Computer Science ›› 2025, Vol. 52 ›› Issue (11): 373-381.doi: 10.11896/jsjkx.241100019
• Information Security • Previous Articles Next Articles
ZHANG Haixia1, HUANG Kezhen1, LIAN Yifeng1, ZHAO Changzhi2, YUAN Yunjing1, PENG Yuanyuan1
CLC Number:
| [1]Office of Public Affairs.Qakbot Malware Disrupted in International Cyber Takedown[EB/OL].https://www.justice.gov/opa/pr/qakbot-malware-disrupted-international-cyber-takedown. [2]MAHMOUD M,NIR M,MATRAWY A.A survey on botnet architectures,detection and defences[J].International Journal of Network Security,2015,17(3):264-281. [3]BEER F,BÜHLER U.Feature selection for flow-based intru-sion detection using rough set theory[C]//2017 IEEE 14th International Conference on Networking,Sensing and Control(ICNSC).IEEE,2017:617-624. [4]CLAISE B.Cisco systems netflow services export version 9[R].2004. [5]KONDO S,SATO N.Botnet traffic detection techniques byC&C session classification using SVM[C]//International Workshop on Security.Berlin:Springer,2007:91-104. [6]AYO F E,AWOTUNDE J B,FOLORUNSO S O,et al.A genomic rule-basedKNN model for fast flux botnet detection[J].Egyptian Informatics Journal,2023,24(2):313-325. [7]ALHIJAJ T B,HAMEED S M,BARA'A A A.A decision tree-aware genetic algorithm for botnet detection[J].Iraqi Journal of Science,2021,62(7):2454-2462. [8]HOANG X D,VUX H.An improved model for detecting DGAbotnets using random forest algorithm[J].Information Security Journal:A Global Perspective,2022,31(4):441-450. [9]ZANG X,CAO J,ZHANG X,et al.BotDetector:a system foridentifying DGA-based botnet with CNN-LSTM[J].Telecommunication Systems,2023,85(2):207-223. [10]ABOU DAYA A,SALAHUDDIN M A,LIMAM N,et al.A graph-based machine learning approach for bot detection[C]//2019 IFIP/IEEE Symposium on Integrated Network and Service Management(IM).IEEE,2019:144-152. [11]UMER M F,SHER M,BI Y.Flow-based intrusion detection:Techniques and challenges[J].Computers & Security,2017,70:238-254. [12]THASEEN S,KUMAR C A.An analysis of supervised treebased classifiers for intrusion detection system[C]//2013 International Conference on Pattern Recognition,Informatics and Mobile Engineering.IEEE,2013:294-299. [13]HEGNA A.Visualizing spatial and temporal dynamics of a class of irc-based botnets[EB/OL].https://ntnuopen.ntnu.no/ntnu-xmlui/bitstream/handle/11250/262293/353050_FULLTEXT.01pdf?sequence=2&isAllowed=y. [14]GARCIA S,GRILL M,STIBOREK J,et al.An empirical comparison of botnet detection methods[J].Computers & Security,2014,45:100-123. [15]HOCHREITER S,SCHMIDHUBER J.Long short-term memory[J].Neural Computation,1997,9(8):1735-1780. [16]ZHANG A,LIPTON Z C,LI M,et al.Dive into deep learning[M].Cambridge:Cambridge University Press,2023. [17]VASWANI A,SHAZEER N,PARMAR N,et al.Attention isall you need[C]//Proceedings of the 31st International Confe-rence on Neural Information Processing Systems.2017:6000-6010. [18]GARCÍA S.Identifying,modeling and detecting botnet beha-viors in the network[EB/OL].https://www.stratosphereips.org/publications/2014/12/5/identifying-modeling-and-detec-ting-botnet-behaviors-in-the-network. [19]BEIGI E B,JAZI H H,STAKHANOVA N,et al.Towards effective feature selection in machine learning-based botnet detection approaches[C]//2014 IEEE Conference on Communications and Network Security.2014. [20]ZOU F T,TAN Y,WANG L,et al.Botnet detection based on generative adversarial network[J].Journal on Communications,2021,42(7):95-106. [21]SRINARAYANI K,PADMAVATHI B,KAVITHA D.Detec-tion of Botnet Traffic using Deep Learning Approach[C]//2023 International Conference on Sustainable Computing and Data Communication Systems(ICSCDS).IEEE,2023:201-206. |
| [1] | PENG Jiao, HE Yue, SHANG Xiaoran, HU Saier, ZHANG Bo, CHANG Yongjuan, OU Zhonghong, LU Yanyan, JIANG dan, LIU Yaduo. Text-Dynamic Image Cross-modal Retrieval Algorithm Based on Progressive Prototype Matching [J]. Computer Science, 2025, 52(9): 276-281. |
| [2] | GAO Long, LI Yang, WANG Suge. Sentiment Classification Method Based on Stepwise Cooperative Fusion Representation [J]. Computer Science, 2025, 52(9): 313-319. |
| [3] | LIU Jian, YAO Renyuan, GAO Nan, LIANG Ronghua, CHEN Peng. VSRI:Visual Semantic Relational Interactor for Image Caption [J]. Computer Science, 2025, 52(8): 222-231. |
| [4] | LIU Yajun, JI Qingge. Pedestrian Trajectory Prediction Based on Motion Patterns and Time-Frequency Domain Fusion [J]. Computer Science, 2025, 52(7): 92-102. |
| [5] | LIU Chengzhuang, ZHAI Sulan, LIU Haiqing, WANG Kunpeng. Weakly-aligned RGBT Salient Object Detection Based on Multi-modal Feature Alignment [J]. Computer Science, 2025, 52(7): 142-150. |
| [6] | ZHUANG Jianjun, WAN Li. SCF U2-Net:Lightweight U2-Net Improved Method for Breast Ultrasound Lesion SegmentationCombined with Fuzzy Logic [J]. Computer Science, 2025, 52(7): 161-169. |
| [7] | ZHENG Cheng, YANG Nan. Aspect-based Sentiment Analysis Based on Syntax,Semantics and Affective Knowledge [J]. Computer Science, 2025, 52(7): 218-225. |
| [8] | WANG Youkang, CHENG Chunling. Multimodal Sentiment Analysis Model Based on Cross-modal Unidirectional Weighting [J]. Computer Science, 2025, 52(7): 226-232. |
| [9] | KONG Yinling, WANG Zhongqing, WANG Hongling. Study on Opinion Summarization Incorporating Evaluation Object Information [J]. Computer Science, 2025, 52(7): 233-240. |
| [10] | XU Yutao, TANG Shouguo. External Knowledge Query-based for Visual Question Answering [J]. Computer Science, 2025, 52(6A): 240400101-8. |
| [11] | LI Daicheng, LI Han, LIU Zheyu, GONG Shiheng. MacBERT Based Chinese Named Entity Recognition Fusion with Dependent Syntactic Information and Multi-view Lexical Information [J]. Computer Science, 2025, 52(6A): 240600121-8. |
| [12] | HUANG Bocheng, WANG Xiaolong, AN Guocheng, ZHANG Tao. Transmission Line Fault Identification Method Based on Transfer Learning and Improved YOLOv8s [J]. Computer Science, 2025, 52(6A): 240800044-8. |
| [13] | WU Zhihua, CHENG Jianghua, LIU Tong, CAI Yahui, CHENG Bang, PAN Lehao. Human Target Detection Algorithm for Low-quality Laser Through-window Imaging [J]. Computer Science, 2025, 52(6A): 240600069-6. |
| [14] | GUAN Xin, YANG Xueyong, YANG Xiaolin, MENG Xiangfu. Tumor Mutation Prediction Model of Lung Adenocarcinoma Based on Pathological [J]. Computer Science, 2025, 52(6A): 240700010-8. |
| [15] | TAN Jiahui, WEN Chenyan, HUANG Wei, HU Kai. CT Image Segmentation of Intracranial Hemorrhage Based on ESC-TransUNet Network [J]. Computer Science, 2025, 52(6A): 240700030-9. |
|
||