نوع مقاله : مقاله پژوهشی
نویسندگان
1 گروه مهندسی کامپیوتر، واحد نیشابور، دانشگاه آزاد اسلامی، نیشابور، ایران
2 گروه مهندسی کامپیوتر، واحدمشهد، دانشگاه آزاد اسلامی، مشهد، ایران
3 گروه مهندسی کامپیوتر، واحد قوچان، دانشگاه آزاد اسلامی ، قوچان، ایران
چکیده
کلیدواژهها
عنوان مقاله [English]
نویسندگان [English]
Available botnets currently cover a wide range of Internet shipments. Use the net to access the network from infected computers connected to the Internet, remotely. Using research in this field is done based on the signatures with the result of the discovered results, anomalies, traffic behavior, and existing addresses. This method has not been able to detect a high rate at the moment, which is especially useful when it performs its main behavior, or these are methods that have already been forgotten due to need for memory. It is so great that it is practically impossible to do. The purpose of this study is to propose the construction to perform the identification operation, which is presented in this study with Markov chain and without the use of memory because Markov chain in this study does not require storage memory and does not exist based on behavioral analysis. The proposed method is able to perform useful behaviors using incorrect results of the operation better than the previous solutions, because if it examines the form you need, if such conditions do not exist, it will cause a computational overhead. In this research, various criteria such as medium circuit lines, accuracy and precision under consideration are captured, and in other of these proposed methods, as more possible than other existing methods, it is better if performed.
کلیدواژهها [English]
Khanjani, “Software Blurring by Multi-Yarn Petri Nets”, 20th Annual National Conference of the Iranian Computer Association, 2015. (In Persian)##
Zeng, X. Hu, and G. Shin,“Detection of Botnets Using Combined Host and Network-Level
Information,” IEEE/IFIP International Conference on Dependable Systems & Networks (DSN),
pp. 291-300,2017. ##