Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour
Botnet has been identified as one of the most emerging threats to the Internet users. It has been attracted much attention and gives a big threat in network security. Through the year a number of Botnet variants have been introduced and the most lethal variants are known as peerto- peer (P2P) bo...
| Main Authors: | Abdullah, Raihana Syahirah, Mas'ud, M. Z., Abdollah, M. F., Sahib, S., Yusof, R. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/3580/ http://eprints.utem.edu.my/id/eprint/3580/1/Paper_28111124_IJCSIS__pp._7-11.pdf |
Similar Items
Detecting Botnets Through Log Correlation
by: Al-Hammadi, Yousof, et al.
Published: (2006)
by: Al-Hammadi, Yousof, et al.
Published: (2006)
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
Location of contact residues in pharmacologically distinct drug binding sites on P-glycoprotein
by: Mittra, Rituparna, et al.
Published: (2017)
by: Mittra, Rituparna, et al.
Published: (2017)
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009)
by: Yusof, R., et al.
Published: (2009)
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
A New Malware Attack Pattern Generalization
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Advanced Trace Pattern For Computer Intrusion Discovery
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Improving throughput of TCP flows by utilizing TCP-aware backpressure scheduling
by: Kassim, P. D. M., et al.
Published: (2023)
by: Kassim, P. D. M., et al.
Published: (2023)
Behavioural correlation for detecting P2P bots
by: Al-Hammadi, Yousof, et al.
Published: (2010)
by: Al-Hammadi, Yousof, et al.
Published: (2010)
A Static Approach towards Mobile Botnet Detection
by: Shahid, Anwar, et al.
Published: (2016)
by: Shahid, Anwar, et al.
Published: (2016)
Android Botnets: A Serious Threat to Android Devices
by: Shahid, Anwar, et al.
Published: (2018)
by: Shahid, Anwar, et al.
Published: (2018)
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011)
by: Abdollah, M. F., et al.
Published: (2011)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
An enhanced android botnet detection approach using feature refinement
by: Anwar, Shahid
Published: (2019)
by: Anwar, Shahid
Published: (2019)
Deep learning-based classification model for botnet attack detection
by: Ahmed, Abdulghani Ali, et al.
Published: (2020)
by: Ahmed, Abdulghani Ali, et al.
Published: (2020)
Back Propagation Algorithm-Based Intelligent Model for Botnet Detection
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Nonassociative differential extensions of characteristic p
by: Pumpluen, Susanne
Published: (2017)
by: Pumpluen, Susanne
Published: (2017)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Android Botnets: A proof-of-concept using hybrid analysis approach
by: Karim, Ahmad, et al.
Published: (2020)
by: Karim, Ahmad, et al.
Published: (2020)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
ABC: android botnet classification using feature selection and classification algorithms
by: Abdullah, Zubaile, et al.
Published: (2017)
by: Abdullah, Zubaile, et al.
Published: (2017)
Difficulties and challenges of recognizing Arabic text
by: Abuzaraida, Mustafa Ali, et al.
Published: (2011)
by: Abuzaraida, Mustafa Ali, et al.
Published: (2011)
Islamic civilisation: meaning, origin and distinctive characteristics
by: Sulaiman, Kabuye Uthman
Published: (2009)
by: Sulaiman, Kabuye Uthman
Published: (2009)
Characterization of viscoplasticity behaviour of P91 and P92 power plant steels
by: Saad, Abdullah Aziz, et al.
Published: (2013)
by: Saad, Abdullah Aziz, et al.
Published: (2013)
Enhanced intrusion detection capabilities via weighted chi-square, discretization and SVM
by: Mohamed Yassin, Warusia, et al.
Published: (2018)
by: Mohamed Yassin, Warusia, et al.
Published: (2018)
Avalanche Multiplication and Noise Characteristics of Thin InP p+–i–n+Diodes
by: You, Ah Heng, et al.
Published: (2004)
by: You, Ah Heng, et al.
Published: (2004)
Synthesis Of B-TCP Powder Via Wet Precipitation And Hydrothermal Methods [R857.M3 P534 2007 f rb].
by: Pham, Trung Kien
Published: (2007)
by: Pham, Trung Kien
Published: (2007)
TCP/IP based networking for telemedicine
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2013)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2013)
A Non-Toxigenic But Morphologically And Phylogenetically Distinct New Species Of Pseudo-Nitzschia, P. Sabit Sp. Nov. Bacillariophyceae)
by: Sing, Tung Teng, et al.
Published: (2015)
by: Sing, Tung Teng, et al.
Published: (2015)
TCP Skudai: A high performance TCP variant for Collaborative Virtual Environment systems
by: Gital, Abdulsalam Ya’u, et al.
Published: (2016)
by: Gital, Abdulsalam Ya’u, et al.
Published: (2016)
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network
by: Ahmed, Abdulghani Ali
Published: (2019)
by: Ahmed, Abdulghani Ali
Published: (2019)
Similar Items
-
Detecting Botnets Through Log Correlation
by: Al-Hammadi, Yousof, et al.
Published: (2006) -
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014) -
Location of contact residues in pharmacologically distinct drug binding sites on P-glycoprotein
by: Mittra, Rituparna, et al.
Published: (2017) -
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011) -
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)