BotHunter

BotHunter is a free utility for Unix, which aims at detecting botnet activity within a network. It does so by analyzing network traffic and comparing… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2007-2016
02420072016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Encrypted botnets have seen an increasing use in recent years. To enable research in detecting encrypted botnets researchers need… (More)
  • figure 1
  • table I
  • figure 3
  • figure 2
  • figure 4
Is this relevant?
Highly Cited
2014
Highly Cited
2014
The results of botnet detection methods are usually presented without any comparison. Although it is generally accepted that more… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2014
2014
Botnets, which are networks of compromised machines under the control of a single malicious entity, are a serious threat to… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
Is this relevant?
2014
2014
  • 2014
The area of detecting malicious behavious has been well explored in the following approaches. SPOT focuses on the detection of… (More)
  • figure 9
Is this relevant?
2013
2013
Bot detection methods that rely on deep packet inspection (DPI) can be foiled by encryption. Encryption, however, increases… (More)
  • table III
  • table I
  • table II
  • table IV
  • figure 1
Is this relevant?
2013
2013
Botnets are considered one of the most dangerous and serious security threats facing the networks and the Internet. Comparing… (More)
Is this relevant?
2012
2012
We propose a new, active scheme for fast and reliable detection of P2P malware by exploiting the enemies' strength against them… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
2009
2009
This article outlines some recently emerging research in network-based malicious software detection. The author discusses… (More)
  • figure 1
Is this relevant?
2009
2009
We present a novel alert correlation approach based on the factor analysis statistical technique for malware characterization… (More)
  • table 1
  • table 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We present a new kind of network perimeter monitoring strategy, which focuses on recognizing the infection and coordination… (More)
Is this relevant?