A. Blaise, M. Bouet, V. Conan, and S. Secci, BotFP: FingerPrints Clustering for Bot Detection, Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS), p.2020
URL : https://hal.archives-ouvertes.fr/hal-02501912

. Zdnet, Avast and french police take over malware botnet and disinfect 850,000 computers

. Zdnet, A hacking group is hijacking docker systems with exposed api endpoints

, Mid-year update: 2019 sonicwall cyber threat report

M. Mahmoud, M. Nir, and A. Matrawy, A survey on botnet architectures, detection and defences, I. J. Network Security, vol.17, pp.264-281, 2015.

B. Assadhan, A. Bashaiwth, J. Al-muhtadi, and S. Alshebeili, Analysis of p2p, IRC and HTTP traffic for botnets detection, vol.11, pp.848-861, 2017.

G. Gu, P. Porras, V. Yegneswaran, and M. Fong, BotHunter: Detecting malware infection through ids-driven dialog correlation, Proceedings of the USENIX Security Symposium. USENIX Association, 2007.

G. Gu, J. Zhang, and W. Lee, BotSniffer: Detecting botnet command and control channels in network traffic, Proceedings of the Network and Distributed System Security Symposium (NDSS), 2008.

S. García, M. Grill, J. Stiborek, and A. Zunino, An empirical comparison of botnet detection methods, Computers & Security, vol.45, pp.100-123, 2014.

S. García, V. Uhlí?, and M. Rehak, Identifying and modeling botnet c&c behaviors, Proceedings of the 1st International Workshop on Agents and CyberSecurity -ACySE '14, 2014.

S. Lagraa, J. Francois, A. Lahmadi, M. Miner, C. Hammerschmidt et al., BotGM: Unsupervised graph mining to detect botnets in traffic flows, Proceedings of the Cyber Security in Networking Conference (CSNet), 2017.
URL : https://hal.archives-ouvertes.fr/hal-01636480

W. Chen, X. Luo, and A. N. Zincir-heywood, Exploring a service-based normal behaviour profiling system for botnet detection, Proceedings of the IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017.

A. A. Daya, M. A. Salahuddin, N. Limam, and R. Boutaba, A graphbased machine learning approach for bot detection, Proceedings of the IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2019.

, Stratosphere Lab. The CTU-13 Dataset. A Labeled Dataset with Botnet, Normal and Background traffic

, Source code for BotFP algorithm, 2020.

M. F. Umer, M. Sher, and Y. Bi, Flow-based intrusion detection: Techniques and challenges, Computers & Security, vol.70, pp.238-254, 2017.

A. Lakhina, M. Crovella, and C. Diot, Diagnosing network-wide traffic anomalies, ACM SIGCOMM Computer Communication Review, vol.34, issue.4, p.219, 2004.

M. Su, G. Yu, and C. Lin, A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach, Computers & Security, vol.28, issue.5, pp.301-309, 2009.

X. Bai, T. Zhang, C. Wang, A. A. El-latif, and X. Niu, A fully automatic player detection method based on one-class SVM, IEICE Transactions on Information and Systems, vol.96, issue.2, pp.387-391, 2013.

A. A. El-latif, B. Abd-el-atty, W. Mazurczyk, C. Fung, and S. E. Venegas-andraca, Secure data encryption based on quantum walks for 5g internet of things scenario, IEEE Transactions on Network and Service Management, vol.17, issue.1, pp.118-131, 2020.

R. Bhatia, S. Benno, J. Esteban, T. V. Lakshman, and J. Grogan, Unsupervised machine learning for network-centric anomaly detection in IoT, Proceedings of the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks -Big-DAMA '19, 2019.

W. Lu and H. Tong, Detecting network anomalies using CUSUM and EM clustering, Advances in Computation and Intelligence, pp.297-308, 2009.

J. Francois, C. Wagner, R. State, and T. Engel, SAFEM: Scalable analysis of flows with entropic measures and SVM, 2012 IEEE Network Operations and Management Symposium, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00734967

M. Singh, M. Singh, and S. Kaur, Detecting bot-infected machines using DNS fingerprinting, Digital Investigation, vol.28, pp.14-33, 2019.

S. Chowdhury, M. Khanzadeh, R. Akula, F. Zhang, S. Zhang et al., Botnet detection using graph-based feature clustering, Journal of Big Data, vol.4, issue.1, 2017.

S. Nagaraja, P. Mittal, C. Hong, M. Caesar, and N. Borisov, BotGrep: Finding P2P Bots with Structured Graph Analysis, Proceedings of the USENIX Security Symposium, pp.95-110, 2010.

H. Jiang and X. Shao, Detecting p2p botnets by discovering flow dependency in c&c traffic, Peer-to-Peer Networking and Applications, vol.7, pp.320-331, 2012.

F. Zou, S. Zhang, W. Rao, and P. Yi, Detecting malware based on DNS graph mining, International Journal of Distributed Sensor Networks, vol.2015, pp.1-12, 2015.

J. Wang and I. C. Paschalidis, Botnet detection based on anomaly and community detection, IEEE Transactions on Control of Network Systems, vol.4, issue.2, pp.392-404, 2017.

P. Kalmbach, A. Blenk, W. Kellerer, and S. Schmid, Themis: A data-driven approach to bot detection, IEEE INFOCOM 2018 -IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2018.

, Malware Capture Facility Project

R. Boutaba, M. A. Salahuddin, N. Limam, S. Ayoubi, N. Shahriar et al., A comprehensive survey on machine learning for networking: evolution, applications and research opportunities, Journal of Internet Services and Applications, vol.9, issue.1, 2018.

, Service name and transport protocol port number registry, 2013.

L. Whois-domain, Available: www.whois.com/whois/ [38] IANA. Internet control message protocol (icmp) parameters

M. Ester, H. Kriegel, J. Sander, and X. Xu, A density-based algorithm for discovering clusters in large spatial databases with noise, Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, pp.226-231, 1996.

J. Bergstra and Y. Bengio, Random search for hyper-parameter optimization, Journal of Machine Learning Research, 2012.

G. Serpen and Z. Gao, Complexity analysis of multilayer perceptron neural network embedded into a wireless sensor network, Procedia Computer Science, vol.36, pp.192-197, 2014.

Y. Hou and X. F. Zheng, SVM based MLP neural network algorithm and application in intrusion detection, Artificial Intelligence and Computational Intelligence, pp.340-345, 2011.

A. Abdiansah and R. Wardoyo, Time complexity analysis of support vector machines (svm) in libsvm, International Journal of Computer Applications, 2015.

G. Sharma and F. Jurie, A novel approach for efficient SVM classification with histogram intersection kernel, Procedings of the British Machine Vision Conference 2013. British Machine Vision Association, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00943416

C. Chu, S. K. Kim, Y. Lin, Y. Yu, G. R. Bradski et al., Map-reduce for machine learning on multicore, Proceedings of NIPS, 2006.

Z. Zeng, A. K. Tung, J. Wang, J. Feng, and L. Zhou, Comparing stars, Proceedings of the VLDB Endowment, vol.2, pp.25-36, 2009.

A. D'alconzo, I. Drago, A. Morichetta, M. Mellia, and P. Casas, A survey on big data for network traffic monitoring and analysis, IEEE Transactions on Network and Service Management, vol.16, issue.3, pp.800-813, 2019.