Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

BotHunter

BotHunter is a free utility for Unix, which aims at detecting botnet activity within a network. It does so by analyzing network traffic and comparing… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Given that botnets represent one of the most aggressive threats against cybersecurity, various detection approaches have been… Expand
  • table I
  • table II
  • table III
  • table IV
  • table VI
2015
2015
Botnets are considered one of the most dangerous and serious security threats facing the networks and the Internet. Comparing… Expand
  • figure 1
  • figure 2
  • table 5
  • table 3
  • table 2
Highly Cited
2014
Highly Cited
2014
The results of botnet detection methods are usually presented without any comparison. Although it is generally accepted that more… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
2013
2013
Bot detection methods that rely on deep packet inspection (DPI) can be foiled by encryption. Encryption, however, increases… Expand
2013
2013
Bot detection methods that rely on deep packet inspection (DPI) can be foiled by encryption. Encryption, however, increases… Expand
  • table III
  • table I
  • table II
  • table IV
  • figure 1
2012
2012
Internet-borne threats have evolved from easy to detect denial of service attacks to zero-day exploits used for targeted… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2010
Highly Cited
2010
Botnet is most widespread and occurs commonly in today's cyber attacks, resulting in serious threats to our network assets and… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 5
  • figure 4
2008
2008
Recently, botnets utilizing peer-to-peer style communication infrastructures have been discovered, requiring new approaches to… Expand
  • figure 1
  • figure 2
2008
2008
Botnets have evolved to incorporate peer-to-peer communication for the purpose of better hiding the administrative source of the… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
2007
Highly Cited
2007
We present a new kind of network perimeter monitoring strategy, which focuses on recognizing the infection and coordination… Expand
  • figure 2
  • figure 3
  • table 1
  • figure 4
  • table 2