Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    Double DQN Method For Botnet Traffic Detection System

    Yutao Hu1, Yuntao Zhao1,*, Yongxin Feng2, Xiangyu Ma1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 509-530, 2024, DOI:10.32604/cmc.2024.042216

    Abstract In the face of the increasingly severe Botnet problem on the Internet, how to effectively detect Botnet traffic in real-time has become a critical problem. Although the existing deep Q network (DQN) algorithm in Deep reinforcement learning can solve the problem of real-time updating, its prediction results are always higher than the actual results. In Botnet traffic detection, although it performs well in the training set, the accuracy rate of predicting traffic is as high as%; however, in the test set, its accuracy has declined, and it is impossible to adjust its prediction strategy on time based on new data… More >

  • Open Access

    ARTICLE

    IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO

    Ashraf S. Mashaleh1,2,*, Noor Farizah Binti Ibrahim1, Mohammad Alauthman3, Mohammad Almseidin4, Amjad Gawanmeh5

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2245-2267, 2024, DOI:10.32604/cmc.2023.047323

    Abstract Increasing Internet of Things (IoT) device connectivity makes botnet attacks more dangerous, carrying catastrophic hazards. As IoT botnets evolve, their dynamic and multifaceted nature hampers conventional detection methods. This paper proposes a risk assessment framework based on fuzzy logic and Particle Swarm Optimization (PSO) to address the risks associated with IoT botnets. Fuzzy logic addresses IoT threat uncertainties and ambiguities methodically. Fuzzy component settings are optimized using PSO to improve accuracy. The methodology allows for more complex thinking by transitioning from binary to continuous assessment. Instead of expert inputs, PSO data-driven tunes rules and membership functions. This study presents a… More >

  • Open Access

    ARTICLE

    IoT-Cloud Assisted Botnet Detection Using Rat Swarm Optimizer with Deep Learning

    Saeed Masoud Alshahrani1, Fatma S. Alrayes2, Hamed Alqahtani3, Jaber S. Alzahrani4, Mohammed Maray5, Sana Alazwari6, Mohamed A. Shamseldin7, Mesfer Al Duhayyim8,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3085-3100, 2023, DOI:10.32604/cmc.2023.032972

    Abstract Nowadays, Internet of Things (IoT) has penetrated all facets of human life while on the other hand, IoT devices are heavily prone to cyberattacks. It has become important to develop an accurate system that can detect malicious attacks on IoT environments in order to mitigate security risks. Botnet is one of the dreadful malicious entities that has affected many users for the past few decades. It is challenging to recognize Botnet since it has excellent carrying and hidden capacities. Various approaches have been employed to identify the source of Botnet at earlier stages. Machine Learning (ML) and Deep Learning (DL)… More >

  • Open Access

    ARTICLE

    BotSward: Centrality Measures for Graph-Based Bot Detection Using Machine Learning

    Khlood Shinan1,2, Khalid Alsubhi2, M. Usman Ashraf3,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 693-714, 2023, DOI:10.32604/cmc.2023.031641

    Abstract The number of botnet malware attacks on Internet devices has grown at an equivalent rate to the number of Internet devices that are connected to the Internet. Bot detection using machine learning (ML) with flow-based features has been extensively studied in the literature. Existing flow-based detection methods involve significant computational overhead that does not completely capture network communication patterns that might reveal other features of malicious hosts. Recently, Graph-Based Bot Detection methods using ML have gained attention to overcome these limitations, as graphs provide a real representation of network communications. The purpose of this study is to build a botnet… More >

  • Open Access

    ARTICLE

    A Learning Model to Detect Android C&C Applications Using Hybrid Analysis

    Attia Qammar1, Ahmad Karim1,*, Yasser Alharbi2, Mohammad Alsaffar2, Abdullah Alharbi2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 915-930, 2022, DOI:10.32604/csse.2022.023652

    Abstract Smartphone devices particularly Android devices are in use by billions of people everywhere in the world. Similarly, this increasing rate attracts mobile botnet attacks which is a network of interconnected nodes operated through the command and control (C&C) method to expand malicious activities. At present, mobile botnet attacks launched the Distributed denial of services (DDoS) that causes to steal of sensitive data, remote access, and spam generation, etc. Consequently, various approaches are defined in the literature to detect mobile botnet attacks using static or dynamic analysis. In this paper, a novel hybrid model, the combination of static and dynamic methods… More >

  • Open Access

    ARTICLE

    Pattern Analysis and Regressive Linear Measure for Botnet Detection

    B. Padmavathi1,2,*, B. Muthukumar3

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 119-139, 2022, DOI:10.32604/csse.2022.021431

    Abstract Capturing the distributed platform with remotely controlled compromised machines using botnet is extensively analyzed by various researchers. However, certain limitations need to be addressed efficiently. The provisioning of detection mechanism with learning approaches provides a better solution more broadly by saluting multi-objective constraints. The bots’ patterns or features over the network have to be analyzed in both linear and non-linear manner. The linear and non-linear features are composed of high-level and low-level features. The collected features are maintained over the Bag of Features (BoF) where the most influencing features are collected and provided into the classifier model. Here, the linearity… More >

  • Open Access

    ARTICLE

    DNNBoT: Deep Neural Network-Based Botnet Detection and Classification

    Mohd Anul Haq, Mohd Abdul Rahim Khan*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1729-1750, 2022, DOI:10.32604/cmc.2022.020938

    Abstract The evolution and expansion of IoT devices reduced human efforts, increased resource utilization, and saved time; however, IoT devices create significant challenges such as lack of security and privacy, making them more vulnerable to IoT-based botnet attacks. There is a need to develop efficient and faster models which can work in real-time with efficiency and stability. The present investigation developed two novels, Deep Neural Network (DNN) models, DNNBoT1 and DNNBoT2, to detect and classify well-known IoT botnet attacks such as Mirai and BASHLITE from nine compromised industrial-grade IoT devices. The utilization of PCA was made to feature extraction and improve… More >

Displaying 1-10 on page 1 of 7. Per Page