploits used for targeted…
Expand
Highly Cited
2010
Highly Cited
2010
Botnet Detection by Monitoring Similar Communication Patterns
Hossein Rouhani Zeidanloo
,
A. Manaf
arXiv.org
2010
Corpus ID: 7578035
Botnet is most widespread and occurs commonly in today's cyber attacks, resulting in serious threats to our network assets and…
Expand
2009
2009
Malware Characterization through Alert Pattern Discovery
Steven Cheung
,
A. Valdes
USENIX Workshop on Large-Scale Exploits and…
2009
Corpus ID: 17326318
We present a novel alert correlation approach based on the factor analysis statistical technique for malware characterization…
Expand
2008
2008
A Model for Covert Botnet Communication in a Private Subnet
Brandon Shirley
,
C. Mano
Networking
2008
Corpus ID: 14744154
Recently, botnets utilizing peer-to-peer style communication infrastructures have been discovered, requiring new approaches to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE