The Use of Honeypot in Machine Learning Based On Malware Detection: A Review
The Use of Honeypot in Machine Learning Based On Malware Detection: A Review
The Use of Honeypot in Machine Learning Based On Malware Detection: A Review
net/publication/346816068
CITATIONS READS
11 1,590
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Iik Muhamad Malik Matin on 09 December 2020.
Abstract—A very significant increase in the spread of proposed by many researchers to detect malware, including
malware has resulted in malware analysis using signature using machine learning.
matching approaches and heuristic methods that are no longer
suitable for malware analysis. Recently the approach to using Machine learning has the ability to be quite effective and
machine learning has been proposed by many researchers. efficient for malware detection [4], and machine learning-
Machine learning is considered a more effective and efficient based antimalware software is an effective method to use [5].
approach to detect malware compared to conventional Besides, compared to the signature analysis-based approach,
approaches. At the same time, researchers proposed a honeypot machine learning has better effectiveness [6]. Machine
as a device capable of gathering malware information. Honeypot learning will identify the presence of malware based on the
is designed as a malware trap and is stored on the system classification of a class that has been defined in a dataset.
provided. Then record events that detect and gather Classification of a class in a dataset is often called a label that
information about the attacker's activities and identity. This is divided into two classes, namely benign and malware [7].
paper aims to investigate the use of honeypot in machine
learning to detect malware. The Systematic Literature Review The challenge of machine learning for detecting malware
(SLR) method was used to identify 684 papers in the IEEE is the dependence of machine learning on data collection.
Xplore database and ACM Digital Library based on automatic When machine learning receives very little training data, it
searches and predefined strings. Then 11 papers were selected will make it difficult for machine learning to detect new
to be investigated based on inclusion and exclusion criteria. malware [8].
From the results of the literature, it can be concluded that the
trend of honeypot use in malware detection-based learning has At the same time, the researchers proposed a honeypot as
increased from 2017 to 2019. The techniques used by most a device capable of gathering information on malware activity
researchers are utilizing available honeypot datasets. [9][10][11]. Honeypot is a system that is deliberately left as
Meanwhile, based on the type of malware analyzed, honeypot in bait to lure potential attackers so that they stay away from
machine learning is mostly used to collect IoT-based malware. critical systems. Honeypot is designed to divert attention from
critical systems, gather attacker activity, and allow attackers
Keywords—SLR, honeypot, machine learning, malware, to stay on the system [12].
survey
Honeypot can help machine learning update training data
I. INTRODUCTION so that it can provide better accuracy. However, in its
application, the honeypot does not have a clear scheme, so it
Malware is one of the most increased security threats in
becomes difficult and confusing when it is implemented,
recent years. Malware is specifically designed to attack
especially in adjusting to one's needs in developing a machine
systems to steal sensitive and confidential information. Also,
learning model. For this reason, relevant literature is needed
malware can be designed to disrupt running systems to create
to be investigated further to identify trends and provide
digital chaos [1][2].
direction in the future.
Kaspersky Lab reported that throughout 2016 it detected
This study conducted a literature review using the
more than 1.966.324 malware warnings that attempted to steal
systematic literature review (SLR) method to identify
money by utilizing online access to bank accounts. In addition,
honeypot trends. By using SLR, researchers can find solutions
753.684 different computer users were infected with the
by reviewing relevant previous research [13]. This study aims
ransomware program, of which 179.209 computers were
to understand trends, techniques, and types of malware
encrypted with a ransomware program. In addition, Kaspersky
handled by honeypots. This study analyzes articles with
antivirus solution also detects 121.262.075 different malicious
literature database sources on the IEEE Xplore and ACM from
objects such as scripts, exploits, executable less, and others.
2010 to 2020.
This means, at least one web attack occurred on 34.2% of
computer users [3]. A survey regarding the honeypot trend has been conducted
by Campbell and Keshnee [14], which identifies honeypot
High levels of computer malware (viruses, worms, trojan
research trends and identifies research opportunities in the
horses, rootkits, botnets, backdoors, and other malicious
honeypot area. The survey was also conducted by Matthew L.
software) and increased malware spread from day to day have
Bringer [15], which presents a survey of the latest advances in
resulted in conventional signature-based approaches failing to
honeypot research. Currently, machine learning is a hot issue,
detect new polymorphic that did not look dangerous before.
while honeypot and machine learning studies have not been
Also, manual heuristic checking and static malware analysis
found. For that, we are interested in conducting a survey on
are no longer effective and efficient compared to high
honeypot in its use in machine learning.
malware spread [4]. Several other approaches have been
Authorized licensed use limited to: Institut Teknologi Bandung. Downloaded on December 09,2020 at 19:22:42 UTC from IEEE Xplore. Restrictions apply.
The 8th International Conference on Cyber and IT Service Management (CITSM 2020)
On Virtual, October 23-24, 2020
This paper is divided into four sections as follows: part I, systematic literature review. The scope is determined so that
we explain the background and purpose of this paper; part II the study remains focused on the topic discussed.
we discuss the research methodology used; then part III we Determination of the scope is based on Population,
discuss the results of the literature study; part IV we discuss Comparation Interventions, Outcomes, and Context (PICOC)
the threat of validity and finally section V we summarize the
criteria [21], which is shown in Table I.
results of the discussion.
TABLE I. SLR SCOPE
II. RESEARCH METHODOLOGY
In this section, we describe the methods and designs of the Criteria RQ1 RQ2 RQ3
Population Trend Techniques field
Systematic Literature Review that we carried out. Systematic Intervention Identification, internal / external validation, data
Literature Review is a way of evaluating and interpreting all extraction and synthesizing data
available research that is relevant to a particular research Comparison A comparison study in honeypot in machine learning
question, topic area, or interesting phenomenon. A systematic for malware detection
review aims to present a fair evaluation of a research topic Outcomes Usability honeypot in machine learning techniques for
using a methodology that is trustworthy, though, and malware detection
auditable. There are at least three main reasons for conducting Context Study in academic research
SLRs. First, to investigate and synthesize existing research
topics. The two identify gaps in previous research. The third Based on the PICOC formulation, the research questions
is to provide a strong foundation for investigating new are determined as follows:
research topics [17]. RQ1 What is the research trend on the use of honeypot in
The systematic Literature review process consists of three detecting machine learning-based malware?
stages: a literature planning review, a literature review RQ2 What is the honeypot technique that researchers use in
process, and a documented literature [16]. The steps of the detecting machine learning-based malware?
systematic literature review method can be summarized in
Fig. 1. RQ3 What types of malware are handled by honeypot in
detecting machine learning-based malware?
3) Developing and validating review protocol: To reduce
researcher bias, we define a systematic literature review
protocol. The protocol covers defining the scope, search
strategy, and determining PICOC as well as defining
inclusions and exclusions. The validation process is carried
out in consultation with experts to be criticized and evaluated.
We improved the protocol based on expert feedback.
B. Conducting Review
In the second stage, the steps for conducting consist of: (i)
selecting studies; (ii) extracting required data; (iii)
synthesizing data.
Fig. 1. Systematic Literature Review Steps [18] [19] 1) Selecting Studies: To search for papers relevant to the
topics we cover, we define search strings by identifying
Based on the outline, we follow a three-step review
keywords based on the topic area and related fields. We
process, namely planning review, conducting a review, and
documenting review. determined the keywords "Honeypot," "Malware," "Machine
learning," and "Detection" as the chosen topic area. In
A. Planning Review addition, we determine mutants from the topic area. We also
In the first stage, the planning steps consist of: (i) use strings AND, OR, an asterisk * and quotation marks ".
identifying the needs; (ii) specifying the research question; Fig. 2 displays the string construction that will be used for
(iii) developing and validating protocol review. searching.
1) Identifying the needs: The need for a systematic To get a comprehensive result of the papers investigated,
we conducted a search on the digital library database sources
literature review has been explained in the introduction. In
that were relevant to the topic that we had determined.
addition, a systematic literature review is needed to identify,
classify, and compare research on the needs and use of For this reason, we determine the digital library list as
honeypots in machine learning in detecting malware. This follows:
paper aims to identify related research papers. To show that 1) IEEE Xplore (ieeexplore.ieee.org)
similar reviews have not been reported, we searched for a 2) ACM Digital Library (dl.acm.org)
digital database, namely IEEE Xplore, ACM Digital Library.
2) Specifying the research question: Determining IEEE Explore is a library that provides scientific research
research questions helps researchers in defining and results in the form of indexes, abstracts, and full texts for
articles and papers in computer science and electrical
evaluating literature review protocols [20]. The research engineering, while the ACM Digital Library is a library
questions were determined based on the scope of the
Authorized licensed use limited to: Institut Teknologi Bandung. Downloaded on December 09,2020 at 19:22:42 UTC from IEEE Xplore. Restrictions apply.
The 8th International Conference on Cyber and IT Service Management (CITSM 2020)
On Virtual, October 23-24, 2020
consisting of journals, magazines, and proceedings that are digital library and 667 papers in ACM so that the total papers
often used by researchers and experts in the field computer obtained were based on a number of 684 keywords. Then we
and information technology. apply the inclusion and exclusion criteria. We only choose
papers that meet the criteria that can be used as SR's main
reference. The results of applying the inclusion and exclusion
criteria obtained 14 papers in the IEEE Xplore digital library
and 268 papers in the ACM Digital Library. Finally, we select
papers according to the topic by scanning abstracts and full-
text scanning of papers that have been selected by inclusion
and exclusion criteria. From the selection process, there were
seven papers selected from the IEEE Xplore digital library
and four papers in the ACM Digital library so that the number
of papers investigated was 11. Table II displays the number
of papers selected based on the selected selection process.
Selection step
Select by year
Conference
Automatic
Journal &
Scanning
Abstract
Full-Text
Scanning
Search
Digital Library
IEEE Xplore 17 17 14 11 7
ACM Digital Library 667 326 268 12 4
Total 684 343 282 23 11
Fig. 2. String Construction
Authorized licensed use limited to: Institut Teknologi Bandung. Downloaded on December 09,2020 at 19:22:42 UTC from IEEE Xplore. Restrictions apply.
The 8th International Conference on Cyber and IT Service Management (CITSM 2020)
On Virtual, October 23-24, 2020
number of publication
Authorized licensed use limited to: Institut Teknologi Bandung. Downloaded on December 09,2020 at 19:22:42 UTC from IEEE Xplore. Restrictions apply.
The 8th International Conference on Cyber and IT Service Management (CITSM 2020)
On Virtual, October 23-24, 2020
about the compatibility of Windows NT. The PE file header inclusion criteria. From the results of the review, it is known
contains the PE file header containing many important fields that research trends on the use of honeypot to detect malware
which tell about which machine should run this PE file, the fluctuate from 2012 to 2020. Significant research trend
number of parts in this PE file, the optional header size that improvement occurred in 2019. Based on the technique of use,
the honeypot is more widely used using virtualization
starts immediately after the PE file header, the number of
techniques. Namely, honeypot installed to obtain information,
symbols and the compiler date timestamp. Finally, the then modeling based information obtained. In contrast, other
optional header contains many important fields such as entry techniques use a honeypot-based dataset that is already
address, OS version, Image Base, Database, Image version, available. By using a dataset, researchers do not need to install
subsystem version, etc. The optional header defines the a honeypot so that modeling can be made directly based on the
logical structure of the PE file, and it's probably the most available dataset. The use of honeypot in machine learning to
important header in a PE file[41]. detect malware is more studied in Internet-based Thing (IoT)
2) Datastream: is a data format based on the network. In malware. In contrast, others are based on data streams and
the honeypot data stream, they record network traffic and Windows malware.
store information such as IP address, the protocol used, Honeypot is a system that can collect malware information
service used, number of packet data, packet destination, and that is useful as machine learning training data, giving
others. researchers many choices in developing machine learning
3) Internet of Things: based malware is a sample of models. Sometimes researchers need consideration in
malware that attacks IoT architectures such as ARM, M68K, choosing a honeypot as their dataset. For this reason, further,
SPARC, MIPS, PPC, SH4, and many more. Based on its development is needed to prove the ability of the honeypot
family, the malware consists of ZORRO, GAYFGT, nttpd, dataset to improve the performance of models with different
techniques.
KOS, and *.sh[40].
REFERENCES
IV. THREATS TO VALIDITY
[1] C. Vatamanu, D. Cosovan, D. Gavrilu, and H. Luchian, "A
One of the most important elements in implementing this Comparative Study of Malware Detection Techniques Using Machine
SLR is designing and reducing threats to validity [42]. We Learning Methods," Int. J. Comput. Electr. Autom. Control Inf. Eng.,
have considered threats to validation to ensure the accuracy vol. 9, no. 5, pp. 1115–1122, 2015.
and acceptance of the results of this systematic review. We try [2] T. Mithal, K. Shah, and D. K. Singh, "Case Studies on Intelligent
to reduce and provide solutions to threats of validity based on Approaches for Static Malware Analysis," Emerg. Res. Comput.
Information, Commun. Appl., pp. 555–567, 2016, DOI: 10.1007/978-
four threat factors. 981-10-0287-8.
1) Construction Validity: To obtain relevant studies, we [3] Kaspersky Lab, "Kaspersky Lab′s Cyber Security report," 2016.
developed the right construction. We determine the selection [4] I. Firdausi, C. Lim, A. Erwin, and A. S. Nugroho, "Analysis of machine
learning techniques used in behavior-based malware detection," Proc.
of studies that are appropriate to avoid bias. The repository - 2010 2nd Int. Conf. Adv. Comput. Control Telecommun. Technol.
that we use comes from databases that are related to the ACT 2010, pp. 201–203, 2010, DOI: 10.1109/ACT.2010.33.
domain of computer science. We use string experiments [5] Z. Markel and M. Bilzor, "Building a machine learning classifier for
several times with several different keywords and then malware detection," WATeR 2014 - Proc. 2014 2nd Work. Anti-
Malware Test. Res., 2015, DOI: 10.1109/WATeR.2014.7015757.
formulate them into full strings to reach related papers. In [6] M. G. Schultz, E. Eskin, E. Zadok, and S. J. Stolfo, "Data mining
addition to using an automatic search, we do a manual search methods for detection of new malicious executables," Proc. IEEE
by searching for citations related to ensuring no studies are Comput. Soc. Symp. Res. Secur. Priv., pp. 38–49, 2001, DOI:
10.1109/secpri.2001.924286.
missed.
[7] U. Pehlivan, N. Baltaci, C. Acarturk, and N. Baykal, "The analysis of
2) The validity of Conclusions: To achieve the feature selection methods and classification algorithms in permission-
appropriate literature goals, we repeatedly experimented with based Android malware detection," IEEE SSCI 2014 2014 IEEE Symp.
procedures to ensure that other researchers could replicate the Ser. Comput. Intell. - CICS 2014, 2014. IEEE Symp. Comput. Intell.
Cyber Secur. Proc., pp. 1–8, 2014, DOI:
same literary goals. We try to reduce the possibility of some 10.1109/CICYBS.2014.7013371.
relevant studies being missed. [8] Y. Roh, G. Heo, and S. E. Whang, "A Survey on Data Collection for
3) Internal Validity: We use a tool that is Microsoft Excel Machine Learning: A Big Data - AI Integration Perspective," IEEE
to extract information from selected papers. This is done to Trans. Knowl. Data Eng., vol. 4347, no. c, pp. 1–1, 2019, DOI:
10.1109/tkde.2019.2946162.
avoid inaccuracies during the data analysis process.
[9] K. Saikawa and V. Klyuev, "Detection and Classification of Malicious
4) External Validation: To ensure the results of the Access using a Dionaea Honeypot," Proc. 2019 10th IEEE Int. Conf.
findings can be generalized, we divide the findings into three Intell. Data Acquis. Adv. Comput. Syst. Technol. Appl. IDAACS 2019,
classifications so that they do not go beyond the topics vol. 2, pp. 844–848, 2019, DOI: 10.1109/IDAACS.2019.8924340.
discussed. [10] P. D. Ali and T. Gireesh Kumar, "Malware capturing and detection in
dionaea honeypot," 2017 Innov. Power Adv. Comput. Technol. i-PACT
2017, vol. 2017-Janua, pp. 1–5, 2017, DOI:
V. CONCLUSION AND FUTURE WORK 10.1109/IPACT.2017.8245158.
In this paper, we conducted a literature study on the use of [11] V. Sethia and A. Jeyasekar, "Malware capturing and analysis using
honeypot in machine learning. We analyzed 11 productions, dionaea honeypot," Proc. - Int. Carnahan Conf. Secur. Technol., vol.
conferences, and journal papers published in the 2010-2020 2019-October, pp. 0–3, 2019, DOI: 10.1109/CCST.2019.8888409.
period from the IEEE Xplore database and ACM Digital [12] W. Stallings, Computer Security Third Edition, 3rd Editio. United
States of America: Pearson Education, 2015.
Library. We have done the sorting by applying exclusion and
Authorized licensed use limited to: Institut Teknologi Bandung. Downloaded on December 09,2020 at 19:22:42 UTC from IEEE Xplore. Restrictions apply.
The 8th International Conference on Cyber and IT Service Management (CITSM 2020)
On Virtual, October 23-24, 2020
[13] Miswar, Suhardi, and N. B. Kurniawan, "A Systematic Literature GLOBECOM 2019 - Proc., pp. 1–6, 2019, DOI:
Review on Survey Data Collection System," 2018 Int. Conf. Inf. 10.1109/GLOBECOM38437.2019.9014300.
Technol. Syst. Innov. ICITSI 2018 - Proc., pp. 177–181, 2018, DOI: [29] F. H. Abbasi, R. J. Harris, G. Moretti, A. Haider, and N. Anwar,
10.1109/ICITSI.2018.8696036. "Classification of malicious network streams using honeynets,"
[14] R. M. Campbell, K. Padayachee, and T. Masombuka, "A survey of GLOBECOM - IEEE Glob. Telecommun. Conf., pp. 891–897, 2012,
honeypot research: Trends and opportunities," 2015 10th Int. Conf. DOI: 10.1109/GLOCOM.2012.6503226.
Internet Technol. Secur. Trans. ICITST 2015, pp. 208–212, 2016, DOI: [30] H. T. Nguyen, Q. D. Ngo, and V. H. Le, "IoT Botnet Detection
10.1109/ICITST.2015.7412090. Approach Based on PSI graph and DGCNN classifier," 2018 IEEE Int.
[15] M. L. Bringer, C. A. Chelmecki, and H. Fujinoki, "A Survey: Recent Conf. Inf. Commun. Signal Process. ICICSP 2018, no. Icsp, pp. 118–
Advances and Future Trends in Honeypot Research," Int. J. Comput. 122, 2018, DOI: 10.1109/ICICSP.2018.8549713.
Netw. Inf. Secur., vol. 4, no. 10, pp. 63–75, 2012, DOI: [31] C. Tien, S. Chen, and I. Industry, "Machine Learning Framework to
10.5815/ijcnis.2012.10.07. Analyze IoT Malware Using ELF and Opcode Features," 2020, vol. 1,
[16] B. Kitchenham and P. Brereton, "A systematic review of systematic no. 1, pp. 1–19.
review process research in software engineering," Inf. Softw. Technol., [32] T. N. Phu, L. H. Hoang, N. N. Toan, N. D. Tho, and N. N. Binh,
vol. 55, no. 12, pp. 2049–2075, 2013, DOI: "CFDVex: A novel feature extraction method for detecting cross-
10.1016/j.infsof.2013.07.010. architecture IoT malware," in ACM International Conference
[17] B. Kitchenham and S. Charters, "Guidelines for performing Systematic Proceeding Series, 2019, pp. 248–254, DOI:
Literature Reviews in Software Engineering," 2007. 10.1145/3368926.3369702.
[18] C. Jatoth, G. R. Gangadharan, and R. Buyya, "Computational [33] H. T. Nguyen, D. H. Nguyen, Q. D. Ngo, V. H. Tran, and V. H. Le,
Intelligence Based QoS-Aware Web Service Composition: A "Towards a rooted subgraph classifier for IoT botnet detection," ACM
Systematic Literature Review," IEEE Trans. Serv. Comput., vol. 10, Int. Conf. Proceeding Ser., pp. 247–251, 2019, DOI:
no. 3, pp. 475–492, 2017, DOI: 10.1109/TSC.2015.2473840. 10.1145/3348445.3348474.
[19] B. Kitchenham, "Procedures for Performing Systematic Literature [34] S. Alhaidari and M. Zohdy, "Hybrid learning approach of combining
Reviews," 2004. cluster-based partitioning and hidden Markov model for IoT intrusion
[20] P. Jamshidi, A. Ahmad, and C. Pahl, "Cloud Migration Research : A detection," ACM Int. Conf. Proceeding Ser., pp. 27–31, 2019, DOI:
Systematic Review," vol. 1, no. 2, pp. 142–157, 2013. 10.1145/3325917.3325939.
[21] M. Petticrew and H. Roberts, Systematic Reviews in the Social [35] M. Shobana and S. Poonkuzhali, "A novel approach to detect IoT
Sciences, a Practical Guide, First Edit., vol. 64, no. 4. Victoria: malware by system calls using Deep learning techniques," 2020 Int.
Blackwell Publisher, 2006. Conf. Innov. Trends Inf. Technol. ICITIIT 2020, pp. 1–5, 2020, DOI:
10.1109/ICITIIT49094.2020.9071531.
[22] M. K. Najafabadi and M. N. Mahrin, "A systematic literature review
on the state of research and practice of collaborative filtering technique [36] N. Provos, "A virtual honeypot framework," Proc. 13th USENIX Secur.
and implicit feedback," Artif. Intell. Rev., vol. 45, no. 2, pp. 167–201, Symp., 2004.
2016, DOI: 10.1007/s10462-015-9443-9. [37] A. H. S. D. of C. S. P. Defibaugh-Chavez*, R. Veeraghattam, M.
[23] H. Zhang and M. Ali, "Systematic reviews in software engineering : An Kannappa, S. Mukkamala*, "Network Based Detection of virtual
empirical investigation," Inf. Softw. Technol., vol. 55, no. 7, pp. 1341– environments and low interaction honeypots," in Proceedings of the
1354, 2013, DOI: 10.1016/j.infsof.2012.09.008. 2007 IEEE Workshop on Information Assurance, IAW, 2007, pp. 92–
98, DOI: 10.1109/IAW.2007.381919.
[24] P. Brereton, B. A. Kitchenham, D. Budgen, M. Turner, and M. Khalil,
"Lessons from applying the systematic literature review process within [38] The Honeynet Project, "Know your enemy: Honeynets. What a
the software engineering domain," J. Syst. Softw., vol. 80, no. 4, pp. honeynet is, its value, how it works, and risk/issues involved.," 2002.
571–583, 2007, DOI: 10.1016/j.jss.2006.07.009. [39] T. Werner, C. Fuchs, E. Gerhards-Padilla, and P. Martini, "Nebula -
[25] I. M. M. Matin and B. Rahardjo, "Malware Detection Using Honeypot Generating syntactical network intrusion signatures," 2009 4th Int.
and Machine Learning," in The 7th International Conference on Cyber Conf. Malicious Unwanted Software, MALWARE, 2009, pp. 31–38,
and IT Service Management (CITSM 2019), 2019, pp. 1–4, DOI: 2009, DOI: 10.1109/MALWARE.2009.5403022.
10.1109/citsm47753.2019.8965419. [40] Y. M. P. Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama, and
[26] R. Vishwakarma and A. K. Jain, "A honeypot with machine learning- C. Rossow, "IoTPOT: A novel honeypot for revealing current IoT
based detection framework for defending IoT based botnet DDoS threats," J. Inf. Process., vol. 24, no. 3, pp. 522–533, 2016, DOI:
attacks," in Proceedings of the International Conference on Trends in 10.2197/ipsjjip.24.522.
Electronics and Informatics, ICOEI 2019, 2019, no. Icoei, pp. 1019– [41] M. S. Yousaf, M. H. Durad, and M. Ismail, "Implementation of
1024, DOI: 10.1109/ICOEI.2019.8862720. Portable Executable File Analysis Framework (PEFAF)," Proc. 2019
[27] F. Haltas, E. Uzun, N. Siseci, A. Posul, and B. Emre, "An automated 16th Int. Bhurban Conf. Appl. Sci. Technol. IBCAST 2019, pp. 671–
bot detection system through honeypots for large-scale," Int. Conf. 675, 2019, DOI: 10.1109/IBCAST.2019.8667202.
Cyber Conflict, CYCON, vol. 2014, pp. 255–270, 2014, DOI: [42] X. Zhou, Y. Jin, H. Zhang, S. Li, and X. Huang, "A map of threats to
10.1109/CYCON.2014.6916407. validity of systematic literature reviews in software engineering," Proc.
[28] O. P. Dwyer, A. K. Marnerides, V. Giotsas, and T. Mursch, "Profiling - Asia-Pacific Softw. Eng. Conf. APSEC, vol. 0, pp. 153–160, 2016,
IoT-based botnet traffic using DNS," 2019 IEEE Glob. Commun. Conf. DOI: 10.1109/APSEC.2016.031.
Authorized licensed use limited to: Institut Teknologi Bandung. Downloaded on December 09,2020 at 19:22:42 UTC from IEEE Xplore. Restrictions apply.
View publication stats