2,681 Hits in 4.4 sec

Analysis of Attacker Behavior in Compromised Hosts During Command and Control [article]

Farhan Sadique, Shamik Sengupta
2021 arXiv   pre-print
Current works, however, focus solely on analyzing network traffic from and to the bots.  ...  An automated and proactive approach to detect and block botnet hosts will immensely benefit the industry.  ...  There is extensive research on behavioral analysis of botnet. Intrusion detection systems (IDS) [6] use network signatures to detect bots.  ... 
arXiv:2106.04720v1 fatcat:f4nktiztsnf65p5khfmgvgljce

Modeling and Analyzing Attacker Behavior in IoT Botnet using Temporal Convolution Network (TCN) [article]

Farhan Sadique, Shamik Sengupta
2021 arXiv   pre-print
Previous works, however, focus solely on anomalies in network traffic to detect bots and botnet.  ...  An automated and proactive approach to detect and block botnet hosts will immensely benefit the industry.  ...  We have integrated multiple sources of threat data including network traffic, file downloads and shell commands.  ... 
arXiv:2108.12479v1 fatcat:ryr5cqciq5eu5mtyy72cutkxlm

Understanding Web Archiving Services and Their (Mis)Use on Social Media [article]

Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini
2018 arXiv   pre-print
In this paper, we present a large-scale analysis of Web archiving services and their use on social media, shedding light on the actors involved in this ecosystem, the content that gets archived, and how  ...  Among these, the Wayback Machine has been proactively archiving, since 2001, versions of a large number of Web pages, while newer services like allow users to create on-demand snapshots of specific  ...  This work reflects only the authors' views and the Commission are not responsible for any use that may be made of the information it contains.  ... 
arXiv:1801.10396v2 fatcat:tyd4qmi7efdetp36hofx7wlrxm

Keeping An Eye On Botnets In 5G Networks: Detection And Mitigation By Nfv And Sdn Apps

Manuel Gil Pérez, Alberto Huertas Celdrán, Gregorio Martínez Pérez, Giacomo Bernini, Pietro G. Giardina, Jose Alcaraz Calero, Qi Wang, Konstantinos Koutsopoulos, Pedro Neves
2017 Zenodo  
The paper at hand presents the current demonstration of the 5G-PPP SELFNET Self-Protection use case, which strives to detect and mitigate botnets combining Network Functions Virtualization (NFV) and Software-Defined  ...  Current cyber-threats are also expected to produce disruption to 5G networks, among which we can highlight botnets as one of the most powerful ones subverting communication links today.  ...  Software Defined Networks), and by a Séneca Foundation grant within the Human Resources Researching Training Program 2014 and the European Commission (FEDER/ERDF).  ... 
doi:10.5281/zenodo.1491698 fatcat:zkfkt4u2cneadlbtjr3muwylle

Communication Behaviour-Based Big Data Application to Classify and Detect HTTP Automated Software

Manh Cong Tran, Yasuhiro Nakamura
2016 Journal of Electrical and Computer Engineering  
This raises the demand for analyzing HTTP autoware communication behaviour to detect and classify malicious and normal activities via HTTP traffic.  ...  Hence, in this paper, based on many studies and analysis of the autoware communication behaviour through access graph, a new method to detect and classify HTTP autoware communication at network level is  ...  These types of AV software run on end-user systems and employ signaturebased detection to identify variants of known malware.  ... 
doi:10.1155/2016/2017373 fatcat:qgizlfyx6jfetiuqihhnyhsyoa

An Analysis of the iKee.B iPhone Botnet [chapter]

Phillip Porras, Hassen Saïdi, Vinod Yegneswaran
2010 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
We present an analysis of the iKee.B (duh) Apple iPhone bot client, captured on November 25, 2009.  ...  The iKee bot is one of the latest offerings in smartphone malware, in this case targeting jailbroken iPhones.  ...  compresses all SMS message on the local iPhone into a single archive.  ... 
doi:10.1007/978-3-642-17502-2_12 fatcat:woym4yywirgfpg6tcszd23bzse


Simon Delamare, Gilles Fedak, Derrick Kondo, Oleg Lodygensky
2012 Proceedings of the 21st international symposium on High-Performance Parallel and Distributed Computing - HPDC '12  
SpeQuloS monitors the execution of the BoT on the BE-DCIs, and dynamically supplies fast and reliable Cloud resources when the critical part of the BoT is executed.  ...  In this paper, we present the SpeQuloS service which enhances the QoS of BoT applications executed on BE-DCIs by reducing the execution time, improving its stability, and reporting to users a predicted  ...  Acknowledgment Authors would like to thank Peter Kacsuk, Jozsef Kovacs, Michela Taufer, Trilce Estrada and Kate Keahey for their insightful comments and suggestions throughout our research and development  ... 
doi:10.1145/2287076.2287106 dblp:conf/hpdc/DelamareFKL12 fatcat:ptpvqza54ba35h6b5v2klp4h4q

The illiterate editor

Jeffrey Segall, Rachel Greenstadt
2013 Proceedings of the 9th International Symposium on Open Collaboration - WikiSym '13  
As the community depends more heavily on Wikipedia as a source of reliable information, the ability to quickly detect and remove detrimental information becomes increasingly important.  ...  The success of the system in revert detection (0.844 F-measure) as well as its disjoint feature set as compared to existing, content-analyzing vandalism detection systems, shows promise in the synergistic  ...  The IllEdit approach can be viewed as playing the role of a vandalism detection bot in such a system, though it does not focus simply on vandalism.  ... 
doi:10.1145/2491055.2491066 dblp:conf/wikis/SegallG13 fatcat:5cv2jpmscfcinhorcidw6asvmy

Telling Breaking News Stories from Wikipedia with Social Multimedia: A Case Study of the 2014 Winter Olympics [article]

Thomas Steiner
2014 arXiv   pre-print
The proposed system-generalized for all sort of breaking news stories-has been put in production in form of the Twitter bot @mediagalleries, available and archived at  ...  With the ability to watch Wikipedia and Wikidata edits in realtime, the online encyclopedia and the knowledge base have become increasingly used targets of research for the detection of breaking news events  ...  of the Twitter bot @mediagalleries, available and archived at mediagalleries.  ... 
arXiv:1403.4289v1 fatcat:gd2ugomtqzhodpsges745fllnu

Metahistory for (ro)bots: historical knowledge in the artificial intelligence era

Thiago Lima Nicodemo, Oldimar Pontes Cardoso
2019 History Of Historiography  
It is based on a set of experiments involved in the development of a cybernetic historian, dealing with hypotheses such as (ro)bots creating historical narratives and mastering methods of both quantitative  ...  This text offers a theoretical reflection on the effects of the artificial intelligence and digital era on the historian's métier.  ...  Every archival system has a "threshold," a point at which an archive takes physical custody of records.  ... 
doi:10.15848/hh.v12i29.1443 fatcat:whnimgvhfvfofncwzqmrscolve

RPA progression throughout years and futuristic aspects of RPA

2021 Pollack Periodica  
The paper is differentiating robotic process automation bot from artificial intelligence and robotics for the better understanding of lay audience.  ...  taken on repetitive tasks.  ...  There is a chance where the bot after deployment does not work according to the user's demands.  ... 
doi:10.1556/606.2021.00344 fatcat:agtqkapy5vbu3k66pyac5yzymy

Virtual player design using self-learning via competitive coevolutionary algorithms

Mariela Nogueira Collazo, Carlos Cotta, Antonio J. Fernández-Leiva
2014 Natural Computing  
(HoC), that puts pressure on the optimization process and guides the search to increase the strength of the solutions; their differences come from the periodical updating of the HoF on the basis of quality  ...  An empirical study on the performance of a number of variants of the proposed algorithms is described and a statistical analysis of the results is conducted.  ...  Different forms of archives, like the layered Pareto-coevolution archive (de Jong 2004) and the coordinate system archive (Jaskowski and Krawiec 2010) have also been proposed.  ... 
doi:10.1007/s11047-014-9411-3 fatcat:ky3esxaf75hcxnmqms3j7eg36q

Grid Computing Workloads

Alexandru Iosup, Dick Epema
2011 IEEE Internet Computing  
Acknowledgments We thank all the contributors to the Grid Workloads Archive for making their data available.  ...  For most systems, BoT interarrival time, BoT size, and variability of BoT task runtimes are best modeled by a Weibull distribution.  ...  Motivated by high rates of system and middleware failure, 9 high job management overhead, and slow job failure detection, the grid community has built tools and mechanisms for improved execution and coordination  ... 
doi:10.1109/mic.2010.130 fatcat:gch6d6xm6ff4fl6czbafrxlvny

Effective Flow Filtering for Botnet Search Space Reduction

Robert Walsh, David Lapsley, W. Timothy Strayer
2009 2009 Cybersecurity Applications & Technology Conference for Homeland Security  
The use of sophisticated techniques is essential to detect and identify the presence of botnet flows, but these techniques can be expensive in computational and memory resources.  ...  This paper presents our studies and experience in filtering flows to reduce the botnet search space, and shows that a series of simple filters can provide as much as a 37-fold reduction in the flow set  ...  We also thank David Kotz and gratefully acknowledge the use of wireless data from the CRAWDAD archive at Dartmouth College.  ... 
doi:10.1109/catch.2009.22 fatcat:i5f7loz2sjezbiahgiuuf6fr4y

Cloud computing-based forensic analysis for collaborative network security management system

Zhen Chen, Fuye Han, Junwei Cao, Xin Jiang, Shuo Chen
2013 Tsinghua Science and Technology  
Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts.  ...  As a practical example, phishing attack forensic analysis is presented and the required computing and storage resources are evaluated based on real trace data.  ...  The detection algorithm proposed by Refs. [27, 28] is based on behavior features of botnets so the system will generate and distribute rules when botnets are detected in processing.  ... 
doi:10.1109/tst.2013.6449406 fatcat:47qhcgnhjfgzfcbwcqpyvppi3u
« Previous Showing results 1 — 15 out of 2,681 results