. Zdnet, Avast and french police take over malware botnet and disinfect 850,000 computers

, Mid-year update: 2019 sonicwall cyber threat report

G. Gu, P. Porras, V. Yegneswaran, and M. Fong, BotHunter: Detecting malware infection through ids-driven dialog correlation, Proceedings of the USENIX Security Symposium. USENIX Association, 2007.

G. Gu, J. Zhang, and W. Lee, BotSniffer: Detecting botnet command and control channels in network traffic, Proceedings of the Network and Distributed System Security Symposium (NDSS), 2008.

S. García, M. Grill, J. Stiborek, and A. Zunino, An empirical comparison of botnet detection methods, Computers & Security, vol.45, pp.100-123, 2014.

S. Lagraa, J. Francois, A. Lahmadi, M. Miner, C. Hammerschmidt et al., BotGM: Unsupervised graph mining to detect botnets in traffic flows, Proceedings of the Cyber Security in Networking Conference (CSNet), 2017.
URL : https://hal.archives-ouvertes.fr/hal-01636480

W. Chen, X. Luo, and A. N. Zincir-heywood, Exploring a service-based normal behaviour profiling system for botnet detection, Proceedings of the IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017.

A. A. Daya, M. A. Salahuddin, N. Limam, and R. Boutaba, A graphbased machine learning approach for bot detection, Proceedings of the IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2019.

, Stratosphere Lab. The CTU-13 Dataset. A Labeled Dataset with Botnet, Normal and Background traffic

A. Lakhina, M. Crovella, and C. Diot, Diagnosing network-wide traffic anomalies, ACM SIGCOMM Computer Communication Review, vol.34, issue.4, p.219, 2004.

S. Chowdhury, M. Khanzadeh, R. Akula, F. Zhang, S. Zhang et al., Botnet detection using graph-based feature clustering, Journal of Big Data, vol.4, issue.1, 2017.

S. Nagaraja, P. Mittal, C. Hong, M. Caesar, and N. Borisov, Botgrep: Finding p2p bots with structured graph analysis, Proceedings of the USENIX Security Symposium, pp.95-110, 2010.

H. Jiang and X. Shao, Detecting p2p botnets by discovering flow dependency in c&c traffic, Peer-to-Peer Networking and Applications, vol.7, pp.320-331, 2012.

F. Zou, S. Zhang, W. Rao, and P. Yi, Detecting malware based on DNS graph mining, International Journal of Distributed Sensor Networks, vol.2015, pp.1-12, 2015.

J. Wang and I. C. Paschalidis, Botnet detection based on anomaly and community detection, IEEE Transactions on Control of Network Systems, vol.4, issue.2, pp.392-404, 2017.

P. Kalmbach, A. Blenk, W. Kellerer, and S. Schmid, Themis: A data-driven approach to bot detection, IEEE INFOCOM 2018 -IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2018.

, Service name and transport protocol port number registry, 2013.

. Kaspersky, DDoS attacks in Q2 2019

, Internet control message protocol (icmp) parameters

M. Ester, H. Kriegel, J. Sander, and X. Xu, A density-based algorithm for discovering clusters in large spatial databases with noise, Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, pp.226-231, 1996.

R. Boutaba, M. A. Salahuddin, N. Limam, S. Ayoubi, N. Shahriar et al., A comprehensive survey on machine learning for networking: evolution, applications and research opportunities, Journal of Internet Services and Applications, vol.9, issue.1, 2018.