Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
P2P botnets
biblio
Collaborative botnet detection with partial communication graph information
Submitted by grigby1 on Mon, 12/04/2017 - 11:57am
Internet of Things
universal communication graph
Resiliency
pubcrawl
Peer-to-peer computing
peer-to-peer botnets
partial information
partial communication graph information
P2P networks
P2P botnets
Metrics
machine learning techniques
invasive software
Internet-of-Things devices
Algorithm design and analysis
Image edge detection
graph theory
graph analysis
Error analysis
detection errors
detection algorithms
computer network security
Computer crime
Compositionality
community detection algorithms
collaborative botnet detection
centralized command & control structure botnets
botnets
biblio
PeerHunter: Detecting peer-to-peer botnets through community behavior analysis
Submitted by grigby1 on Mon, 12/04/2017 - 11:57am
mutual contacts
Resiliency
pubcrawl
Protocols
potential botnet communities
PeerHunter
Peer-to-peer computing
peer-to-peer botnets
P2P hosts detection component
P2P botnets
network security
botnets
Metrics
IP networks
feature extraction
Electronic mail
cyber-crimes
computer network security
Computer crime
Compositionality
community behavior analysis based method
biblio
An efficient flow-based botnet detection using supervised machine learning
Submitted by BrandonB on Wed, 05/06/2015 - 9:20am
malicious botnet network traffic identification
Vegetation
Training
Traffic classification
Traffic analysis
telecommunication traffic
Support vector machines
supervised machine learning
Protocols
Peer-to-peer computing
packet flow
P2P botnets
nonmalicious applications
Accuracy
machine learning
learning (artificial intelligence)
invasive software
flow-based traffic analysis
flow-based botnet detection
feature extraction
computer network security
botnet neutralization
Botnet detection
botnet
Bayes methods