DCA for bot detection

Ensuring the security of computers is a non-trivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emerged in the form of networks of hijacked zombie machines used to perform complex distributed attacks such as denial of service and t...

Full description

Bibliographic Details
Main Authors: Al-Hammadi, Yousof, Aickelin, Uwe, Greensmith, Julie
Format: Book Section
Published: IEEE 2008
Online Access:https://eprints.nottingham.ac.uk/982/