Journal articles on the topic 'P2P Botnet Detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 48 journal articles for your research on the topic 'P2P Botnet Detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Xing, Ying, Hui Shu, Fei Kang, and Hao Zhao. "Peertrap: An Unstructured P2P Botnet Detection Framework Based on SAW Community Discovery." Wireless Communications and Mobile Computing 2022 (February 8, 2022): 1–18. http://dx.doi.org/10.1155/2022/9900396.
Full textKabla, Arkan Hammoodi Hasan, Achmad Husni Thamrin, Mohammed Anbar, Selvakumar Manickam, and Shankar Karuppayah. "PeerAmbush: Multi-Layer Perceptron to Detect Peer-to-Peer Botnet." Symmetry 14, no. 12 (2022): 2483. http://dx.doi.org/10.3390/sym14122483.
Full textZhang, You Lin. "Classification of Botnets and Botnet Defense Techniques." Applied Mechanics and Materials 373-375 (August 2013): 1665–69. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.1665.
Full textBaruah, Sangita, Dhruba Jyoti Borah, and Vaskar Deka. "Detection of Peer-to-Peer Botnet Using Machine Learning Techniques and Ensemble Learning Algorithm." International Journal of Information Security and Privacy 17, no. 1 (2023): 1–16. http://dx.doi.org/10.4018/ijisp.319303.
Full textBorah, Dhruba Jyoti, and Abhijit Sarma. "Detection of Peer-to-Peer Botnets using Graph Mining." International journal of Computer Networks & Communications 15, no. 2 (2023): 105–25. http://dx.doi.org/10.5121/ijcnc.2023.15206.
Full textSafar, Noor Zuraidin Mohd, Noryusliza Abdullah, Hazalila Kamaludin, Suhaimi Abd Ishak, and Mohd Rizal Mohd Isa. "Characterising and detection of botnet in P2P network for UDP protocol." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 3 (2020): 1584. http://dx.doi.org/10.11591/ijeecs.v18.i3.pp1584-1595.
Full textKhan, Riaz Ullah, Xiaosong Zhang, Rajesh Kumar, Abubakar Sharif, Noorbakhsh Amiri Golilarz, and Mamoun Alazab. "An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers." Applied Sciences 9, no. 11 (2019): 2375. http://dx.doi.org/10.3390/app9112375.
Full textYang, Zhixian, and Buhong Wang. "A Feature Extraction Method for P2P Botnet Detection Using Graphic Symmetry Concept." Symmetry 11, no. 3 (2019): 326. http://dx.doi.org/10.3390/sym11030326.
Full textRivière, Lionel, and Sven Dietrich. "Experiments with P2P Botnet Detection." it - Information Technology 54, no. 2 (2012): 90–95. http://dx.doi.org/10.1524/itit.2012.0668.
Full textYang, Zhixian, and Buhong Wang. "P2P Botnet Detection Based on Nodes Correlation by the Mahalanobis Distance." Information 10, no. 5 (2019): 160. http://dx.doi.org/10.3390/info10050160.
Full textGao, Jian, Kang Feng Zheng, Yi Xian Yang, and Xin Xin Niu. "Research of Key Nodes of Botnet Based on P2P." Applied Mechanics and Materials 88-89 (August 2011): 386–90. http://dx.doi.org/10.4028/www.scientific.net/amm.88-89.386.
Full textAlmutairi, Suzan, Saoucene Mahfoudh, Sultan Almutairi, and Jalal S. Alowibdi. "Hybrid Botnet Detection Based on Host and Network Analysis." Journal of Computer Networks and Communications 2020 (January 22, 2020): 1–16. http://dx.doi.org/10.1155/2020/9024726.
Full textYin, Chunyong. "Towards Accurate Node-Based Detection of P2P Botnets." Scientific World Journal 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/425491.
Full textN., Mohini. "Review on Botnet Threat Detection in P2P." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 2 (2015): 753–56. http://dx.doi.org/10.17762/ijritcc2321-8169.150266.
Full textHe, Jie, Yuexiang Yang, Xiaolei Wang, and Zhiguo Tan. "Adaptive traffic sampling for P2P botnet detection." International Journal of Network Management 27, no. 5 (2017): e1992. http://dx.doi.org/10.1002/nem.1992.
Full textLi, Yue, Ya Qin Fan, Duo Yang, and Kai Yuan Zheng. "Research of Botnet Base on P2P Protocol." Advanced Materials Research 860-863 (December 2013): 2758–61. http://dx.doi.org/10.4028/www.scientific.net/amr.860-863.2758.
Full textSun, Ru Xia, and Chun Yong Yin. "P2P Traffic Identification Algorithm Based on Topology." Advanced Materials Research 487 (March 2012): 297–300. http://dx.doi.org/10.4028/www.scientific.net/amr.487.297.
Full textAl-Nawasrah, Ahmad, Ammar Ali Almomani, Samer Atawneh, and Mohammad Alauthman. "A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing." International Journal of Cloud Applications and Computing 10, no. 3 (2020): 17–53. http://dx.doi.org/10.4018/ijcac.2020070102.
Full textIbrahim, Wan Nurhidayah, Mohd Syahid Anuar, Ali Selamat, and Ondrej Krejcar. "BOTNET DETECTION USING INDEPENDENT COMPONENT ANALYSIS." IIUM Engineering Journal 23, no. 1 (2022): 95–115. http://dx.doi.org/10.31436/iiumej.v23i1.1789.
Full textKaur, Navjot, and Sunny Behal. "P2P-BDS: Peer-2-Peer Botnet Detection System." IOSR Journal of Computer Engineering 16, no. 5 (2014): 28–33. http://dx.doi.org/10.9790/0661-16552833.
Full textLIU, Dan, Yi-chao LI, and Yue HU. "P2P-Botnet detection based on multi-stage filtration." Journal of Computer Applications 30, no. 12 (2011): 3354–56. http://dx.doi.org/10.3724/sp.j.1087.2010.03354.
Full textObeidat, Atef Ahmed, Majd Mahmoud Al-Kofahi, Mohammad Jazi Bawaneh, and Essam Said Hanandeh. "A Novel Botnet Detection System for P2P Networks." Journal of Computer Science 13, no. 8 (2017): 329–36. http://dx.doi.org/10.3844/jcssp.2017.329.336.
Full textZhang, Junjie, Roberto Perdisci, Wenke Lee, Xiapu Luo, and Unum Sarfraz. "Building a Scalable System for Stealthy P2P-Botnet Detection." IEEE Transactions on Information Forensics and Security 9, no. 1 (2014): 27–38. http://dx.doi.org/10.1109/tifs.2013.2290197.
Full textHuseynov, Khalid, Paul D. Yoo, and Kwangjo Kim. "Scalable P2P Botnet Detection with Threshold Setting in Hadoop Framework." Journal of the Korea Institute of Information Security and Cryptology 25, no. 4 (2015): 807–16. http://dx.doi.org/10.13089/jkiisc.2015.25.4.807.
Full textFan, Yuhui, and Ning Xu. "A P2P Botnet Detection Method Used On-line Monitoring and Off-line Detection." International Journal of Security and Its Applications 8, no. 3 (2014): 87–96. http://dx.doi.org/10.14257/ijsia.2014.8.3.10.
Full textTarng, Wernhuar. "A P2P Botnet Virus Detection System Based on Data-Mining Algorithms." International Journal of Computer Science and Information Technology 4, no. 5 (2012): 51–65. http://dx.doi.org/10.5121/ijcsit.2012.4505.
Full textAlauthaman, Mohammad, Nauman Aslam, Li Zhang, Rafe Alasem, and M. A. Hossain. "A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks." Neural Computing and Applications 29, no. 11 (2016): 991–1004. http://dx.doi.org/10.1007/s00521-016-2564-5.
Full textLIU, Jian-bo. "The Detection of Intrusion Through P2P Botnet Based on the Analysis of Successful Connection Rate and Average Packet." International Journal of Engineering and Manufacturing 2, no. 1 (2012): 22–26. http://dx.doi.org/10.5815/ijem.2012.01.04.
Full textSun, Lei, Wei Du, and Na Che. "Data Center Protection Problems in the Zombie Network." Applied Mechanics and Materials 727-728 (January 2015): 948–50. http://dx.doi.org/10.4028/www.scientific.net/amm.727-728.948.
Full textSu, Shang-Chiuan, Yi-Ren Chen, Shi-Chun Tsai, and Yi-Bing Lin. "Detecting P2P Botnet in Software Defined Networks." Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/4723862.
Full textRodríguez-Gómez, Rafael A., Gabriel Maciá-Fernández, Pedro García-Teodoro, Moritz Steiner, and Davide Balzarotti. "Resource monitoring for the detection of parasite P2P botnets." Computer Networks 70 (September 2014): 302–11. http://dx.doi.org/10.1016/j.comnet.2014.05.016.
Full textAsSadhan, Basil, Abdulmuneem Bashaiwth, Jalal Al-Muhtadi, and Saleh Alshebeili. "Analysis of P2P, IRC and HTTP traffic for botnets detection." Peer-to-Peer Networking and Applications 11, no. 5 (2017): 848–61. http://dx.doi.org/10.1007/s12083-017-0586-0.
Full textHuang, Zhiyong, Xiaoping Zeng, and Yong Liu. "Detecting and blocking P2P botnets through contact tracing chains." International Journal of Internet Protocol Technology 5, no. 1/2 (2010): 44. http://dx.doi.org/10.1504/ijipt.2010.032614.
Full textAhmed Al-Azzawi, Nemir, and Shatha Mizhir Hasan. "Detection of P2P Botnets Based on Support Vector Machine: Case Study." Engineering and Technology Journal 32, no. 5 (2014): 1227–39. http://dx.doi.org/10.30684/etj.32.5a.12.
Full textSong, Yuanzhang. "Detecting P2P botnet by analyzing macroscopic characteristics with fractal and information fusion." China Communications 12, no. 2 (2015): 107–17. http://dx.doi.org/10.1109/cc.2015.7084406.
Full textBorah, Dhruba Jyoti, and Abhijit Sarma. "Cyber pirating and Detection of malicious activities p2p botnets using Markov cluster algorithm." International Journal of Electronics and Applied Research 4, no. 1 (2017): 24–36. http://dx.doi.org/10.33665/ijear.2017.v04i01.001.
Full textJiang, Hongling, and Xiuli Shao. "Detecting P2P botnets by discovering flow dependency in C&C traffic." Peer-to-Peer Networking and Applications 7, no. 4 (2012): 320–31. http://dx.doi.org/10.1007/s12083-012-0150-x.
Full textBarthakur, Pijush, Manoj Dahal, and Mrinal Kanti Ghose. "An Efficient Machine Learning Based Classification Scheme for Detecting Distributed Command & Control Traffic of P2P Botnets." International Journal of Modern Education and Computer Science 5, no. 10 (2013): 9–18. http://dx.doi.org/10.5815/ijmecs.2013.10.02.
Full textWan Yusuf, Wan Ahmad Ramzi, and Faizal M. A, Rudy Fadhlee M. D, Nur Hidayah M. S. "Revealing Influenced Selected Feature for P2P Botnet Detection." International Journal of Communication Networks and Information Security (IJCNIS) 9, no. 3 (2022). http://dx.doi.org/10.17762/ijcnis.v9i3.2927.
Full textK P, Pavana, Rohith Adiga H R, Shubha M L, Vinayaka Patil K G, and Mohan H G. "Botnet Detection Based on Machine Learning Techniques in P2P Networks." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 04 (2023). http://dx.doi.org/10.55041/ijsrem18697.
Full text"Building a Scalable System for Stealthy P2P-Botnet Detection." International Journal of Modern Trends in Engineering & Research 4, no. 5 (2017): 168–74. http://dx.doi.org/10.21884/ijmter.2017.4170.ssujw.
Full textXu, Lei, XiaoLong Xu, and Yue Zhuo. "P2P Botnet Detection Using Min-Vertex Cover." Journal of Networks 7, no. 8 (2012). http://dx.doi.org/10.4304/jnw.7.8.1176-1181.
Full text"Identifying Botnets: Classification and Detection." International Journal of Innovative Technology and Exploring Engineering 8, no. 9S (2019): 131–37. http://dx.doi.org/10.35940/ijitee.i1021.0789s19.
Full textWang, Binbin, Zhitang Li, Dong Li, Hao Chen, Feng Liu, and ZhengBin Hu. "The Aggregation and Stability Analysis of Network Traffic for Structured-P2P-based Botnet Detection." Journal of Networks 5, no. 5 (2010). http://dx.doi.org/10.4304/jnw.5.5.517-526.
Full textZeidanloo, Hossein Rouhani, Farhoud Hosseinpour, and Farhood Farid Etemad. "New Approach for Detection of IRC and P2P Botnets." International Journal of Computer and Electrical Engineering, 2010, 1029–38. http://dx.doi.org/10.7763/ijcee.2010.v2.271.
Full textSyahirah, Raihana, Faizal M., and Zul Azri. "Multivariate Statistical Analysis on Anomaly P2P Botnets Detection." International Journal of Advanced Computer Science and Applications 8, no. 12 (2017). http://dx.doi.org/10.14569/ijacsa.2017.081259.
Full textSyahirah, Raihana, Faizal M.A., Zul Azri, and Nurulhuda Ahmad. "Automated Simulation P2P Botnets Signature Detection by Rule-based Approach." International Journal of Advanced Computer Science and Applications 7, no. 8 (2016). http://dx.doi.org/10.14569/ijacsa.2016.070819.
Full textChoi, Seung-hwan. "Detecting Members of P2P Botnets Using Probabilistic Dye-Pumping Algorithm." Korea Institute of Information Technology Review 11, no. 5 (2013). http://dx.doi.org/10.14801/kiitr.2013.11.5.85.
Full text