Behavioral analysis and visualization of Fast-Flux DNS
Today, a growing, sophisticated technique called Fast-Flux Service Networks (FFSN) poses a major problem to Internet security. They are increasingly used in many illegal practices including money mule recruitment sites, distribution of malware downloads, illegal adult content, and other forms of Int...
| Main Authors: | A. Kadir, Andi Fitria, R. Othman, R. Azrina, A. Aziz, Normaziah |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/28616/ http://irep.iium.edu.my/28616/1/06298838.pdf |
Similar Items
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Risk identification for an information security management system implementation
by: Ramli, Noraza, et al.
Published: (2012)
by: Ramli, Noraza, et al.
Published: (2012)
Coherent crowd analysis with visual attributes / Nurul Japar
by: Nurul , Japar
Published: (2022)
by: Nurul , Japar
Published: (2022)
Applying covert channel in TCP Fast Open (TFO) / Mohamed Azran Aziz
by: Mohamed Azran , Aziz
Published: (2019)
by: Mohamed Azran , Aziz
Published: (2019)
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
by: Adebayo, Olawale Surajudeen, et al.
Published: (2015)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2015)
Enhancement of Ethanol Production Using a Hybrid of Firefly Algorithm and Dynamic Flux Balance Analysis
by: Wan, Ting Leong, et al.
Published: (2022)
by: Wan, Ting Leong, et al.
Published: (2022)
Visualization pipeline for medical datasets on grid computing environment
by: Ahmed, A. A., et al.
Published: (2007)
by: Ahmed, A. A., et al.
Published: (2007)
Visual codebook analysis in image understanding / Hoo Wai Lam
by: Hoo, Wai Lam
Published: (2015)
by: Hoo, Wai Lam
Published: (2015)
Efficient and fast multi layer statistical approach for colour based image retrieval
by: Odeh, , JQ, et al.
Published: (2003)
by: Odeh, , JQ, et al.
Published: (2003)
Improved particle swarm optimization by fast annealing algorithm
by: Bashath, Samar, et al.
Published: (2019)
by: Bashath, Samar, et al.
Published: (2019)
Mobile flight and hotel booking application: A heuristic and UX test
by: Hussain, Azham, et al.
Published: (2018)
by: Hussain, Azham, et al.
Published: (2018)
A comparative analysis of algorithms for fast computation of Zernike moments
by: Chong, C
Published: (2003)
by: Chong, C
Published: (2003)
An Effective Fast Searching Algorithm for Internet Crawling Usage
by: Chia, Zhen Hon, et al.
Published: (2016)
by: Chia, Zhen Hon, et al.
Published: (2016)
Visual analytic of UMP attrition
by: Nur Alnisa’ Anis Alanna, Ruzelan
Published: (2019)
by: Nur Alnisa’ Anis Alanna, Ruzelan
Published: (2019)
Visual computer: guest editorial
by: Shamsuddin, Siti Mariyam, et al.
Published: (2007)
by: Shamsuddin, Siti Mariyam, et al.
Published: (2007)
NL scoring and Bloom competency test: an experimental result
by: Lajis, Adidah, et al.
Published: (2012)
by: Lajis, Adidah, et al.
Published: (2012)
Competency assessment of short free text answers
by: Lajis, Adidah, et al.
Published: (2014)
by: Lajis, Adidah, et al.
Published: (2014)
Malware detection through machine learning techniques
by: Amer, Ahmed, et al.
Published: (2019)
by: Amer, Ahmed, et al.
Published: (2019)
An algebraic approach for sentence based feature extraction applied for automatic text summarization
by: Batcha, Nowshath Kadhar, et al.
Published: (2014)
by: Batcha, Nowshath Kadhar, et al.
Published: (2014)
Techniques for analysing android malware
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
The trend of mobile malwares and effective detection techniques
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
A new efficient text detection method for image spam filtering
by: Al Muataz, Zubaidah, et al.
Published: (2015)
by: Al Muataz, Zubaidah, et al.
Published: (2015)
Web application - What makes it secure or insecure?
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
An analysis of fuzzy clustering algortihms for suggestion of supervisor and examiner of thesis title
by: Suhaimi, Azrina
Published: (2005)
by: Suhaimi, Azrina
Published: (2005)
A hybrid of ant colony optimization, genetic algorithm and flux balance analysis for optimization of succinic acid production in Escherichia coli
by: Tan, Jun Bin, et al.
Published: (2023)
by: Tan, Jun Bin, et al.
Published: (2023)
Fast Determination of Items Support Technique from Enhanced Tree Data Structure
by: Abdullah, Zailani, et al.
Published: (2014)
by: Abdullah, Zailani, et al.
Published: (2014)
Early prediction of acute kidney injury using machine learning algorithms
by: Ismail, Amelia Ritahani, et al.
Published: (2018)
by: Ismail, Amelia Ritahani, et al.
Published: (2018)
Analyzing and visualizing data dengue hotspot location
by: Zainal Abidin, Nadzurah, et al.
Published: (2018)
by: Zainal Abidin, Nadzurah, et al.
Published: (2018)
Analyzing and visualizing Thoracic Surgery Data Set
by: Bashath, Samar, et al.
Published: (2018)
by: Bashath, Samar, et al.
Published: (2018)
Automated visual surveillance using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2013)
by: Ahmed, Tarem, et al.
Published: (2013)
Themescape quranic visualization / Noorhafidzi Mohd Arif
by: Noorhafidzi, Mohd Arif
Published: (2005)
by: Noorhafidzi, Mohd Arif
Published: (2005)
Visualizing collaborative time-varying scientific datasets
by: Mohamad Sharif, Johan, et al.
Published: (2007)
by: Mohamad Sharif, Johan, et al.
Published: (2007)
CDS505 – Data Visualization & Visual Analytics
(Visualisasi Data & Analitik Visual)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CDS505 – Data Visualization & Visual Analytics (Data Visualisasi & Analitik Visual)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
Molecular visualization / Foong Yee Peng
by: Foong , Yee Peng
Published: (2005)
by: Foong , Yee Peng
Published: (2005)
Remote visualization on medical datasets over thin clients with support of grid environment
by: Ahmed, Aboamama A., et al.
Published: (2006)
by: Ahmed, Aboamama A., et al.
Published: (2006)
Visual analysis of dense crowds / Kok Ven Jyn
by: Kok , Ven Jyn
Published: (2016)
by: Kok , Ven Jyn
Published: (2016)
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
by: Ali, Mohammed Hasan, et al.
Published: (2019)
by: Ali, Mohammed Hasan, et al.
Published: (2019)
Similar Items
-
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012) -
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014) -
Risk identification for an information security management system implementation
by: Ramli, Noraza, et al.
Published: (2012) -
Coherent crowd analysis with visual attributes / Nurul Japar
by: Nurul , Japar
Published: (2022) -
Applying covert channel in TCP Fast Open (TFO) / Mohamed Azran Aziz
by: Mohamed Azran , Aziz
Published: (2019)