An effective method for preventing the operation of computer network nodes for organizing a botnet is proposed. A botnet is a collection of devices connected via the Internet for the purpose of organizing DDoS attacks, stealing data, sending spam and other malicious actions. The described method implies the detection of generated domain names in DNS queries using a neural network with parallel organization of convolutional and bidirectional recurrent layers. The effectiveness of the method is based on the assumption that generated domain names are used to create a botnet for merging. Experiments confirm that the proposed neural network is superior to the accuracy of existing counterparts on the UMUDGA dataset. The estimation of the quality ...
Botnets enable many cyber-criminal activities, such as DDoS attacks, banking fraud and cyberespionag...
In recent years, botnets have become one of the major threats to information security because they h...
Domain Name Service is a central part of Internet regular operation. Such importance has made it a c...
Networks of maliciously compromised computers, known as botnets, consisting of thousands of hosts ha...
Malware typically uses Domain Generation Algorithms (DGAs) as a mechanism to contact their Command a...
Cyberattacks by botnets keep on increasing. In this research, we aim to detect and block Domain Gene...
Domain generation algorithm (DGA) is used as the main source of script in different groups of malwar...
Botnets are one of the major cyber infections used in several criminal activities. In most botnets, ...
Domain Generation Algorithms (DGAs) are a popular technique used by contemporary malware for command...
Botnets provide the basis for various cyber-threats. However, setting up a complex botnet infrastruc...
Malware is becoming more intelligent as static methods for blocking communication with Command and C...
In order to stay undetected and keep their operations alive, cyber criminals are continuously evolvi...
Several families of malware are based on the need to establish a connection with a Command and Contr...
Malware applications typically use a command and control (C&C) server to manage bots to perform mali...
Artificial Intelligence is often part of state-of-the-art Intrusion Detection Systems. However, atta...
Botnets enable many cyber-criminal activities, such as DDoS attacks, banking fraud and cyberespionag...
In recent years, botnets have become one of the major threats to information security because they h...
Domain Name Service is a central part of Internet regular operation. Such importance has made it a c...
Networks of maliciously compromised computers, known as botnets, consisting of thousands of hosts ha...
Malware typically uses Domain Generation Algorithms (DGAs) as a mechanism to contact their Command a...
Cyberattacks by botnets keep on increasing. In this research, we aim to detect and block Domain Gene...
Domain generation algorithm (DGA) is used as the main source of script in different groups of malwar...
Botnets are one of the major cyber infections used in several criminal activities. In most botnets, ...
Domain Generation Algorithms (DGAs) are a popular technique used by contemporary malware for command...
Botnets provide the basis for various cyber-threats. However, setting up a complex botnet infrastruc...
Malware is becoming more intelligent as static methods for blocking communication with Command and C...
In order to stay undetected and keep their operations alive, cyber criminals are continuously evolvi...
Several families of malware are based on the need to establish a connection with a Command and Contr...
Malware applications typically use a command and control (C&C) server to manage bots to perform mali...
Artificial Intelligence is often part of state-of-the-art Intrusion Detection Systems. However, atta...
Botnets enable many cyber-criminal activities, such as DDoS attacks, banking fraud and cyberespionag...
In recent years, botnets have become one of the major threats to information security because they h...
Domain Name Service is a central part of Internet regular operation. Such importance has made it a c...