Behavioural correlation for detecting P2P bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These bots can be used in different malicious ways such as issuing distributed denial of services attacks to shutdown other...
| Main Authors: | Al-Hammadi, Yousof, Aickelin, Uwe |
|---|---|
| Format: | Book Section |
| Published: |
IEEE
2010
|
| Online Access: | https://eprints.nottingham.ac.uk/1250/ |
Similar Items
Behavioural correlation for malicious bot detection
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)
Detecting bots based on keylogging activities
by: Al-Hammadi, Yousof, et al.
Published: (2008)
by: Al-Hammadi, Yousof, et al.
Published: (2008)
DCA for bot detection
by: Al-Hammadi, Yousof, et al.
Published: (2008)
by: Al-Hammadi, Yousof, et al.
Published: (2008)
Performance evaluation of DCA and SRC on a single bot detection
by: Al-Hammadi, Yousof, et al.
Published: (2010)
by: Al-Hammadi, Yousof, et al.
Published: (2010)
Detecting Botnets Through Log Correlation
by: Al-Hammadi, Yousof, et al.
Published: (2006)
by: Al-Hammadi, Yousof, et al.
Published: (2006)
PMDA: A malicious peer detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2011)
by: Wei, Xianglin, et al.
Published: (2011)
An Immune Network Intrusion Detection System Utilising Correlation Context
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
An immune inspired Network Intrusion Detection System utilising correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
SMART: a subspace based malicious peers detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2013)
by: Wei, Xianglin, et al.
Published: (2013)
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
by: Wei, Xianglin, et al.
Published: (2012)
by: Wei, Xianglin, et al.
Published: (2012)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
Reka bentuk bot-bot yang sesuai untuk laut jauh
by: Samo, Khalid, et al.
Published: (1987)
by: Samo, Khalid, et al.
Published: (1987)
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Characterization of viscoplasticity behaviour of P91 and P92 power plant steels
by: Saad, Abdullah Aziz, et al.
Published: (2013)
by: Saad, Abdullah Aziz, et al.
Published: (2013)
Inverse correlation between P53 and Bcl-2 expression in breast carcinoma of Malaysian patients
by: Mdzin, R, et al.
Published: (2012)
by: Mdzin, R, et al.
Published: (2012)
Real-time alert correlation with type graphs
by: Tedesco, Gianni, et al.
Published: (2008)
by: Tedesco, Gianni, et al.
Published: (2008)
Online P2P lending industry: an international analysis
by: Lan, Meijing
Published: (2019)
by: Lan, Meijing
Published: (2019)
Round length optimisation for P2P network gaming
by: Webb, Steven, et al.
Published: (2007)
by: Webb, Steven, et al.
Published: (2007)
An evolutionary game approach to P2P video streaming
by: Chisci, L., et al.
Published: (2009)
by: Chisci, L., et al.
Published: (2009)
Comparison of query caching approaches in P2P networks
by: Rozlina, Mohamed
Published: (2011)
by: Rozlina, Mohamed
Published: (2011)
Grid task scheduling in P2P desktop grids
by: A. Halim, Rosenah, et al.
Published: (2012)
by: A. Halim, Rosenah, et al.
Published: (2012)
Analysis of p2p communication over various mobile platforms
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2013)
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2013)
Performance evaluation of selected DHT P2p routing protocols
by: Anwar, Farhat
Published: (2011)
by: Anwar, Farhat
Published: (2011)
A survey on network game cheats and P2P solutions
by: Webb, Steven, et al.
Published: (2008)
by: Webb, Steven, et al.
Published: (2008)
Sharing clinical information in P2P environment with RBAC mechanism.
by: Mirabi, Meghdad, et al.
Published: (2009)
by: Mirabi, Meghdad, et al.
Published: (2009)
Credit score in default prediction fr P2P lending
by: Sim, Hui Xian
Published: (2024)
by: Sim, Hui Xian
Published: (2024)
Fano 3-folds in P2xP2 format, Tom and Jerry
by: Brown, Gavin, et al.
Published: (2018)
by: Brown, Gavin, et al.
Published: (2018)
Application Of Utaut2 On Peer To Peer (P2p) Lending Platform In Malaysia
by: Ramachandran, Lingeswary
Published: (2024)
by: Ramachandran, Lingeswary
Published: (2024)
Detecting anomalous process behaviour using second generation Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2010)
by: Twycross, Jamie, et al.
Published: (2010)
P2P Workspace / Sheik Azhar Bux Sheik Azmi Bux
by: Sheik Azhar Bux, Sheik Azmi Bux
Published: (2004)
by: Sheik Azhar Bux, Sheik Azmi Bux
Published: (2004)
Evaluation of P2P file sharing system in the presence of malicious nodes
by: Janbi, Nourah
Published: (2015)
by: Janbi, Nourah
Published: (2015)
Determinants on the volume of the peer-to-peer (P2P) lending platforms in China
by: JIAO, NI
Published: (2018)
by: JIAO, NI
Published: (2018)
Energy Trading in P2P Network by using Blockchain in Smart Grid
by: Ahmed, Afshaar, et al.
Published: (2022)
by: Ahmed, Afshaar, et al.
Published: (2022)
RACS: A Referee Anti-Cheat Scheme for P2P Gaming
by: Webb, Steven, et al.
Published: (2007)
by: Webb, Steven, et al.
Published: (2007)
RACS: A referee anti-cheat scheme for P2P gaming
by: Webb, Steven, et al.
Published: (2007)
by: Webb, Steven, et al.
Published: (2007)
Management system for managing P1 and P2 students in counselling unit
by: Nur Syafiqah, Mohamad Sasudin
Published: (2018)
by: Nur Syafiqah, Mohamad Sasudin
Published: (2018)
Decentralized replication strategies for P2P based scientific data grid
by: Abdullah, Azizol, et al.
Published: (2008)
by: Abdullah, Azizol, et al.
Published: (2008)
Isotherm behaviour of p3OT, P3HT and PCBM Langmuir layer on ionic subphase
by: Naning, Fatin Hana, et al.
Published: (2023)
by: Naning, Fatin Hana, et al.
Published: (2023)
Credit Risk Assessment in P2P Lending Using LightGBM and
Particle Swarm Optimization
by: Yosza Dasril, Yosza Dasril, et al.
Published: (2023)
by: Yosza Dasril, Yosza Dasril, et al.
Published: (2023)
Similar Items
-
Behavioural correlation for malicious bot detection
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010) -
Detecting bots based on keylogging activities
by: Al-Hammadi, Yousof, et al.
Published: (2008) -
DCA for bot detection
by: Al-Hammadi, Yousof, et al.
Published: (2008) -
Performance evaluation of DCA and SRC on a single bot detection
by: Al-Hammadi, Yousof, et al.
Published: (2010) -
Detecting Botnets Through Log Correlation
by: Al-Hammadi, Yousof, et al.
Published: (2006)