Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,772,137 papers from all fields of science
Search
Sign In
Create Free Account
BotHunter
BotHunter is a free utility for Unix, which aims at detecting botnet activity within a network. It does so by analyzing network traffic and comparing…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
2 relations
Botnet
Unix
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
How to choose from different botnet detection systems?
Fariba Haddadi
,
Duong-Tien Phan
,
A. N. Zincir-Heywood
NOMS - IEEE/IFIP Network Operations and…
2016
Corpus ID: 18172623
Given that botnets represent one of the most aggressive threats against cybersecurity, various detection approaches have been…
Expand
2015
2015
BotFlex: A community-driven tool for botnet detection
S. Khattak
,
Zaafar Ahmed
,
A. Syed
,
S. A. Khayam
J. Netw. Comput. Appl.
2015
Corpus ID: 30029035
2015
2015
On the Effectiveness of Different Botnet Detection Approaches
Fariba Haddadi
,
Duc Le Cong
,
Laura Porter
,
A. N. Zincir-Heywood
ISPEC
2015
Corpus ID: 32926832
Botnets represent one of the most significant threats against cyber security. They employ different techniques, topologies and…
Expand
Highly Cited
2014
Highly Cited
2014
An empirical comparison of botnet detection methods
Sebastián García
,
M. Grill
,
Jan Stiborek
,
Alejandro Zunino
Comput. Secur.
2014
Corpus ID: 15623481
2013
2013
Detecting encrypted botnet traffic
Han Zhang
,
C. Papadopoulos
,
D. Massey
Proceedings IEEE INFOCOM
2013
Corpus ID: 5932044
Bot detection methods that rely on deep packet inspection (DPI) can be foiled by encryption. Encryption, however, increases…
Expand
2012
2012
NetGator: Malware Detection Using Program Interactive Challenges
Brian Schulte
,
Haris Andrianakis
,
Kun Sun
,
A. Stavrou
DIMVA
2012
Corpus ID: 17111193
Internet-borne threats have evolved from easy to detect denial of service attacks to zero-day exploits used for targeted…
Expand
Highly Cited
2010
Highly Cited
2010
Botnet Detection by Monitoring Similar Communication Patterns
Hossein Rouhani Zeidanloo
,
A. Manaf
ArXiv
2010
Corpus ID: 7578035
Botnet is most widespread and occurs commonly in today's cyber attacks, resulting in serious threats to our network assets and…
Expand
2008
2008
A Model for Covert Botnet Communication in a Private Subnet
Brandon Shirley
,
C. Mano
Networking
2008
Corpus ID: 14744154
Recently, botnets utilizing peer-to-peer style communication infrastructures have been discovered, requiring new approaches to…
Expand
2008
2008
Sub-Botnet Coordination Using Tokens in a Switched Network
Brandon Shirley
,
C. Mano
IEEE GLOBECOM - IEEE Global Telecommunications…
2008
Corpus ID: 8850553
Botnets have evolved to incorporate peer-to-peer communication for the purpose of better hiding the administrative source of the…
Expand
Highly Cited
2007
Highly Cited
2007
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
G. Gu
,
Phillip A. Porras
,
V. Yegneswaran
,
Martin W. Fong
,
Wenke Lee
USENIX Security Symposium
2007
Corpus ID: 6001716
We present a new kind of network perimeter monitoring strategy, which focuses on recognizing the infection and coordination…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE