Filters








1,066 Hits in 9.8 sec

Towards Detection of Botnet Communication through Social Media by Monitoring User Activity [chapter]

Pieter Burghouwt, Marcel Spruit, Henk Sips
2011 Lecture Notes in Computer Science  
Communication with social media that is not assignably caused by human activity, is classified as anomalous.  ...  Botnets react to these measures by using new communication mechanisms that are harder to detect and repress [18] . With the arrival of social media based C&C, there are now 4 major C&C-mechanisms: 1.  ...  This allows for detection of botnet traffic to social media by the absence of user events that could potentially have triggered the traffic.  ... 
doi:10.1007/978-3-642-25560-1_9 fatcat:hstfmb2c3jh4bbw2rwarhgd54m

Boten ELISA: A novel approach for botnet C&C in Online Social Networks

Alberto Compagno, Mauro Conti, Daniele Lain, Giulio Lovisotto, Luigi Vincenzo Mancini
2015 2015 IEEE Conference on Communications and Network Security (CNS)  
In this paper we propose ELISA (Elusive Social Army), a botnet that conceals C&C information using OSNs accounts of unaware users.  ...  We show that several popular social networks can be maliciously exploited to run this type of botnet, and we discuss why current traffic analysis systems cannot detect ELISA.  ...  To become active in the botnet, a bot needs to be used by a victim who interacts with some social networks.  ... 
doi:10.1109/cns.2015.7346813 dblp:conf/cns/CompagnoCLLM15 fatcat:ax53tf4fkfds3ea2i467dpov6y

A Survey on Botnets: Incentives, Evolution, Detection and Current Trends

Simon Nam Thanh Vu, Mads Stege, Peter Issam El-Habr, Jesper Bang, Nicola Dragoni
2021 Future Internet  
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things.  ...  The literature review focuses particularly on the topic of botnet detection and the proposed solutions to mitigate the threat of botnets in system security.  ...  This gives botnet developers more tools and ways to avoid typical detection mechanisms by communicating through seemingly benign social user accounts.  ... 
doi:10.3390/fi13080198 fatcat:5umqenw47ncdxggi4kiotkeag4

The Koobface botnet and the rise of social malware

Kurt Thomas, David M. Nicol
2010 2010 5th International Conference on Malicious and Unwanted Software  
Despite the use of domain blacklisting services by social network operators to filter malicious links, current defenses recognize only 27% of threats and take on average 4 days to respond.  ...  The Koobface botnet in particular has honed its efforts to exploit social network users, leveraging zombies to generate accounts, befriend victims, and to send malware propagation spam.  ...  Using spam histories recovered from both sites, we are able to reconstruct an image of Koobface's activities from November on through February, showing reduced activity by the botnet towards later months  ... 
doi:10.1109/malware.2010.5665793 dblp:conf/malware/ThomasN10 fatcat:qhl32snfrndchb2fibkgobpuoi

Identifying Botnets Intrusion & Prevention – A Review

Lubasi Kakwete Musambo, Melissa K. Chinyemba, Jackson Phiri
2017 Zambia ICT Journal  
This paper reviews three ways in which an intrusion may occur on networks with a focus on botnets and ways in which botnet mitigation may be enhanced.  ...  Systems and networks will be compromised, almost always regardless of what network engineers do.  ...  Phishing: A fraudulent process of collecting sensitive information such as usernames, passwords and credit card details by pretending to be a trustworthy entity (network administrator, social media friend  ... 
doi:10.33260/zictjournal.v1i1.28 fatcat:autjmgshy5cojhm476qtgnlvea

Malware command and control over social media: Towards the server-less infrastructure

Vladimir Radunovic, Mladen Veinovic
2020 Serbian Journal of Electrical Engineering  
In this paper, we identify several emerging trends in the use of social media for C2 communications by providing a review of the existing research, discuss how attackers could combine these trends in the  ...  Increasingly, they hide C2 communications in plain sight, in particular on social media and other cloud-based public services.  ...  In order to detect C2 communications, defenders can look for suspicious behaviour of social media applications on the client side, bogus accounts on social media, and suspicious online content posted through  ... 
doi:10.2298/sjee2003357r fatcat:wnmk2fg3arel3crbzdlowmiziu

Categories Of Botnet: A Survey

D. Seenivasan, K. Shanthi
2014 Zenodo  
Innumerable challenges have been put forth by the botmasters to the researchers in the detection of botnet.  ...  , government organizations and many social networks such as twitter, facebook etc., became the target of the botmasters.  ...  Henceforth, due to these curtailed activities by the developed countries, it is likely that the cybercriminals turn their tyrant face towards developing countries like India.  ... 
doi:10.5281/zenodo.1097400 fatcat:cimxystgjfgg5pslen3vt4b5fa

The next-generation bots interfering with the US election

Giorgia Guglielmi
2020 Nature  
Russian operatives manipulated tools such as botsautomated accounts that share contentin an attempt to deceive social-media users in the United States and sway the election in favour of President Donald  ...  The fake accounts have become harder to detect, says Emilio Ferrara (pictured), a data scientist at the University of Southern California in Los Angeles who studies social-media bots to understand how  ...  These bots survive longer on social-media platforms and can create botnets, which are networks of bots that push the same messages.  ... 
doi:10.1038/d41586-020-03034-5 pmid:33116324 fatcat:ffhzcqlgqbftflo6vpw7vyt6oy

Social Media Identity Deception Detection: A Survey [article]

Ahmed Alharbi, Hai Dong, Xun Yi, Zahir Tari, Ibrahim Khalil
2021 arXiv   pre-print
This survey provides a detailed review of social media identity deception detection techniques. It also identifies primary research challenges and issues in the existing detection techniques.  ...  Social media have been growing rapidly and become essential elements of many people's lives. Meanwhile, social media have also come to be a popular source for identity deception.  ...  In addition, social botnets communicate with social media users and then establish communications with the botmaster.  ... 
arXiv:2103.04673v1 fatcat:zf6xcn3pafcgfbxmoewc3yhhpi

Tweet-Based Bot Detection Using Big Data Analytics

Abdelouahid Derhab, Rahaf Alawwad, Khawlah Dehwah, Noshina Tariq, Farrukh Aslam Khan, Jalal Al-Muhtadi
2021 IEEE Access  
ACKNOWLEDGMENT The authors extend their sincere appreciation to the Deanship of Scientific Research at King Saud University, Saudi Arabia, for funding this work through the Research Group No. RGP-214.  ...  In [1] , it has been reported that there are 3.5 billion active social media users globally.  ...  INTRODUCTION N OWADAYS, social media is one of the most popular tools used by people to communicate with one another. It is also largely used by organizations to reach out to customers.  ... 
doi:10.1109/access.2021.3074953 fatcat:n4womre6cbdddbe5oeqrivn4hy

Android malware attacks and countermeasures: Current and future directions

Rahul Raveendranath, Venkiteswaran Rajamani, Anoop Joseph Babu, Soumya Kanti Datta
2014 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)  
Then a detailed analysis of one of the proposed novel malware methods is explained. Finally the paper concludes by summarizing the paper.  ...  This popularity coupled with the fact that smartphones contain a lot of private user data is causing a proportional rise in different malwares for the platform.  ...  Researchers have proposed VirusMeter [33] , a novel and general malware detection method which detects malicious activity by monitoring the power consumption of the mobile device.  ... 
doi:10.1109/iccicct.2014.6992944 fatcat:ug2xt52eifapnof3afl6anyika

(Mis)Information Operations: An Integrated Perspective [article]

Matteo Cinelli, Mauro Conti, Livio Finos, Francesco Grisolia, Petra Kralj Novak, Antonio Peruzzi, Maurizio Tesconi, Fabiana Zollo, Walter Quattrociocchi
2019 arXiv   pre-print
The massive diffusion of social media fosters disintermediation and changes the way users are informed, the way they process reality, and the way they engage in public debate.  ...  The cognitive layer of users and the related social dynamics define the nature and the dimension of informational threats.  ...  By monitoring social network activity on a range of issues, influential users and communities can be detected, communities can be classified according to their main interests, and sentiment analysis of  ... 
arXiv:1912.10795v1 fatcat:p7ctqmockfd6vkydpaciwxwaci

Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques [chapter]

Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Jill Slay
2018 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Lately, the IoT has been affected by a variety of different botnet activities.  ...  This paper investigates the role of ML techniques for developing a Network forensic mechanism based on network flow identifiers that can track suspicious activities of botnets.  ...  Acknowledgements Nickolaos Koroniotis would like to thank the Commonwealth's support, which is provided to the aforementioned researcher in the form of an Australian Government Research Training Program  ... 
doi:10.1007/978-3-319-90775-8_3 fatcat:4xzte7wynnbmdbdm6pijby27ii

AI-Powered Social Bots [article]

Terrence Adams
2017 arXiv   pre-print
However, using recent advances in machine learning, it is possible to unleash incredibly powerful, human-like armies of social bots, in potentially well coordinated campaigns of deception and influence  ...  We also discuss rapidly advancing areas of machine learning and artificial intelligence that could lead to frighteningly powerful new multi-modal social bots.  ...  Twitter Bot Challenge laid ground-work for future evaluations of bot detection in social media.  ... 
arXiv:1706.05143v1 fatcat:iv5bkvh3yzhybaxhyoqi27bx5y

Mobile Botnet Attacks – an Emerging Threat: Classification, Review and Open Issues

2015 KSII Transactions on Internet and Information Systems  
Above all, the capability of botnets is uncovered through a wide range of malicious activities, such as distributed denial of service (DDoS), theft of business information, remote access, online or click  ...  The implications of botnets have inspired attention from the academia and the industry alike, which includes vendors, investors, hackers, and researcher community.  ...  Similarly, communication cost of smartphone applications can be monitored to detect potential botnet attack.  ... 
doi:10.3837/tiis.2015.04.012 fatcat:hq2wtnaxlfhzjl5bd2l6q5dzky
« Previous Showing results 1 — 15 out of 1,066 results