Search Results/Filters    

Filters

Year

Banks




Expert Group










Full-Text


Issue Info: 
  • Year: 

    2019
  • Volume: 

    5
  • Issue: 

    3
  • Pages: 

    129-142
Measures: 
  • Citations: 

    0
  • Views: 

    115
  • Downloads: 

    44
Abstract: 

One of the serious threats to cyberspace is the Bot Networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and reducing the activity of the Botnets. DNS queries are sent in the early stages of the life cycle of each Botnet, so infected hosts are identified before any malicious activity is performed. Because the exchange of information in the network environment and the volume of information is very high, Storing and indexing this massive data requires a large database. By using the DNS traffic analysis, we try to identify the Botnets. We used the data generated from the network traffic and information of known Botnets with the Splunk platform to conduct data analysis to quickly identify attacks and predict potential dangers that could arise. The analysis results were used in tests conducted on real network environments to determine the types of attacks. Visual IP mapping was then used to determine actions that could be taken. The proposed method is capable of recognizing known and unknown Bots.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 115

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 44 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    6
  • Issue: 

    2
  • Pages: 

    61-70
Measures: 
  • Citations: 

    0
  • Views: 

    116
  • Downloads: 

    117
Abstract: 

Bot Networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly engage in forbidden activities, while TLS (Transport Layer Security) protocols allow encrypted communication between client and server in the context of Internet provides. Methods of analyzing traffic behavior do not depend on payloads. This means that they can work with encrypted network communication protocols. Traffic behavior analysis methods do not depend on package shipments, which means they can work with encrypted network communication protocols. Hence, the analysis of TLS and HTTP traffic behavior has been considered for detecting malicious activities. Because of the exchange of information in the network context is very high and the volume of information is very large, storing and indexing of this massive data require a Big data platform.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 116

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 117 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2004
  • Volume: 

    50
  • Issue: 

    2
  • Pages: 

    189-206
Measures: 
  • Citations: 

    1
  • Views: 

    129
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 129

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

SHIRAVI A.A.H.

Journal: 

NAMEH-YE-MOFID

Issue Info: 
  • Year: 

    2001
  • Volume: 

    7
  • Issue: 

    2 (26) Law
  • Pages: 

    31-50
Measures: 
  • Citations: 

    1
  • Views: 

    4503
  • Downloads: 

    0
Abstract: 

While huge investment in infrastructural plans is an urgent need for developing countries, they are not able to provide sufficient capital to fund these projects. One of the new ideas to solve this problem is to use build - operate - transfer (Bot) contracts. This method enables the private sector to participate in public, infrastructural projects without being the permanent owners thereof. The Iranian government has recently shown interest in using Bot contracts for the purpose of privatization, foreign investment attraction, access to advanced technology and technical skills, and benefiting from efficient management. As an example, paragraph 14(6) of the Economic Improvement Plan of the Islamic Republic of Iran, promulgated by the President last year, has emphasized the entry and attraction of foreign investment through Bot contracts.The paper attempts first to study the mechanism of such contracts and then to distinguish it from similar mechanisms while explaining Bot contracts characteristics in order to facilitate their application in infrastructural projects and in privatization, technology and know-how attraction and access to efficient management.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 4503

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Issue Info: 
  • Year: 

    2021
  • Volume: 

    11
  • Issue: 

    1
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    19
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 19

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

CHANG L.M. | CHEN P.H.

Issue Info: 
  • Year: 

    2001
  • Volume: 

    127
  • Issue: 

    3
  • Pages: 

    214-222
Measures: 
  • Citations: 

    1
  • Views: 

    142
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 142

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2015
  • Volume: 

    8
  • Issue: 

    26
  • Pages: 

    79-101
Measures: 
  • Citations: 

    0
  • Views: 

    1878
  • Downloads: 

    0
Abstract: 

The aim of this thesis is identifying and modeling the risks of the power plant Bot projects. Main identified risks in this study are project financing risk (equity ratio risk) and the risk of revenue of project. In order to model the risks, we used the Martingale Variance Model (MVM) for the revenue risk and the Triangular distribution function for the equity ratio risk. We applicated the Monte Carlo simulations method for obtaining the probability distribution function and critical values of the decision index (Net Present Value, Internal Rate of Return, Debt Service Coverage Ratio). The one of thermal power plant projects data prepared by MAPNA, has been implemented in this study. The results of the simulation indicate that the risk of negative NPV of project is 13.41 percent and the risk of DSCR lower than 1.2 is 8.65 percent. Therefore, the sponsors suffering more risks than lenders in the studied project.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1878

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 6
Author(s): 

Mohammadi Mahla | Hosseini Andargoli Seyed Mehdi

Issue Info: 
  • Year: 

    2024
  • Volume: 

    54
  • Issue: 

    1
  • Pages: 

    121-131
Measures: 
  • Citations: 

    0
  • Views: 

    42
  • Downloads: 

    11
Abstract: 

We address the throughput maximization problem for downlink transmission in DF-relay-assisted cognitive radio Networks (CRNs) based on simultaneous wireless information and power transfer (SWIPT) capability. In this envisioned network, multiple-input multiple-output (MIMO) relay and secondary user (SU) equipment are designed to handle Both radio frequency (RF) signal energy harvesting and SWIPT functional tasks. Additionally, the cognitive base station (CBS) communicates with the SU only via the MIMO relay. Based on the considered network model, several combined constraints of the main problem complicate the solution. Therefore, in this paper, we apply heuristic guidelines within the convex optimization framework to handle this complexity. First, consider the problem of maximizing throughput on Both sides of the relay separately. Second, each side progresses to solve the complex problem optimally by adopting strategies for solving sub-problems. Finally, these optimal solutions are synthesized by proposing a heuristic iterative power allocation algorithm that satisfies the combinatorial constraints with short convergence times. The performance of the optimal proposed algorithm (OPA) is evaluated against benchmark algorithms via numerical results on optimality, convergence time, constraints’ compliance, and imperfect channel state information (CSI) on the CBS-PU link.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 42

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 11 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

YAHYAZADEH MOSA | ABADI MAHDI

Issue Info: 
  • Year: 

    2012
  • Volume: 

    4
  • Issue: 

    1
  • Pages: 

    51-62
Measures: 
  • Citations: 

    0
  • Views: 

    750
  • Downloads: 

    113
Abstract: 

Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing Botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect Botnets in an early stage of their lifecycle; moreover, they depend on a particular command and control (C&C) protocol. In this paper, we address these issues and propose an online unsupervised method, called BotOnus, for Botnet detection that does not require a priori knowledge of Botnets. It extracts a set of flow feature vectors from the network traffic at the end of each time period, and then groups them to some flow clusters by a novel online fixed-width clustering algorithm. Flow clusters that have at least two members, and their intra-cluster similarity is above a similarity threshold, are identified as suspicious Botnet clusters, and all hosts in such clusters are identi ed as Bot infected. We demonstrate the effectiveness of BotOnus to detect various Botnets including HTTP-, IRC-, and P2P-based Botnets using a testbed network. The results of experiments show that it can successfully detect various Botnets with an average detection rate of 94: 33% and an average false alarm rate of 3: 74%.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 750

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 113 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2024
  • Volume: 

    10
Measures: 
  • Views: 

    46
  • Downloads: 

    2
Abstract: 

Today, social Networks have attracted the attention of billions of Internet users. On the other hand, the widespread use of these Networks is susceptible to many dangerous purposes, such as spreading malware, stealing user information, spreading false information, etc. In this article, the effective detection of Bots in the Twitter social network is proposed using the deep Boltzmann machine, which is one of the important types of deep neural Networks. Indeed, various methods have been provided to detect Bots in social Networks. It is essential to extract key features that directly impact the accuracy of the methods. In order to achieve this goal, the Boltzmann machine neural network has been developed to extract the key and important features from the bunch of features included in the Twitter dataset. Then, based on the selected features, Bots are detected using different classification approaches such as the K-nearest neighbor, support vector machine, AdaBoost, and decision tree, which provide better performance than the existing methods.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 46

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 2
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button