Skip to main content

Showing 1–2 of 2 results for author: Kharrazi, M

Searching in archive cs. Search in all archives.
.
  1. An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets

    Authors: Sajjad Arshad, Maghsoud Abbaspour, Mehdi Kharrazi, Hooman Sanatkar

    Abstract: Botnets (networks of compromised computers) are often used for malicious activities such as spam, click fraud, identity theft, phishing, and distributed denial of service (DDoS) attacks. Most of previous researches have introduced fully or partially signature-based botnet detection approaches. In this paper, we propose a fully anomaly-based approach that requires no a priori knowledge of bot signa… ▽ More

    Submitted 2 November, 2018; originally announced November 2018.

    Comments: IEEE Conference on Computer Applications and Industrial Electronics (ICCAIE), Penang, Malaysia, December 2011

  2. arXiv:1707.02520  [pdf, other

    cs.CR

    A Composite-Metric Based Path Selection Technique for the Tor Anonymity Network

    Authors: Sadegh Momeni Milajerdi, Mehdi Kharrazi

    Abstract: The Tor anonymous network has become quite popular with regular users on the Internet. In the Tor network, an anonymous path is created by selecting three relays through which the connection is redirected. Nevertheless, as the number of Tor users has increased substantially in recent years, the algorithm with which the relays are selected affects the performance provided by the Tor network. More i… ▽ More

    Submitted 8 July, 2017; originally announced July 2017.

    Comments: Journal of Systems and Software 2015