相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A Framework for Malicious Traffic Detection in IoT Healthcare Environment
Faisal Hussain et al.
SENSORS (2021)
Machine Learning for Misuse-Based Network Intrusion Detection: Overview, Unified Evaluation and Feature Choice Comparison Framework
Laurens Le Jeune et al.
IEEE ACCESS (2021)
Intrusion Detection Based on Sequential Information Preserving Log Embedding Methods and Anomaly Detection Algorithms
Czangyeob Kim et al.
IEEE ACCESS (2021)
Distributed denial of service attacks and its defenses in IoT: a survey
Mikail Mohammed Salim et al.
JOURNAL OF SUPERCOMPUTING (2020)
A survey of DDoS attacking techniques and defence mechanisms in the IoT network
Ruchi Vishwakarma et al.
TELECOMMUNICATION SYSTEMS (2020)
A novel graph-based approach for IoT botnet detection
Huy-Trung Nguyen et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2020)
BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors
Wei Wang et al.
INFORMATION SCIENCES (2020)
On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild
Morteza Safaei Pour et al.
COMPUTERS & SECURITY (2020)
Probe Delay Based Adaptive Port Scanning for IoT Devices with Private IP Address Behind NAT
Fengxiao Tang et al.
IEEE NETWORK (2020)
Deep learning-based classification model for botnet attack detection
Abdulghani Ali Ahmed et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020)
Spam filtering using a logistic regression model trained by an artificial bee colony algorithm
Bilge Kagan Dedeturk et al.
APPLIED SOFT COMPUTING (2020)
Detecting Internet of Things attacks using distributed deep learning
Gonzalo De La Torre Parra et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)
Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture†
Yan Naung Soe et al.
SENSORS (2020)
The Design of Large Scale IP Address and Port Scanning Tool
Chao Yuan et al.
SENSORS (2020)
Botnet Fingerprinting: A Frequency Distributions Scheme for Lightweight Bot Detection
Agathe Blaise et al.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2020)
A Hierarchical Hybrid Intrusion Detection Approach in IoT Scenarios
Giampaolo Bovenzi et al.
2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) (2020)
Systematic Literature Review on IoT-Based Botnet Attack
Ihsan Ali et al.
IEEE ACCESS (2020)
Hybrid Botnet Detection Based on Host and Network Analysis
Suzan Almutairi et al.
JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS (2020)
Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset
Nickolaos Koroniotis et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
An Intrusion Detection System Based on a Simplified Residual Network
Yuelei Xiao et al.
INFORMATION (2019)
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation
Michele De Donno et al.
SECURITY AND COMMUNICATION NETWORKS (2018)
IoT as a Land of Opportunity for DDoS Hackers
Natalija Vlajic et al.
COMPUTER (2018)
Botnet detection based on network flow summary and deep learning
Abdurrahman Pektas et al.
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT (2018)
A Multi-Level Intrusion Detection System for Wireless Sensor Networks Based on Immune Theory
Vishwa Teja Alaparthy et al.
IEEE ACCESS (2018)
N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders
Yair Meidan et al.
IEEE PERVASIVE COMPUTING (2018)
DDoS in the IoT: Mirai and Other Botnets
Constantinos Kolias et al.
COMPUTER (2017)
IoDDoS - The Internet of Distributed Denial of Service Attacks A Case Study of the Mirai Malware and IoT-Based Botnets
Roger Hallman et al.
IOTBDS: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (2017)
Survey of approaches and features for the identification of HTTP-based botnet traffic
Dilara Acarali et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
An empirical comparison of botnet detection methods
S. Garcia et al.
COMPUTERS & SECURITY (2014)