This work investigates the detection of Botnet Command and Control (C&C) activity by monitoring Domain Name System (DNS) traffic. Detection signatures are automatically generated using evolutionary computation technique based on Stateful-SBB. The evaluation performed shows that the proposed system can work on raw variable length domain name strings with very high accuracy. © Springer-Verlag Berlin Heidelberg 2013.
CITATION STYLE
Haddadi, F., Kayacik, H. G., Zincir-Heywood, A. N., & Heywood, M. I. (2013). Malicious automatically generated domain name detection using stateful-SBB. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7835 LNCS, pp. 529–539). Springer Verlag. https://doi.org/10.1007/978-3-642-37192-9_53
Mendeley helps you to discover research relevant for your work.