Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of service and to obtain sensitive data such as password information. These compromised machines are said to be infected with malicious software termed a “bot”. In this paper, we investigate the correlation of behavioural attributes such as keylogging and packet flooding behaviour to detect the existence of a single bot on a compromised machine by applying (1) Spearman’s rank correlation (SRC) algorithm and (2) the Dendritic Cell Algorithm (DCA). We also compare the output results generated from these two methods to the detection of a single bot. The results show that the...
Botnets, which consist of thousands of compromised machines, can cause a significant threat to other...
Host-based bot detection approaches discover malicious bot processes by signature comparison or beha...
A Botnet is a network of compromised hosts, called as bots that are used for malicious activity. The...
Malicious users try to compromise systems using new techniques. One of the recent techniques used by...
Ensuring the security of computers is a non-trivial task, with many techniques used by malicious use...
Ensuring the security of computers is a non-trivial task, with many techniques used by malicious use...
Over the past few years, IRC bots, malicious programs which are remotely controlled by the attacker,...
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker t...
When a bot master uses a control and commander (C&C) mechanism to assemble a large number of bot...
Cybersecurity is seriously threatened by Botnets, which are controlled networks of compromised compu...
A bot is a piece of software that is usually installed on an infected machine without the user's kno...
Botnet has become the most serious security threats on the current Internet infrastructure. Botnet i...
Since the dawn of the Internet, DDoS exhibits a serious threat to the Internet, in which large numbe...
The proliferation of cyber-attacks is accompanied by an urgent need to develop sophisticated detecti...
The dendritic cell algorithm (DCA) is an immune-inspired algorithm, developed for the purpose of ano...
Botnets, which consist of thousands of compromised machines, can cause a significant threat to other...
Host-based bot detection approaches discover malicious bot processes by signature comparison or beha...
A Botnet is a network of compromised hosts, called as bots that are used for malicious activity. The...
Malicious users try to compromise systems using new techniques. One of the recent techniques used by...
Ensuring the security of computers is a non-trivial task, with many techniques used by malicious use...
Ensuring the security of computers is a non-trivial task, with many techniques used by malicious use...
Over the past few years, IRC bots, malicious programs which are remotely controlled by the attacker,...
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker t...
When a bot master uses a control and commander (C&C) mechanism to assemble a large number of bot...
Cybersecurity is seriously threatened by Botnets, which are controlled networks of compromised compu...
A bot is a piece of software that is usually installed on an infected machine without the user's kno...
Botnet has become the most serious security threats on the current Internet infrastructure. Botnet i...
Since the dawn of the Internet, DDoS exhibits a serious threat to the Internet, in which large numbe...
The proliferation of cyber-attacks is accompanied by an urgent need to develop sophisticated detecti...
The dendritic cell algorithm (DCA) is an immune-inspired algorithm, developed for the purpose of ano...
Botnets, which consist of thousands of compromised machines, can cause a significant threat to other...
Host-based bot detection approaches discover malicious bot processes by signature comparison or beha...
A Botnet is a network of compromised hosts, called as bots that are used for malicious activity. The...