13   Artículos

 
en línea
Amthal K. Mousa and Mohammed Najm Abdullah    
The software defined network (SDN) collects network traffic data and proactively manages networks. SDN?s programmability makes it excellent for developing distributed applications, cybersecurity, and decentralized network control in multitenant data cent... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Abdul Majeed, Abdullah M. Alnajim, Athar Waseem, Aleem Khaliq, Aqdas Naveed, Shabana Habib, Muhammad Islam and Sheroz Khan    
In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been ado... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Cheng Yang, Tianliang Lu, Shangyi Yan, Jianling Zhang and Xingzhan Yu    
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals. Accurate detection of malicious domains can effectively defend against cybe... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jiyeon Kim, Minsun Shim, Seungah Hong, Yulim Shin and Eunjung Choi    
As the number of Internet of Things (IoT) devices connected to the network rapidly increases, network attacks such as flooding and Denial of Service (DoS) are also increasing. These attacks cause network disruption and denial of service to IoT devices. H... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ren-Hung Hwang, Min-Chun Peng, Van-Linh Nguyen and Yu-Lun Chang    
Recently, deep learning has been successfully applied to network security assessments and intrusion detection systems (IDSs) with various breakthroughs such as using Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) to classify malici... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Riaz Ullah Khan, Xiaosong Zhang, Rajesh Kumar, Abubakar Sharif, Noorbakhsh Amiri Golilarz and Mamoun Alazab    
In recent years, the botnets have been the most common threats to network security since it exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been used to carry phishing links, to perform attacks and provide malicious... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Xuan Dau Hoang and Quynh Chi Nguyen    
In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection System... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yesta Medya Mahardhika, Amang Sudarsono, Ali Ridho Barakbah     Pág. 1 - 21
Botnet is a malicious software that often occurs at this time, and can perform malicious activities, such as DDoS, spamming, phishing, keylogging, clickfraud, steal personal information and important data. Botnets can replicate themselves without user co... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »