Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

BotHunter

BotHunter is a free utility for Unix, which aims at detecting botnet activity within a network. It does so by analyzing network traffic and comparing… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Given that botnets represent one of the most aggressive threats against cybersecurity, various detection approaches have been… Expand
  • table I
  • table II
  • table III
  • table IV
  • table VI
Is this relevant?
2015
2015
Botnets are considered one of the most dangerous and serious security threats facing the networks and the Internet. Comparing… Expand
  • figure 1
  • figure 2
  • table 5
  • table 3
  • table 2
Is this relevant?
2015
2015
Botnets represent one of the most significant threats against cyber security. They employ different techniques, topologies and… Expand
Is this relevant?
Highly Cited
2014
Highly Cited
2014
The results of botnet detection methods are usually presented without any comparison. Although it is generally accepted that more… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2013
2013
Bot detection methods that rely on deep packet inspection (DPI) can be foiled by encryption. Encryption, however, increases… Expand
Is this relevant?
2013
2013
Bot detection methods that rely on deep packet inspection (DPI) can be foiled by encryption. Encryption, however, increases… Expand
  • table III
  • table I
  • table II
  • table IV
  • figure 1
Is this relevant?
2012
2012
Internet-borne threats have evolved from easy to detect denial of service attacks to zero-day exploits used for targeted… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
We present a novel alert correlation approach based on the factor analysis statistical technique for malware characterization… Expand
  • table 1
  • table 2
Is this relevant?
2008
2008
Recently, botnets utilizing peer-to-peer style communication infrastructures have been discovered, requiring new approaches to… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We present a new kind of network perimeter monitoring strategy, which focuses on recognizing the infection and coordination… Expand
  • figure 2
  • figure 3
  • table 1
  • figure 4
  • table 2
Is this relevant?