Rule-Based Approach For Detecting Botnet Based On Domain Name System
Botnets are a serious problem in today’s Internet, and they result in economic damage for organizations and individuals. Botnets consist of thousands of infected hosts that receive instructions from command and control (C&C) servers operated by an individual. Traditionally, Internet Relay Chat (...
| Main Author: | Alieyan, Kamal Ibrahim Ahmed |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/43654/ http://eprints.usm.my/43654/1/KAMAL%20IBRAHIM%20AHMED%20ALIEYAN.pdf |
Similar Items
Layered Botnet Detection Framework Based On Signal
Processing And Discrete Time Analysis
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
Domain name and site hosting preferences: empirical evidence
by: O’Daniel, Thomas, et al.
Published: (2000)
by: O’Daniel, Thomas, et al.
Published: (2000)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
Advisory Aided System To Institute Of Higher Learning Based On Rules Based And Personality Assessment.
by: Osman, Mohd Azam, et al.
Published: (2007)
by: Osman, Mohd Azam, et al.
Published: (2007)
Rule Generation Based On Structural Clustering For Automatic Question Answering
by: Song , Shen
Published: (2009)
by: Song , Shen
Published: (2009)
Robust Video Watermarking Based On 3D-DWT Domain.
by: A.M .Al-Taweel, Sadik., et al.
Published: (2009)
by: A.M .Al-Taweel, Sadik., et al.
Published: (2009)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al.
by: Omar, Mohd Nizam, et al.
Stego Keys Performance on Feature Based Coding Method in Text Domain
by: Din, Roshidi, et al.
Published: (2017)
by: Din, Roshidi, et al.
Published: (2017)
Similarity-Based Weights For
Cross-Domain Sentiment Classification Of Product Reviews
by: Gupta, Aditi
Published: (2023)
by: Gupta, Aditi
Published: (2023)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
Rule Learning and Extraction Using a Hybrid Neural Network: A Case Study on Fault Detection and Diagnosis
by: Tan, Shing Chiang, et al.
Published: (2005)
by: Tan, Shing Chiang, et al.
Published: (2005)
Parallelizing Algorithm For Object Recognition Based On Edge Detection On Sunfire Cluster.
by: Osman, Mohd Azam, et al.
Published: (2007)
by: Osman, Mohd Azam, et al.
Published: (2007)
An Approach For Detection Of Logical Inconsistency
by: Yadav, Rinki
Published: (2012)
by: Yadav, Rinki
Published: (2012)
Semantic Lexical Alignment For Domain-Specific Ontologies.
by: Abu-Shareha, Ahmad Adel, et al.
Published: (2009)
by: Abu-Shareha, Ahmad Adel, et al.
Published: (2009)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
An integrated approach for head gesture based interface
by: Lee, Gin Chong, et al.
Published: (2012)
by: Lee, Gin Chong, et al.
Published: (2012)
A Comparison Between Inter-Asterisk eXchange
Protocol and Jingle Protocol: Session Time
by: Haj Aliwi, H. S., et al.
Published: (2016)
by: Haj Aliwi, H. S., et al.
Published: (2016)
A Genetic Algorithm Based Approach for Solving
the Minimum Dominating Set of Queens Problem
by: Alharbi, Saad, et al.
Published: (2017)
by: Alharbi, Saad, et al.
Published: (2017)
A Genetic Algorithm Based Approach for Solving the Minimum Dominating Set of Queens Problem
by: Alharbi, Saad, et al.
Published: (2017)
by: Alharbi, Saad, et al.
Published: (2017)
Malay Lexical Analysis Through Corpus-Based Approach.
by: Malanyon, Bali Ranaivo
by: Malanyon, Bali Ranaivo
Statistical-based SYN-flooding detection using programmable network processor
by: Lim, , BP, et al.
Published: (2005)
by: Lim, , BP, et al.
Published: (2005)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
An Open-Domain Question Answering System Using Annotated Web Feeds.
by: Ismail, Bukhary Ikhwan, et al.
Published: (2007)
by: Ismail, Bukhary Ikhwan, et al.
Published: (2007)
Off-line signature verification and forgery detection system based on fuzzy modeling
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
Pixel-Based Parallel-Coordinates Technique For Outlier Detection In Cardiac Patient Dataset.
by: Hasimah, H.M., et al.
Published: (2007)
by: Hasimah, H.M., et al.
Published: (2007)
Screen design: a dynamic symmetry grid based approach
by: Ch'ng, E
Published: (2003)
by: Ch'ng, E
Published: (2003)
An Ontology And Constraint-based Approach For Dynamic Personalised Planning In Healthcare
by: Mahiddin , Normadiah
Published: (2009)
by: Mahiddin , Normadiah
Published: (2009)
e-PARTICIPATORY COMMUNITY BASED APPROACH ON LANDSLIDE
PREPAREDNESS AND MITIGATION
by: Chan, Huah Yong
Published: (2015)
by: Chan, Huah Yong
Published: (2015)
Similarity Segmentation Approach For Sensor-Based Human Activity Recognition
by: Baraka, Abdulrahman M. A.
Published: (2024)
by: Baraka, Abdulrahman M. A.
Published: (2024)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
Individual recognition based on human iris using fractal dimension approach
by: Lee, , PS, et al.
Published: (2004)
by: Lee, , PS, et al.
Published: (2004)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
Feature Selection Method Based On Hybrid Filter-Metaheuristic Wrapper Approach
by: Jothi, Neesha
Published: (2020)
by: Jothi, Neesha
Published: (2020)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM based Intrusion Detection Sensors
by: Jazzar, Mahmoud, et al.
by: Jazzar, Mahmoud, et al.
Efficient and fast multi layer statistical approach for colour based image retrieval
by: Odeh, , JQ, et al.
Published: (2003)
by: Odeh, , JQ, et al.
Published: (2003)
Similar Items
-
Layered Botnet Detection Framework Based On Signal
Processing And Discrete Time Analysis
by: Melhim, Loai Kayed Hassan Bani
Published: (2012) -
Domain name and site hosting preferences: empirical evidence
by: O’Daniel, Thomas, et al.
Published: (2000) -
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022) -
Advisory Aided System To Institute Of Higher Learning Based On Rules Based And Personality Assessment.
by: Osman, Mohd Azam, et al.
Published: (2007) -
Rule Generation Based On Structural Clustering For Automatic Question Answering
by: Song , Shen
Published: (2009)