• No results found

Detection of Botnets Using Combined Host- and Network-Level Information

On Detection of Current and Next-Generation Botnets.

On Detection of Current and Next-Generation Botnets.

... a host-based approach alone may not be reliable enough because host-resident malware could compromise the detection scheme, we shifted our focus to the local network where bots reside in to ...

152

Detection and Prevention of Botnets and Malware in Large Scale Network Topology

Detection and Prevention of Botnets and Malware in Large Scale Network Topology

... the information in a log arrange in ...best level, level 1, and level 2, ...the information in a log arrange in ...the level head in ...6 information from each tail of the ...

6

A Real Time Host and Network Mobile Agent based Intrusion Detection System (HNMAIDS)

A Real Time Host and Network Mobile Agent based Intrusion Detection System (HNMAIDS)

... intrusion detection system in NIDS and HIDS, together with low-level high-speed traffic acquisition and reprocessing layer based on dedicated adaptive hardware and high-level operator interface [1, ...

8

Enhancing Network Intrusion Detection through Host Clustering

Enhancing Network Intrusion Detection through Host Clustering

... this level is also called Deep Packet inspection, emphasising the depth of the ...Application-specific information from protocols such as Hypertext Trans- fer Protocol (HTTP), Domain Name System (DNS), and ...

96

Catching modern botnets using active integrated evidential reasoning

Catching modern botnets using active integrated evidential reasoning

... botnet detection, it is becoming much more difficult today, especially for highly polymorphic, intelligent and stealthy modern ...modern botnets. SeeBot can seamlessly and incrementally combine host ...

10

Multi Level Malicious Behaviour Detection and Analysis Using Genetic Algorithm for Social Network

Multi Level Malicious Behaviour Detection and Analysis Using Genetic Algorithm for Social Network

... of network connections, number of processes per user, the call status, to name a ...anomaly detection schemes. For example, anomaly detection techniques use significant difference from user profiles ...

8

SNORT: Network and Host Monitoring Intrusion Detection System

SNORT: Network and Host Monitoring Intrusion Detection System

... service, information theft, financial and credibility loss ...Intrusion Detection and Prevention Systems (IDPSs) being best of available ...good level of success in detecting and preventing intrusion ...

5

Analysis of Periodicity in Botnets

Analysis of Periodicity in Botnets

... Botnets utilize Peer-to-Peer (P2P) networks, open file sharing frameworks, and even “hit lists” to detect vulnerable IP addresses for infection among many other network propagation methods [22]. Tyagi et ...

79

Text Skew Detection Using Combined Entropy Algorithm

Text Skew Detection Using Combined Entropy Algorithm

... a combined entropy ...proposed combined entropy as well as each of the entropy algorithms is tested using a document database DISEC'13 during the experiment ...

11

Automatic Detection of Clone Websites Using Combined Clustering

Automatic Detection of Clone Websites Using Combined Clustering

... web, however this comes at the expense of lower victim yield and quicker defender response. Extremely targeted attacks square measure far more seemingly to figure, however they're a lot of expensive to craft. Some frauds ...

5

Deep Learning Combined with De - noising Data for Network Intrusion Detection

Deep Learning Combined with De - noising Data for Network Intrusion Detection

... Most researchers [21], [22] use auto-encoders as a non- linear transformation to discover interesting data structures, by imposing other constraints on the network, and compare the results with those of PCA ...

6

Distributed, multi level network anomaly detection for datacentre networks

Distributed, multi level network anomaly detection for datacentre networks

... unwarranted network accesses have raised serious concerns for the ...to network security, but with the increased exposure of implementation errors in critical applications, other attacks are starting to ...

6

Network Level Anomaly Detection System with Principal Component Analysis

Network Level Anomaly Detection System with Principal Component Analysis

... in network has an increasing number of security threats. The information and services available on network is an intellectual ...suitable network security approaches (IDS-Intrusion ...

7

Intelligent Controller for UPQC Using Combined Neural Network

Intelligent Controller for UPQC Using Combined Neural Network

... The UPQC is one of the most researched entities in the world of power electronic control of power systems. Though volumes of papers stream into the literature domain every day, it is very hard to find the real UPQC in ...

12

Detecting Botnets with NetFlow

Detecting Botnets with NetFlow

... local network infected device botnet distribution web server botnet distribution web server botnet distribution web server TCP/80 SYN/ACK flags.. NFDUMP detection filter:.[r] ...

63

BotNets- Cyber Torrirism

BotNets- Cyber Torrirism

... The communication channel the Bot herder uses to remotely control the bots.. What is Botnets3[r] ...

35

Detection of traditional and new types of Malware using Host based detection scheme

Detection of traditional and new types of Malware using Host based detection scheme

... worms using various methods, e.g., network port scanning, email, file sharing, Peer-to-Peer (P2P) networks, and Instant Messaging ...local network or hitlist to infect previously identified ...

6

A geostatistical model for combined analysis of point level and area level data using INLA and SPDE

A geostatistical model for combined analysis of point level and area level data using INLA and SPDE

... ine just one variable, such as disease counts recorded in different administrative units. Here the aim is interpolation [3]. Alternatively, we might wish to relate one variable to other variables that are available at ...

27

Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters

Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters

... same host/port) and a moderate number of de- rived features (percentage of connections that have “SYN” errors, percentage of connections that have same or different service, ...sion detection scheme can be ...

10

Combined Economic And Emission Dispatch Using Artificial Neural Network

Combined Economic And Emission Dispatch Using Artificial Neural Network

... Neural Network approach for solving the Combined Economic and Emission Dispatch (CEED) problem using Radial Basis Function (RBF) based neural ...emission level simultaneously while satisfying ...

9

Show all 10000 documents...

Related subjects