Performance evaluation of DCA and SRC on a single bot detection

Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of service and to obtain sensitive data such as password information. These compromised machines are said to be infected with mal...

Full description

Bibliographic Details
Main Authors: Al-Hammadi, Yousof, Aickelin, Uwe, Greensmith, Julie
Format: Article
Language:English
Published: 2010
Online Access:http://eprints.nottingham.ac.uk/1284/
http://eprints.nottingham.ac.uk/1284/
http://eprints.nottingham.ac.uk/1284/1/al-hammadi2010b.pdf