BoTShark: A Deep Learning Approach for Botnet Traffic Detection

作者: Sajad Homayoun , Marzieh Ahmadzadeh , Sattar Hashemi , Ali Dehghantanha , Raouf Khayami

DOI: 10.1007/978-3-319-73951-9_7

关键词:

摘要: While botnets have been extensively studied, bot malware is constantly advancing and seeking to exploit new attack vectors and circumvent existing measures. Existing intrusion …

参考文章(40)
Vinod Yegneswaran, Guofei Gu, Wenke Lee, Martin Fong, Phillip Porras, BotHunter: detecting malware infection through IDS-driven dialog correlation usenix security symposium. pp. 12- ,(2007)
Christopher M. Bishop, Pattern Recognition and Machine Learning ,(2006)
Michalis Faloutsos, Tina Eliassi-Rad, Xuetao Wei, Huy Hang, Entelecheia: Detecting P2P botnets in their waiting stage 2013 IFIP Networking Conference. pp. 1- 9 ,(2013)
Roberto Perdisci, Guofei Gu, Wenke Lee, Junjie Zhang, BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection usenix security symposium. pp. 139- 154 ,(2008)
Imtithal A.Saeed, Ali Selamat, Ali M. A. Abuagoub, A survey on malware propagation, analysis, and detection International Journal of Computer Applications. ,vol. 67, pp. 25- 31 ,(2013) , 10.5120/11480-7108
Carl Livadas, Robert Walsh, David Lapsley, W. Timothy Strayer, Usilng Machine Learning Technliques to Identify Botnet Traffic local computer networks. pp. 967- 974 ,(2006) , 10.1109/LCN.2006.322210
Sérgio S.C. Silva, Rodrigo M.P. Silva, Raquel C.G. Pinto, Ronaldo M. Salles, Botnets: A survey Computer Networks. ,vol. 57, pp. 378- 403 ,(2013) , 10.1016/J.COMNET.2012.07.021
Hossein Rouhani Zeidanloo, Mohammad Jorjor Zadeh Shooshtari, Payam Vahdani Amoli, M. Safari, Mazdak Zamani, A taxonomy of Botnet detection techniques international conference on computer science and information technology. ,vol. 2, pp. 158- 162 ,(2010) , 10.1109/ICCSIT.2010.5563555
David Zhao, Issa Traore, Bassam Sayed, Wei Lu, Sherif Saad, Ali Ghorbani, Dan Garant, Botnet detection based on traffic behavior analysis and flow intervals Computers & Security. ,vol. 39, pp. 2- 16 ,(2013) , 10.1016/J.COSE.2013.04.007
Mina Sohrabi, Mohammad M. Javidi, Sattar Hashemi, Detecting intrusion transactions in database systems: a novel approach intelligent information systems. ,vol. 42, pp. 619- 644 ,(2014) , 10.1007/S10844-013-0286-Z