Rule-Based Approach For Detecting Botnet Based On Domain Name System
Botnets are a serious problem in today’s Internet, and they result in economic damage for organizations and individuals. Botnets consist of thousands of infected hosts that receive instructions from command and control (C&C) servers operated by an individual. Traditionally, Internet Relay Chat (...
| Main Author: | Alieyan, Kamal Ibrahim Ahmed |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/43654/ |
| Abstract | Abstract here |
Similar Items
Layered Botnet Detection Framework Based On Signal
Processing And Discrete Time Analysis
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
A Hybrid Multi-Tier Approach For Iot Botnet Detection And Enhanced Risk Assessment
by: Ali, Mashaleh Ashraf Sulieman
Published: (2025)
by: Ali, Mashaleh Ashraf Sulieman
Published: (2025)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
Rule Generation Based On Structural Clustering For Automatic Question Answering
by: Song , Shen
Published: (2009)
by: Song , Shen
Published: (2009)
Similarity-Based Weights For
Cross-Domain Sentiment Classification Of Product Reviews
by: Gupta, Aditi
Published: (2023)
by: Gupta, Aditi
Published: (2023)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
An Approach For Detection Of Logical Inconsistency
by: Yadav, Rinki
Published: (2012)
by: Yadav, Rinki
Published: (2012)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
An Ontology And Constraint-based Approach For Dynamic Personalised Planning In Healthcare
by: Mahiddin , Normadiah
Published: (2009)
by: Mahiddin , Normadiah
Published: (2009)
Similarity Segmentation Approach For Sensor-Based Human Activity Recognition
by: Baraka, Abdulrahman M. A.
Published: (2024)
by: Baraka, Abdulrahman M. A.
Published: (2024)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
Feature Selection Method Based On Hybrid Filter-Metaheuristic Wrapper Approach
by: Jothi, Neesha
Published: (2020)
by: Jothi, Neesha
Published: (2020)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
Behavioural Factors Based Crowd
Evacuation Modelling Using
Fuzzy-Neural Approach
by: Zakaria, Wahida
Published: (2020)
by: Zakaria, Wahida
Published: (2020)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Tile-Level Parallelism For H.264/Avc Codec Using Parallel Domain Decomposition Algorithm On Shared Memory Architecture
by: Eessa, Mohammed F.
Published: (2015)
by: Eessa, Mohammed F.
Published: (2015)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008)
by: A. Alia, Mohammad Ahmad
Published: (2008)
Heuristic Based Planning Approach For
Improving Wireless Network Coverage Of Multi-Storey Building
by: Yeong, Shoa Yei
Published: (2011)
by: Yeong, Shoa Yei
Published: (2011)
Multi Criteria Decision Making Approach For Product Aspect Extraction And Ranking In Aspect-Based Sentiment Analysis
by: Alrababah, Saif Addeen Ahmad Ali
Published: (2018)
by: Alrababah, Saif Addeen Ahmad Ali
Published: (2018)
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
by: SALLIM, JAMALUDIN
Published: (2017)
by: SALLIM, JAMALUDIN
Published: (2017)
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
by: Sallim, Jamaludin
Published: (2017)
by: Sallim, Jamaludin
Published: (2017)
Profiling Ict Academics At Malaysian
Research Universities (Rus) On Their
Commercialization Approaches
Based On Personal Attributes: A
Grounded Theory Study
by: Othman, Hafizul
Published: (2015)
by: Othman, Hafizul
Published: (2015)
Gpu Based Fast Phylogenetic Tree
Construction Algorithm With Reduce
Dataset
by: Ibrahim, Najihah
Published: (2016)
by: Ibrahim, Najihah
Published: (2016)
Enhancing Svd-Based Image
Watermarking Strategies Based On
Digital Chaos
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022)
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022)
Enhanced 3-Tier Storage Management Scheme For Flash Memory-Based Solid State Disk
by: Alsalibi, Ahmed I N
Published: (2017)
by: Alsalibi, Ahmed I N
Published: (2017)
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
Cloud Resource Management Framework Using Monarch Butterfly Harmony Search And Case Based Reasoning
by: Ahmed Mohamed Ghetas, Mohamed Rezk
Published: (2017)
by: Ahmed Mohamed Ghetas, Mohamed Rezk
Published: (2017)
An Efficiency Analysis Of Seaports Using Extended
Window Analysis, Malmquist Index And Simar-wilson
Approach
by: Naser Al-Eraqi , Ahmed Salem
Published: (2009)
by: Naser Al-Eraqi , Ahmed Salem
Published: (2009)
Automated Fish Detection And Identification
by: Wong , Poh Lee
Published: (2015)
by: Wong , Poh Lee
Published: (2015)
Analogical Learner For Natural Language Processing Based On Structured String-tree Correspondence (sstc) And
Case-based Reasoning
by: Lim, Huan Ngee
Published: (2009)
by: Lim, Huan Ngee
Published: (2009)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
A Visual Approach For Requirement Traceability
by: Madaki, Abdulkadir Ahmad
Published: (2022)
by: Madaki, Abdulkadir Ahmad
Published: (2022)
Keyword Competition Approach In
Ranked Document Retrieval
by: Sihombing, Poltak
Published: (2010)
by: Sihombing, Poltak
Published: (2010)
Harmony Search-Based Hyper-Heuristic For Scheduling Problems
by: Anwar, Khairul
Published: (2018)
by: Anwar, Khairul
Published: (2018)
Division-Based Methods For Large Point Sets Registration
by: Chen , Junfen
Published: (2016)
by: Chen , Junfen
Published: (2016)
Similar Items
-
Layered Botnet Detection Framework Based On Signal
Processing And Discrete Time Analysis
by: Melhim, Loai Kayed Hassan Bani
Published: (2012) -
A Hybrid Multi-Tier Approach For Iot Botnet Detection And Enhanced Risk Assessment
by: Ali, Mashaleh Ashraf Sulieman
Published: (2025) -
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022) -
Rule Generation Based On Structural Clustering For Automatic Question Answering
by: Song , Shen
Published: (2009) -
Similarity-Based Weights For
Cross-Domain Sentiment Classification Of Product Reviews
by: Gupta, Aditi
Published: (2023)
