A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
Recently, botnets are the most radical of all cyberattacks and becoming the key issue in cloud computing. Botnets are the network of different compromised computers and/or smartphones. These devices are infected with malicious code by botmaster and controlled as groups. The attackers use these botne...
| Main Authors: | Shahid, Anwar, Jasni, Mohamad Zain, Mohamad Fadli, Zolkipli, Zakira, Inayat |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
IEEE
2014
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/18451/ http://umpir.ump.edu.my/id/eprint/18451/1/A%20Review%20Paper%20on%20Botnet%20and%20Botnet%20Detection%20Techniques%20in%20Cloud%20Computing.pdf http://umpir.ump.edu.my/id/eprint/18451/2/A%20Review%20Paper%20on%20Botnet%20and%20Botnet%20Detection%20Techniques%20in%20Cloud%20Computing%201.pdf |
Similar Items
A Static Approach towards Mobile Botnet Detection
by: Shahid, Anwar, et al.
Published: (2016)
by: Shahid, Anwar, et al.
Published: (2016)
Android Botnets: A Serious Threat to Android Devices
by: Shahid, Anwar, et al.
Published: (2018)
by: Shahid, Anwar, et al.
Published: (2018)
Back Propagation Algorithm-Based Intelligent Model for Botnet Detection
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
An enhanced android botnet detection approach using feature refinement
by: Anwar, Shahid
Published: (2019)
by: Anwar, Shahid
Published: (2019)
Detecting Botnets Through Log Correlation
by: Al-Hammadi, Yousof, et al.
Published: (2006)
by: Al-Hammadi, Yousof, et al.
Published: (2006)
Android Botnets: A proof-of-concept using hybrid analysis approach
by: Karim, Ahmad, et al.
Published: (2020)
by: Karim, Ahmad, et al.
Published: (2020)
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014)
by: Ali, Mushtaq, et al.
Published: (2014)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Layered Botnet Detection Framework Based On Signal
Processing And Discrete Time Analysis
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
Deep learning-based classification model for botnet attack detection
by: Ahmed, Abdulghani Ali, et al.
Published: (2020)
by: Ahmed, Abdulghani Ali, et al.
Published: (2020)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions
by: Zakira, Inayat, et al.
Published: (2017)
by: Zakira, Inayat, et al.
Published: (2017)
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network
by: Ahmed, Abdulghani Ali
Published: (2019)
by: Ahmed, Abdulghani Ali
Published: (2019)
Detecting and mitigating botnet attacks using deep
learning in software-defined networks
by: Muhammad Waqas, Nadeem
Published: (2023)
by: Muhammad Waqas, Nadeem
Published: (2023)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Cooperative network behavior analysis model for mobile HTTP botnet detection / Meisam Eslahi
by: Eslahi, Meisam
Published: (2017)
by: Eslahi, Meisam
Published: (2017)
A Botnet Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
by: Ong, Wei Cheng
Published: (2023)
by: Ong, Wei Cheng
Published: (2023)
ABC: android botnet classification using feature selection and classification algorithms
by: Abdullah, Zubaile, et al.
Published: (2017)
by: Abdullah, Zubaile, et al.
Published: (2017)
Study of Security Layers Under Attack on Different Layers of Cloud Computing
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
Battery Efficiency of Mobile Devices through Computational Offloading: A Review
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Mobile Cloud Computing with SOAP and REST Web Services
by: Ali, Mushtaq, et al.
Published: (2018)
by: Ali, Mushtaq, et al.
Published: (2018)
Cross-VM Cache-based Side Channel Attacks and Proposed Prevention Mechanisms: A Survey
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Contact tracing strategy to isolate infectious bots in mitigating iot botnet propagation and preserve object of forensic interest
by: Ibrahim, Mohammed
Published: (2021)
by: Ibrahim, Mohammed
Published: (2021)
Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)
by: Shakirah, Saidin, et al.
Published: (2018)
Taxonomy of Computational Offloading in Mobile Devices
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Mobile cloud computing & mobile's battery efficiency approaches: A review
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
RAPID-risk assessment of android permission and application programming interface (API) call for android botnet
by: Abdullah, Zubaile, et al.
Published: (2018)
by: Abdullah, Zubaile, et al.
Published: (2018)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Cloud computing review: Features and issues
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
A Study On AI-Driven Solutions for Cloud Security Platform
by: Menaga, Segar, et al.
Published: (2024)
by: Menaga, Segar, et al.
Published: (2024)
Review of access control mechanisms in cloud computing
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
Similar Items
-
A Static Approach towards Mobile Botnet Detection
by: Shahid, Anwar, et al.
Published: (2016) -
Android Botnets: A Serious Threat to Android Devices
by: Shahid, Anwar, et al.
Published: (2018) -
Back Propagation Algorithm-Based Intelligent Model for Botnet Detection
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018) -
An enhanced android botnet detection approach using feature refinement
by: Anwar, Shahid
Published: (2019) -
Detecting Botnets Through Log Correlation
by: Al-Hammadi, Yousof, et al.
Published: (2006)