Computer Networks and Distributed Systems
1. Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Zahra Nafarieh

Volume 6, Issue 2 , Spring 2020, , Pages 61-70

Abstract
  Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer ...  Read More

Computer Networks and Distributed Systems
2. Detecting Active Bot Networks Based on DNS Traffic Analysis

Zahra Nafarieh; Ebrahim Mahdipur; Haj Hamid Haj Seyed Javadi

Volume 5, Issue 3 , Summer 2019, , Pages 129-142

Abstract
  Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential ...  Read More

Computer Networks and Distributed Systems
3. IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Swathi B H; Megha V; Gururaj H L; Hamsaveni M; Janhavi V

Volume 4, Issue 2 , Spring 2018, , Pages 87-100

Abstract
  Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication ...  Read More

Computer Networks and Distributed Systems
4. The Idea Of Using The Steganography As Encryption Tool

Ali Shlig; Amer Saleem Elameer

Volume 4, Issue 1 , Winter 2018, , Pages 42-50

Abstract
  the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit ...  Read More

Computer Networks and Distributed Systems
5. HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets

Bita Amirshahi; Ali Ahangari

Volume 1, Issue 3 , Summer 2015, , Pages 39-45

Abstract
  Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be ...  Read More