Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

botnet traffic

biblio

Visible to the public Event graphs for the observation of botnet traffic

Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
  • information security
  • telecommunication traffic
  • statistical flow-based analysis
  • sensitive information
  • Resiliency
  • resilience
  • pubcrawl
  • privacy
  • network vulnerabilities
  • network resources
  • network event correlation method
  • Metrics
  • Malware Analysis
  • malware
  • Algorithm design and analysis
  • Image edge detection
  • Human behavior
  • host machines
  • graph theory
  • event graphs
  • cyber-crime campaigns
  • Correlation
  • computer security
  • computer network security
  • botnet traffic
  • botnet
  • bot programs
biblio

Visible to the public Early Detection of In-the-Wild Botnet Attacks by Exploiting Network Communication Uniformity: An Empirical Study

Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
  • Resiliency
  • multiple infected machines
  • network behaviour
  • network communication uniformity
  • outgoing bot attacks
  • port scanning attacks
  • pubcrawl
  • real-world spamming
  • resilience
  • Monitoring
  • Servers
  • synchronised behaviour
  • Synchronization
  • trojan horse detection
  • Trojan horses
  • unsolicited e-mail
  • widespread infection
  • botnet communication
  • malicious behaviour
  • large-scale malware propagation campaigns
  • invasive software
  • in-the-wild botnet attacks
  • early infection
  • early detection
  • distributed attack
  • cyber physical systems
  • computer network security
  • Computer crime
  • composability
  • command botnets
  • botnet-infected machines
  • botnet traffic
  • botnet controllers

Terms of Use  |  ©2023. CPS-VO