BotFP: FingerPrints Clustering for Bot Detection, Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS), p.2020 ,
URL : https://hal.archives-ouvertes.fr/hal-02501912
Avast and french police take over malware botnet and disinfect 850,000 computers ,
A hacking group is hijacking docker systems with exposed api endpoints ,
, Mid-year update: 2019 sonicwall cyber threat report
A survey on botnet architectures, detection and defences, I. J. Network Security, vol.17, pp.264-281, 2015. ,
Analysis of p2p, IRC and HTTP traffic for botnets detection, vol.11, pp.848-861, 2017. ,
BotHunter: Detecting malware infection through ids-driven dialog correlation, Proceedings of the USENIX Security Symposium. USENIX Association, 2007. ,
BotSniffer: Detecting botnet command and control channels in network traffic, Proceedings of the Network and Distributed System Security Symposium (NDSS), 2008. ,
An empirical comparison of botnet detection methods, Computers & Security, vol.45, pp.100-123, 2014. ,
Identifying and modeling botnet c&c behaviors, Proceedings of the 1st International Workshop on Agents and CyberSecurity -ACySE '14, 2014. ,
BotGM: Unsupervised graph mining to detect botnets in traffic flows, Proceedings of the Cyber Security in Networking Conference (CSNet), 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01636480
Exploring a service-based normal behaviour profiling system for botnet detection, Proceedings of the IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017. ,
A graphbased machine learning approach for bot detection, Proceedings of the IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2019. ,
, Stratosphere Lab. The CTU-13 Dataset. A Labeled Dataset with Botnet, Normal and Background traffic
, Source code for BotFP algorithm, 2020.
Flow-based intrusion detection: Techniques and challenges, Computers & Security, vol.70, pp.238-254, 2017. ,
Diagnosing network-wide traffic anomalies, ACM SIGCOMM Computer Communication Review, vol.34, issue.4, p.219, 2004. ,
A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach, Computers & Security, vol.28, issue.5, pp.301-309, 2009. ,
A fully automatic player detection method based on one-class SVM, IEICE Transactions on Information and Systems, vol.96, issue.2, pp.387-391, 2013. ,
Secure data encryption based on quantum walks for 5g internet of things scenario, IEEE Transactions on Network and Service Management, vol.17, issue.1, pp.118-131, 2020. ,
Unsupervised machine learning for network-centric anomaly detection in IoT, Proceedings of the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks -Big-DAMA '19, 2019. ,
Detecting network anomalies using CUSUM and EM clustering, Advances in Computation and Intelligence, pp.297-308, 2009. ,
SAFEM: Scalable analysis of flows with entropic measures and SVM, 2012 IEEE Network Operations and Management Symposium, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00734967
Detecting bot-infected machines using DNS fingerprinting, Digital Investigation, vol.28, pp.14-33, 2019. ,
Botnet detection using graph-based feature clustering, Journal of Big Data, vol.4, issue.1, 2017. ,
BotGrep: Finding P2P Bots with Structured Graph Analysis, Proceedings of the USENIX Security Symposium, pp.95-110, 2010. ,
Detecting p2p botnets by discovering flow dependency in c&c traffic, Peer-to-Peer Networking and Applications, vol.7, pp.320-331, 2012. ,
Detecting malware based on DNS graph mining, International Journal of Distributed Sensor Networks, vol.2015, pp.1-12, 2015. ,
Botnet detection based on anomaly and community detection, IEEE Transactions on Control of Network Systems, vol.4, issue.2, pp.392-404, 2017. ,
Themis: A data-driven approach to bot detection, IEEE INFOCOM 2018 -IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2018. ,
, Malware Capture Facility Project
A comprehensive survey on machine learning for networking: evolution, applications and research opportunities, Journal of Internet Services and Applications, vol.9, issue.1, 2018. ,
, Service name and transport protocol port number registry, 2013.
Available: www.whois.com/whois/ [38] IANA. Internet control message protocol (icmp) parameters ,
A density-based algorithm for discovering clusters in large spatial databases with noise, Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, pp.226-231, 1996. ,
Random search for hyper-parameter optimization, Journal of Machine Learning Research, 2012. ,
Complexity analysis of multilayer perceptron neural network embedded into a wireless sensor network, Procedia Computer Science, vol.36, pp.192-197, 2014. ,
SVM based MLP neural network algorithm and application in intrusion detection, Artificial Intelligence and Computational Intelligence, pp.340-345, 2011. ,
Time complexity analysis of support vector machines (svm) in libsvm, International Journal of Computer Applications, 2015. ,
A novel approach for efficient SVM classification with histogram intersection kernel, Procedings of the British Machine Vision Conference 2013. British Machine Vision Association, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00943416
Map-reduce for machine learning on multicore, Proceedings of NIPS, 2006. ,
Comparing stars, Proceedings of the VLDB Endowment, vol.2, pp.25-36, 2009. ,
A survey on big data for network traffic monitoring and analysis, IEEE Transactions on Network and Service Management, vol.16, issue.3, pp.800-813, 2019. ,