1,655 Hits in 3.7 sec

Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops

Victor Benjamin, Weifeng Li, Thomas Holt, Hsinchun Chen
2015 2015 IEEE International Conference on Intelligence and Security Informatics (ISI)  
Results suggest that hacker communities can be analyzed to aid in cyber threat detection, thus providing promising direction for future work.  ...  Thus, we are interested in developing an automated methodology for identifying tangible and verifiable evidence of potential threats within hacker forums, IRC channels, and carding shops.  ...  Hackers commonly use IRC for real-time communication, as forums are more slow-paced.  ... 
doi:10.1109/isi.2015.7165944 dblp:conf/isi/BenjaminLHC15 fatcat:qzil5do2afch7o35rrqgqdaw5m


Anchit Bijalwan, Vijender Kumar Solanki, Emmanuel Shubhakar Pilli
2018 Network Protocols and Algorithms  
This paper enlightens the novel summary of previous survey including life cycle, classification, framework, detection, analysis and the challenges for botnet forensics.  ...  The available observations can be utilized in future also to prevent a potential threat to network security.  ...  DNS based technique allow real time detection.  ... 
doi:10.5296/npa.v10i2.13144 fatcat:4jslahx72nhobnabo25scj3yzi

An Advanced Method for Detection of Botnet Using Intrusion Detection System

Alan Saji
2021 International Journal for Research in Applied Science and Engineering Technology  
A botnet, especially with remote-controlled bots that offers a platform for many cyber threats.  ...  The IDS (PI-IDS) check for payload detects energetic tries to test the user's statistics gram protocol (UDP) and transmission manage protocol (TCP) comparisons with acknowledged attacks but the PI-IDS  ...  This method can be developed to detect real-time detection quickly with a high degree of precision.  ... 
doi:10.22214/ijraset.2021.37945 fatcat:qaekwelnvjcczd4plowbv3qmwq

Review of Peer-to-Peer Botnets and Detection Mechanisms [article]

Khoh Choon Hwa, Selvakumar Manickam, Mahmood A. Al-Shareeda
2022 arXiv   pre-print
According to a press release from 2019 Cisco and Cybersecurity Ventures, Cisco stopped seven trillion threats in 2018, or 20 billion threats every day, on behalf of its clients.  ...  As a result, this study will explore various P2P botnet detection algorithms by outlining their essential characteristics, advantages and disadvantages, obstacles, and future research.  ...  Furthermore, the majority of detection techniques rely on offline analysis, grouping, and classification, and as a result, do not take into account the needs of real-time detection.  ... 
arXiv:2207.12937v1 fatcat:75b742gtvzfeleyestrrklvgb4

A Collaborative Approach to Botnet Protection [chapter]

Matija Stevanovic, Kasper Revsbech, Jens Myrup Pedersen, Robin Sharp, Christian Damsgaard Jensen
2012 Lecture Notes in Computer Science  
Nor can this technique provide real-time detection.  ...  The approach provides a real-time detection framework which has the ability to detect botnets even before a cyber-attack occurs.  ... 
doi:10.1007/978-3-642-32498-7_47 fatcat:vddoswvidrhavgfabfimppb4eq

Machine Learning-Based Botnet Detection in Software-Defined Network: A Systematic Review

Khlood Shinan, Khalid Alsubhi, Ahmed Alzahrani, Muhammad Usman Ashraf
2021 Symmetry  
For many organizations, a botnet-assisted attack is a terrifying threat that can cause financial losses and leave global victims in its wake.  ...  Cybersecurity represents one of the most serious threats to society, and it costs millions of dollars each year. The most significant question remains: Where do these attacks come from?  ...  Protocols Def Advantages Examples IRC IRC is a protocol of real-time internet text messaging chat; Mainly used in central- ized architecture. 1. Low-latency communication. 2.  ... 
doi:10.3390/sym13050866 fatcat:fw7k3xxwdvdb3fa2ch6hvbywwe

SLINGbot: A System for Live Investigation of Next Generation Botnets

Alden W. Jackson, David Lapsley, Christine Jones, Mudge Zatko, Chaos Golubitsky, W. Timothy Strayer
2009 2009 Cybersecurity Applications & Technology Conference for Homeland Security  
There is an urgent need for a pro-active approach to botnet detection and mitigation that will enable computer network defenders to characterize emerging and future botnet threats and design effective  ...  defense techniques before these threats materialize.  ...  Botnets are evolving at such a rapid rate that detection techniques are obsolete by the time they are deployed.  ... 
doi:10.1109/catch.2009.26 fatcat:nttdumav6jggxm7vyhuk5qceke

BotNet Detection: Enhancing Analysis by Using Data Mining Techniques [chapter]

Erdem Alparslan, Adem Karahoca, Dilek Karahoc
2012 Advances in Data Mining Knowledge Discovery and Applications  
Hence, this methodology is also comfortable for real time analysis.  ...  However the sustainability of the network can be monitored in real time by flow-based analysis.  ... 
doi:10.5772/48804 fatcat:b4h7mwi5wvh7pjun4l3g4psrqm

A Framework on botnet detection and forensics

Harvinder Singh, Anchit Bijalwan
2017 Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering  
There are so many types of threats and challenges that are faced by the internet users. Out of all the threats faced by internet users, botnets are at the top most position.  ...  Because of these prodigious threats botnets are the rising area of research.  ...  Authors also stress upon the statement that, to apply or test the mitigation efforts, detection must be performed in real time.  ... 
doi:10.15439/2017r28 dblp:conf/rice/SinghB17 fatcat:meoplubz6vfmjgwog6snq6kxtq

Active Botnet Probing to Identify Obscure Command and Control Channels

Guofei Gu, Vinod Yegneswaran, Phillip Porras, Jennifer Stoll, Wenke Lee
2009 2009 Annual Computer Security Applications Conference  
times.  ...  Experimental results on multiple real-world IRC bots demonstrate that our proposed active methods can successfully identify obscure and obfuscated botnet communications.  ...  Note, in real-world IRC based botnets, we observe that most of the commands are in IRC TOPIC messages, because the botmasters are not online all the time.  ... 
doi:10.1109/acsac.2009.30 dblp:conf/acsac/GuYPSL09 fatcat:5legftv2abbcvpgku6za7ub5lu

Botnet Detection by Monitoring Similar Communication Patterns [article]

Hossein Rouhani Zeidanloo, Azizah Bt Abdul Manaf
2010 arXiv   pre-print
Then we proposed a new general detection framework which currently focuses on P2P based and IRC based Botnets. This proposed framework is based on definition of Botnets.  ...  Most of the existing Botnet detection approaches concentrate only on particular Botnet command and control (C&C) protocols (e.g., IRC,HTTP) and structures (e.g., centralized), and can become ineffective  ...  There are two central points that forward commands and data between the BotMaster and his Bots. 1) Botnet based on IRC : The IRC is a form of real-time Internet text messaging or synchronous conferencing  ... 
arXiv:1004.1232v1 fatcat:sgg2kaypojhebowrjzbfxmzxg4

New Approach for Detection of IRC and P2P Botnets

Hossein Rouhani Zeidanloo, Farhoud Hosseinpour, Farhood Farid Etemad
2010 International Journal of Computer and Electrical Engineering  
Our framework in IRC part is based on calculating Delay Time (Td) which is a time frame between sending IRC NICK command and IRC JOIN command.  ...  In this paper, we proposed a new general detection framework which currently focuses on P2P based and IRC based Botnets.  ...  Our framework in IRC part is based on calculating Delay time(Td) which is a time frame between sending IRC NICK command and IRC JOIN command.  ... 
doi:10.7763/ijcee.2010.v2.271 fatcat:u7zkzaelcfdj7l6kyqd4pqvzzy

Flooding Attacks to Internet Threat Monitors(ITM): Modeling and Counter Measures Using Botnet and Honeypots

K. Munivara Prasad, A. Rama Mohan Reddy, M. Ganesh Karthik
2011 International Journal of Computer Science & Information Technology (IJCSIT)  
The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoring system whose goal is to measure, detect, characterize, and track threats such as distribute denial of service(DDoS) attacks  ...  Based on this model we generalize the flooding attacks and propose an effective attack detection using Honeypots.  ...  In [1] introduced the information theoretic framework to evaluate the effectiveness of the localization attacks by using the minimum time length required by an attacker to achieve a predefined detection  ... 
doi:10.5121/ijcsit.2011.3612 fatcat:p22pidzlszar3koyc2tegi6sqm

Botnet Command Detection using Virtual Honeynet

JS Bhatia, Sehgal, Sanjeev Kumar
2011 International journal of network security and its applications  
With the view of affect made by the botnet, we propose an approach using Virtual Honeynet data collection mechanisms to detect IRC and HTTP based botnet Command signatures.  ...  Internet attacks are growing with time, threats are increasing to disable infrastructure to those that also target peoples and organization, these increasing large attacks, and the new class of attacks  ...  Our algorithm is able to detect IRC and HTTP based C & C server.  ... 
doi:10.5121/ijnsa.2011.3514 fatcat:dtvbdjeaevh6dpf47cdxo7lcvq

Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures

Jing Liu, Yang Xiao, Kaveh Ghaboosi, Hongmei Deng, Jingyuan Zhang
2009 EURASIP Journal on Wireless Communications and Networking  
Several related attacks, detection, tracing, and countermeasures, are then introduced, followed by recent research work and possible future challenges.  ...  One interesting issue about anomaly detection is the time efficiency.  ...  For the sake of reducing botnet's threat efficiently, scholars and researchers emphasize their studies on detecting IRC-based botnets.  ... 
doi:10.1155/2009/692654 fatcat:maoyijgo6bafldnfl2xzxnybum
« Previous Showing results 1 — 15 out of 1,655 results