Skip to main content
Botnets continue to be an active threat against firms or companies and individuals worldwide. Previous research regarding botnets has unveiled information on how the system and their stakeholders operate, but an insight on the economic... more
    • by  and +1
    •   3  
      Economics of SecurityNetwork SecurityBotnets
In recent times, organisations in a variety of businesses, such as healthcare, education, and others, have been using the Internet of Things (IoT) to produce more competent and improved services. The widespread use of IoT devices makes... more
    • by  and +1
    •   2  
      Deep LearningBotnets
The proliferation of malicious Command and Control (C&C) servers or botnets is a very big security issue in the Internet today. Triggering malware can be found in most known, popular and visited websites. Any user who is tricked in... more
    • by 
    •   4  
      EngineeringInformation SecurityIntrusion Detection SystemsBotnets
    • by 
    •   13  
      Computer ScienceMachine LearningData MiningComputational Intelligence
With the raise in practice of Internet, in social, personal, commercial and other aspects of life, the cybercrime is as well escalating at an alarming rate. Such usage of Internet in diversified areas also augmented the illegal... more
    • by 
    •   9  
      Computer ScienceForensicsComputer ForensicsNetwork Security
Among various cyber threats, a DDoS attack is one of the major Internet threats that can affect anyone and even cause tremendous financial damage to organization that uses cloud-based services, while the mitigation of this threat can be... more
    • by 
    •   48  
      Information SystemsComputer Security And ReliabilityInformation ScienceInformation Technology
The paper provides an overview of information distortions in social media, purposely created by political and business circles. Mechanisms of fake accounts, social media bots and virtual identities creation are analyzed... more
    • by 
    •   6  
      Social MediaVerification and ValidationBotnetsJournalism And Mass communication
... potential malware, and the number of such websites has increased by around 190,0000 since 2008 (see Google's Safe Browsing ... We used the Windows command Ipconfig/displaydns to display the contents of the DNS resolver cache... more
    • by 
    •   10  
      EngineeringSociologyInformation SecurityTechnology and Society
The results of botnet detection methods are usually presented without any comparison. Although it is generally accepted that more comparisons with third-party methods may help to improve the area, few papers could do it. Among the factors... more
    • by 
    •   8  
      Computer ScienceMachine LearningNetwork SecurityComputer Networks
The study designs an approach that takes advantage of platforms that allows bots to interact with its users using Instant Messaging .The proposed system models a botnet that enables bidirectional flow of communication between the... more
    • by 
    • Botnets
    • by 
    •   6  
      Computer ScienceInformation SecurityComputer SecuritySurvey
    • by  and +1
    •   6  
      Computer ScienceSoftware EngineeringNetwork SecurityComputer Security
    • by  and +1
    •   8  
      SociologyInformation SecurityTechnology and SocietySocial Software
Challenges for detection of botnet for forensic investigation is crucial because new models of botnet using different techniques are emerging everyday by lurking attackers in a deep web. Locating c&c servers of a botnet through usual... more
    • by 
    •   17  
      Information SystemsComputer ScienceInformation ScienceInformation Technology
— The use of Internet and its related services is increasing day by day. Many million people everyday surf net and use it for various reasons. With so much use of internet, the threats related to security are the major concern of today.... more
    • by 
    •   5  
      Malware AnalysisBotnetsSpam FilteringIRC Server
    • by 
    •   13  
      Cyber crimeRussiaEthical HackingSupply Chian Management
Android is increasingly being targeted by malware since it has become the most popular mobile operating system worldwide. Evasive malware families, such as Chamois, designed to turn Android devices into bots that form part of a larger... more
    • by  and +2
    •   15  
      Machine LearningAndroidMalwareDeep Learning
Este libro nos presenta aspectos legales y técnicos del Internet. Abarca diversos temas que a primera vista parecieran ser para un público especializado, como lo son los abogados e ingenieros, pero la realidad es que siendo el Internet la... more
    • by 
    •   19  
      The InternetDerechos HumanosDerecho e InformáticaBotnets
This article offers a reading of internet-based activism or 'hacktivism' as a phenomenon that cannot be confined to the instrumental use of information technologies. It focuses on a subset of hacktivism – the distributed-denial-of-service... more
    • by 
    •   6  
      Gilbert SimondonHacktivismGilles Deleuze and Felix GuattariAnonymous
The popularity of IoT smart things is rising, due to the automation they provide and its effects on productivity. However, it has been proven that IoT devices are vulnerable to both well established and new IoT-specific attack vectors. In... more
    • by  and +1
    •   5  
      Network ForensicsParticle Swarm OptimizationDeep LearningBotnets
To enable more effective mitigation of Android botnets, image-based detection approaches offer great promise. Such image-based or visualization methods provide detection solutions that are less reliant on hand-engineered features which... more
    • by 
    •   10  
      Computer ScienceImage ProcessingMachine LearningComputer Security
JAKU TARGETS SPECIFIC VICTIMS What makes JAKU unique is that within the noise of thousands of botnet victims, it targets and tracks a small number of specific individuals. These individuals include members of International... more
    • by  and +1
    •   2  
      Cyber SecurityBotnets
    • by 
    •   5  
      EngineeringTechnologyComputer NetworksCryptanalysis
    • by 
    •   4  
      Computer ScienceInformation SecurityPeer-to-PeerBotnets
Botnets have evolved to become one of the most serious threats to the Internet and there is substantial research on both botnets and botnet detection techniques. This analysis reviewed the history of botnets and botnet detection... more
    • by 
    •   3  
      BotnetsSNORT IDS NetworkDDOS Attack
Botnets, the groups of illegally controlled infected devices on the Internet have had a history of two decades already. This history shows an evolution of the infection techniques, the scope of the target devices, and their usage. Thus,... more
    • by 
    •   4  
      Information SecurityNetwork scienceCyber SecurityBotnets
–The Spam Emails are regularly causing huge losses to business on a regular basis. The Spam filtering is an automated technique to identity SPAM and HAM (Non-Spam). The Web Spam filters can be categorized as: Content based spam filters... more
    • by 
    •   22  
      SPAMBotnet attacksBotnetsAnti spam
    • by 
    •   4  
      Computer ScienceComputer NetworksDDoSBotnets
There is a lack of clarity within the social media domain about the number of discrete participants. Influence and measurement within new media is skewed towards the biggest numbers, resulting in fake tweets, sock puppets and a range of... more
    • by  and +1
    •   8  
      TwitterDeceptionBotnetsNew Media, Social Network Analysis, e-research, Link analysis, Social Network Sites, Twitter, Facebook, Political Communication
Mobile IP technology considers as one of the buzzwords in world of wireless technology. Nowadays, a lot of Internet applications depend on this technology to deploy their services like VOIP, VANET and so on. However, the main goal of this... more
    • by  and +1
    •   3  
      Network SecurityComputer NetworksBotnets
Malware create a seriously problem to the infected computer. People was believe that installing antivirus can mitigate the computer being infected. Unfortunately, malware designer actively create botnet being hide from the antivirus. In... more
    • by 
    •   4  
      Malware AnalysisBotnetsBotnet Detection AlgorithmsMalware Reverse Engineering
Data mining is an interdisciplinary subfield of computer science involving methods at the intersection of artificial intelligence, machine learning and statistics. One of the data mining tasks is anomaly detection which is the analysis of... more
    • by 
    •   6  
      Data MiningNetwork SecurityAnomaly DetectionEntropy
    • by 
    •   7  
      Computer ScienceMachine LearningData MiningBotnets
    • by 
    •   171  
      HistoryCultural HistoryEconomic HistorySociology
Abstract — The raised significant evolution of the Internet next to the development of the high prevalence of computers, smart phones and the Internet on a large scale in most of the trends of life, but this use leads to network attacks.... more
    • by 
    •   18  
      Information SystemsComputer ScienceInformation ScienceInformation Technology
Passwords make our lives easier and secure. It protects our valuable private information. So, this acts as a blessing in our life. But every coin has two sides. This blessing can turn into a threat because passwords are being hacked by... more
    • by 
    •   5  
      Distributed ComputingCryptographyHash FunctionsBotnets
During the last decade, botnet emerged as one of the most serious malware which possess a serious threat to the Internet. Due to significant research effort in this domain there are many different detection methods based on diverse... more
    • by 
    •   4  
      BotnetsBotnetBotnet Detection AlgorithmsBotnet Detection
One of the most possible vulnerabilities to data available over network can be a botnet attack which can cause significant amount of data loss. A botnet attack is a type of malicious attack that utilizes a series of connected computers to... more
    • by 
    •   6  
      P2PBotnetsBOTFlows
Cloud forensics has become an inexorable and a transformative discipline in the modern world. The need to share a pool of resources and to extract digital evidence from the same distributed resources to be presented in a... more
    • by 
    •   4  
      Digital ForensicsBotnetsBotnetCloud Security
martphones are becoming a vehicle to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from... more
    • by 
    •   18  
      Mobile LearningMachine LearningData MiningSocial Networking
    • by 
    •   15  
      Web DesignComputer NetworksWeb DevelopmentInternet Security
    • by 
    •   4  
      Case StudyCommand and ControlBotnetsPeer to Peer
    • by 
    •   4  
      BotnetsBotnetHTTP BotsFalse Alarm Reduction
Internet, the largest available tool for information, communication and commerce has resulted in globalisation, while on the other hand; it has resulted in a large number of criminal activities and cybercrimes for financial gains. Botnets... more
    • by 
    •   7  
      Computer ScienceInformation SecurityBotnetsBotnet
—The utilization of Internet on domestic and corporate front has been increasing at drastic rate. Each organization and enterprise exploits the internet to its fullest extent based on its requirements. In almost all areas, internet is... more
    • by 
    •   2  
      BotnetsDDoS Botnet Detection
    • by 
    •   4  
      Case StudyCommand and ControlBotnetsPeer to Peer
    • by 
    •   28  
      Distributed ComputingNetwork SecurityMarkov ProcessesQueueing theory
    • by 
    •   4  
      BotnetsElectronic mailIP networksData Format
With the raise in practice of Internet, in social, personal, commercial and other aspects of life, the cybercrime is as well escalating at an alarming rate. Such usage of Internet in diversified areas also augmented the illegal... more
    • by 
    •   9  
      Computer ScienceForensicsComputer ForensicsNetwork Security
    • by 
    •   7  
      Computer ScienceInformation TechnologyComputer SecurityBotnets