Avast and french police take over malware botnet and disinfect 850,000 computers ,
, Mid-year update: 2019 sonicwall cyber threat report
BotHunter: Detecting malware infection through ids-driven dialog correlation, Proceedings of the USENIX Security Symposium. USENIX Association, 2007. ,
BotSniffer: Detecting botnet command and control channels in network traffic, Proceedings of the Network and Distributed System Security Symposium (NDSS), 2008. ,
An empirical comparison of botnet detection methods, Computers & Security, vol.45, pp.100-123, 2014. ,
BotGM: Unsupervised graph mining to detect botnets in traffic flows, Proceedings of the Cyber Security in Networking Conference (CSNet), 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01636480
Exploring a service-based normal behaviour profiling system for botnet detection, Proceedings of the IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017. ,
A graphbased machine learning approach for bot detection, Proceedings of the IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2019. ,
, Stratosphere Lab. The CTU-13 Dataset. A Labeled Dataset with Botnet, Normal and Background traffic
Diagnosing network-wide traffic anomalies, ACM SIGCOMM Computer Communication Review, vol.34, issue.4, p.219, 2004. ,
Botnet detection using graph-based feature clustering, Journal of Big Data, vol.4, issue.1, 2017. ,
Botgrep: Finding p2p bots with structured graph analysis, Proceedings of the USENIX Security Symposium, pp.95-110, 2010. ,
Detecting p2p botnets by discovering flow dependency in c&c traffic, Peer-to-Peer Networking and Applications, vol.7, pp.320-331, 2012. ,
Detecting malware based on DNS graph mining, International Journal of Distributed Sensor Networks, vol.2015, pp.1-12, 2015. ,
Botnet detection based on anomaly and community detection, IEEE Transactions on Control of Network Systems, vol.4, issue.2, pp.392-404, 2017. ,
Themis: A data-driven approach to bot detection, IEEE INFOCOM 2018 -IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2018. ,
, Service name and transport protocol port number registry, 2013.
DDoS attacks in Q2 2019 ,
, Internet control message protocol (icmp) parameters
A density-based algorithm for discovering clusters in large spatial databases with noise, Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, pp.226-231, 1996. ,
A comprehensive survey on machine learning for networking: evolution, applications and research opportunities, Journal of Internet Services and Applications, vol.9, issue.1, 2018. ,