References
- Alieyan, K., Almomani, A., Manasrah, A., & Kadhum, M. M. (2017). A survey of botnet detection based on DNS. Natural Computing Applied Forum, 28(7), 1541–1558. https://doi.org/https://doi.org/10.1007/s00521-015-2128-0
- Antonakakis, M., Perdisci, R., Lee, W., Vasiloglou, N., & Dagon, D. (2011). Detecting malware domains at the upper DNS hierarchy. In SEC’11: Proceedings of the 20th USENIX conference on Security. CA, USA: USENIX Association. https://dl.acm.org/doi/proceedings/10.5555/2028067
- Bilge, L., Kirda, E., Kruegel, C., & Balduzzi, M. (2011). EXPOSURE: Finding malicious domains using passive DNS analysis. In: NDSS.
- Chatrati, S. P., Hossain, G., Goyal, A., Bhan, A., Bhattacharya, S., Gaurav, D., & Tiwari, S. M. (2020, January). Smart home health monitoring system for predicting type 2 diabetes and hypertension. Journal of King Saud University - Computer and Information Sciences, 2020. https://doi.org/https://doi.org/10.1016/j.jksuci.2020.01.010
- DN Pedia. (n.d.). Top Alexa one million domains. CodePunch Solutions. https://dnpedia.com/tlds/topm.php.
- Eremin, A. (2019, March 29). Bots and botnets in 2018: Statistics on botnet attacks on clients of organizations. AO Kaspersky Lab. https://securelist.com/bots-and-botnets-in-2018/90091/
- Gaurav, D., Shandilya, S., Tiwari, S., & Goyal, A. (2020). A machine learning method for recognizing invasive content in memes. In B. Villazón-Terrazas, F. Ortiz-Rodríguez, S. M. Tiwari, & S. K. Shandilya Eds., Knowledge Graphs and Semantic Web. KGSWC 2020. Communications in Computer and Information Science (Vol. 1232, pp. 195-213). Springer, Cham. https://doi.org/https://doi.org/10.1007/978-3-030-65384-2_15
- Hoang, X. D., & Nguyen, Q. C. (2018). Botnet detection based on machine learning techniques using DNS query data. Journal Future Internet, 2018(10), 43. https://doi.org/https://doi.org/10.3390/fi10050043
- Hostiadi, D. P., Wibisono, W., & Ahmad, T. (2020). B-corr model for bot group activity detection based on network flows traffic analysis. KSII Transactions on Internet and Information Systems, 10(2020), 4176–4197. https://doi.org/https://doi.org/10.3837/tiis.2020.10.014 14
- Jiang, N., Cao, J., Jin, Y., Li, L., & Zhang, Z. L. (2010). Identifying suspicious activities through DNS failure graph analysis. In 18th IEEE international conference on network protocols (ICNP), pp 144–153. Kyoto, Japan.
- Kheir, N., Tran, F., Caron, P., & Deschamps, N. (2014). Mentor: Positive DNS reputation to skim-off benign domains in botnet C&C blacklists. In N. Cuppens-Boulahia, F. Cuppens, S. Jajodia, A. Abou El Kalam, & T. Sans. (Eds.), ICT systems security and privacy protection. SEC 2014. IFIP Advances in Information and Communication Technology (vol. 428, pp. 1–14). Berlin, Heidelberg: Springer. https://doi.org/https://doi.org/10.1007/978-3-642-55415-5_1
- Li, X., Wang, J., & Zhang, X. (2017). Botnet detection technology based on DNS. Journal Future Internet, (2017(9), 55. https://doi.org/https://doi.org/10.3390/fi9040055
- Netlab 360. (n.d.). DGA Families. Available online: https://data.netlab.360.com/dga/(accessed on 10 August 2020).
- Perdisci, R., Corona, I., Dagon, D., & Lee, W. (2009). Detecting malicious flux service networks through passive analysis of recursive DNS traces. In IEEE Annual computer security applications conference, (ACSAC’09), pp 311–320. Honolulu, HI, USA.
- Qiao, Y., Zhang, B., Zhang, W., Sangaiah, A. K., & Wu, H. (2019). DGA domain name classification method based on long short-term memory with attention mechanism. Applied Science, (2019(9), 4205. https://doi.org/https://doi.org/10.3390/app9204205
- Sangani, N. K., & Zarger, H. (2017). Machine learning in application security.Advances in Security in Computing and Communications, Jaydip Sen. IntechOpen. doi:https://doi.org/10.5772/intechopen.68796.
- Smith, A. (2019, October 23). More destructive botnets and attack vectors are on their way. Radware Blog. Radware Ltd. https://blog.radware.com/security/botnets/2019/10/scan-exploit-control/
- Spamhaus Malware Labs. (2020, January 28). Spamhaus Botnet Threat Report 2019. Spamhaus Malware Lab. https://www.spamhaus.org/news/article/793/spamhaus-botnet-threat-report-2019
- Stalmans, E., & Irwin, B. (2011). A framework for DNS based detection and mitigation of malware infections on a network. In IEEE Information security South Africa (ISSA), pp 1–8. Johannesburg, South Africa.
- Symantec: Botnets now produce 95% of spam [Editorial]. (2010, August 24). American City Business Journals. https://www.bizjournals.com/sanjose/stories/2010/08/23/daily29.html.
- Taheri, R., Ghahramani, M., Javidan, R., Shojafar, M., Pooranian, Z., & Conti, M. (2020-1). Similarity-based android malware detection using hamming distance of static binary features. Future Generation Computer Systems, 105, April 2020, Pages, 230–247.https://doi.org/https://doi.org/10.1016/j.future.2019.11.034.
- Taheri, R., Javidan, R., Shojafar, M., Pooranian, Z., Miri, A., & Conti, M. (2020-2). On defending against label flipping attacks on malware detection systems. Neural Computing & Applications, 32(32), July 2020, Pages, 14781–14800. https://doi.org/https://doi.org/10.1007/s00521-020-04831-9.
- Truong, D. T., & Cheng, G. (2016). Detecting domain-flux botnet based on DNS traffic features in managed network. Security Comm. Networks 2016 (Vol. 9, pp. 2338–2347). John Wiley & Sons.
- Villamari-Salomo, R., & Brustoloni, J. C. (2008). Identifying botnets using anomaly detection techniques applied to DNS traffic. In 5th IEEE consumer communications and networking conference (CCNC 2008), pp 476–481. Las Vegas, NV, USA.
- Woodbridge, J., Anderson, H. S., Ahuja, A., & Grant, D. (2016). arXiv 2016, arXiv:1611.00791. Predicting domain generation algorithms with long short-term memory networks. arXiv.org, Cornell University.
- Yadav, S., Reddy, A. K. K., Reddy, A. L. N., & Ranjan, S. (2012). Detecting algorithmically generated domain-flux attacks with DNS traffic analysis. IEEE/ACM Transactions on Network, (2012(20), 1663–1677. https://doi.org/https://doi.org/10.1109/TNET.2012.2184552
- Yu, B., Gray, D., Pan, J., De Cock, M., & Nascimento, A. (2017). “Inline DGA detection with deep networks,” in IEEE International Conference on Data Mining Workshops (ICDMW), pp. 683–692. New Orleans, LA, USA.
- Zhao, H., Chang, Z., Bao, G., & Zeng, X. (2019). Malicious domain names detection algorithm based on N-Gram. Journal of Computer Networks and Communications 2019, 9. Hindawi. https://doi.org/https://doi.org/10.1155/2019/4612474