A Hybrid Multi-Tier Approach For Iot Botnet Detection And Enhanced Risk Assessment
The proliferation of internet of things (iot) devices has led to new cybersecurity challenges. A significant issue is the increasing occurrence of iot botnets, which refers to networks of compromised iot devices like routers, ip cameras, and smart appliances. These compromised entities are strategic...
| Main Author: | Ali, Mashaleh Ashraf Sulieman |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2025
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/63689/ |
| Abstract | Abstract here |
Similar Items
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Layered Botnet Detection Framework Based On Signal
Processing And Discrete Time Analysis
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
Enhanced 3-Tier Storage Management Scheme For Flash Memory-Based Solid State Disk
by: Alsalibi, Ahmed I N
Published: (2017)
by: Alsalibi, Ahmed I N
Published: (2017)
An Approach For Detection Of Logical Inconsistency
by: Yadav, Rinki
Published: (2012)
by: Yadav, Rinki
Published: (2012)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
Multi-View Retrieval Of Software Design Specifications Using Similarity Assessment Approach
by: Adamu, Alhassan
Published: (2017)
by: Adamu, Alhassan
Published: (2017)
Feature Selection Method Based On Hybrid Filter-Metaheuristic Wrapper Approach
by: Jothi, Neesha
Published: (2020)
by: Jothi, Neesha
Published: (2020)
Heuristic Based Planning Approach For
Improving Wireless Network Coverage Of Multi-Storey Building
by: Yeong, Shoa Yei
Published: (2011)
by: Yeong, Shoa Yei
Published: (2011)
Multi-fish Detection And Tracking Using Track-mask Region
Convolutional Neural Network
by: Alshdaifat, Nawaf Farhan Fankur
Published: (2023)
by: Alshdaifat, Nawaf Farhan Fankur
Published: (2023)
Software Model Checking For Distributed Applications Using Hybridization Of Centralization And Cache Approaches
by: Hing, Ratana
Published: (2024)
by: Hing, Ratana
Published: (2024)
Passive operating system fingerprinting based on multi-layered sub-signature matching scheme (MLSMS).
by: Aljammal, Ashraf Hamdan Rashid
Published: (2011)
by: Aljammal, Ashraf Hamdan Rashid
Published: (2011)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
Multi Criteria Decision Making Approach For Product Aspect Extraction And Ranking In Aspect-Based Sentiment Analysis
by: Alrababah, Saif Addeen Ahmad Ali
Published: (2018)
by: Alrababah, Saif Addeen Ahmad Ali
Published: (2018)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Hybrid Region Merging For Image Segmentation Using Optimal Global Feature With Global Merging Criterion Approach
by: Vadiveloo, Mogana
Published: (2020)
by: Vadiveloo, Mogana
Published: (2020)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
Improved Multi-Verse Optimizer In Text Document Clustering For Topic Extraction
by: Abasi, Ammar Kamal Mousa
Published: (2021)
by: Abasi, Ammar Kamal Mousa
Published: (2021)
Enhanced Micro Genetic
Algorithm-Based Models For
Multi-Objective Optimization
by: Tan, Choo Jun
Published: (2014)
by: Tan, Choo Jun
Published: (2014)
Compute Language Interface: A Transparent Wrapper Library For Multi Cpu-Gpu
by: Ooi, Keng Siang
Published: (2013)
by: Ooi, Keng Siang
Published: (2013)
An Efficient Distributed Slotted Multi-Hop Wireless Mac Protocol For Internet Of Things
by: Sarvghadi, Mohammad Ali
Published: (2021)
by: Sarvghadi, Mohammad Ali
Published: (2021)
Automated Fish Detection And Identification
by: Wong , Poh Lee
Published: (2015)
by: Wong , Poh Lee
Published: (2015)
A Data Grid Replica Management System With
Local And Global Multi-Objective Optimization
by: E. Almistarihi, Husni Hamad
Published: (2009)
by: E. Almistarihi, Husni Hamad
Published: (2009)
Graph-Based Algorithm With Self-Weighted And Adaptive Neighbours Learning For Multi-View Clustering
by: He, Yanfang
Published: (2024)
by: He, Yanfang
Published: (2024)
Fuzzy-Monte Carlo Simulation For Risk Analysis In Investment Project Evaluation
by: Hamundu, Ferdinand Murni
Published: (2011)
by: Hamundu, Ferdinand Murni
Published: (2011)
A Visual Approach For Requirement Traceability
by: Madaki, Abdulkadir Ahmad
Published: (2022)
by: Madaki, Abdulkadir Ahmad
Published: (2022)
Fusion Of Global Shape And Local Features Using Multi Classifier Framework For Object Class Recognition
by: Manshor, Noridayu
Published: (2013)
by: Manshor, Noridayu
Published: (2013)
Adapting And Enhancing Hybrid Computational Methods For RNA
Secondary Structure Prediction
by: Al-Khatib, Ra’ed Mohammad Ali
Published: (2011)
by: Al-Khatib, Ra’ed Mohammad Ali
Published: (2011)
Clustering Ensemble And Hybrid Of
Deep Learning For Spatio-Temporal
Crime Predictions
by: Butt, Umair Muneer
Published: (2024)
by: Butt, Umair Muneer
Published: (2024)
Keyword Competition Approach In
Ranked Document Retrieval
by: Sihombing, Poltak
Published: (2010)
by: Sihombing, Poltak
Published: (2010)
Adapting And Hybrid Ising Harmony Search With Metaheuristic Components For University Course Timetabling
by: Al-Betar, Mohammed Azmi
Published: (2010)
by: Al-Betar, Mohammed Azmi
Published: (2010)
Parallel Quick-Skip Search Hybrid Algorithm For The Exact String Matching Problem.
by: Naser, Mustafa Abdulsahib
Published: (2010)
by: Naser, Mustafa Abdulsahib
Published: (2010)
A Multi-objective Evolutionary Algorithm Based On Decomposition For Continuous Optimization Using A Step-function Technique
by: Chuah, How Siang
Published: (2022)
by: Chuah, How Siang
Published: (2022)
Enhanced and automated approaches for fish recognition and classification system
by: Samma, Ali Salem Ali
Published: (2011)
by: Samma, Ali Salem Ali
Published: (2011)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
Hybrid Mac Protocol With Intra- Cluster Communications For Extending Wireless Sensor Network Lifetimes
by: Elsmany, Eyman Fathelrhman Ahmed
Published: (2019)
by: Elsmany, Eyman Fathelrhman Ahmed
Published: (2019)
Similar Items
-
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018) -
Layered Botnet Detection Framework Based On Signal
Processing And Discrete Time Analysis
by: Melhim, Loai Kayed Hassan Bani
Published: (2012) -
Enhanced 3-Tier Storage Management Scheme For Flash Memory-Based Solid State Disk
by: Alsalibi, Ahmed I N
Published: (2017) -
An Approach For Detection Of Logical Inconsistency
by: Yadav, Rinki
Published: (2012) -
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
