Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Detecting Botnets via DNS Traffic Analysis Using Machine Learning

Hack In The Box Security Conference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk from HITB2024BKK that delves into an innovative machine learning approach for detecting botnets through DNS traffic analysis. Learn how to distinguish between algorithmically generated and human-created domain names using natural language processing combined with whitelist techniques. Discover the implementation of Random Forest models for anomaly detection in DNS traffic, with a focus on leveraging multicore CPU processing for enhanced detection capabilities. Gain insights from a team of experts including Withawat Tangtrongpairoj's network security expertise, Pirawat Watanapongse's neural network background, Surasak Sanguanpong's networking knowledge, and Korrawit Chaikangwan's academic perspective as they present a methodology to combat sophisticated botnet threats that employ advanced evasion techniques for their command and control servers.

Syllabus

#HITB2024BKK #COMMSEC D2: Detecting Botnets via DNS Traffic Analysis Using Machine Learning

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Detecting Botnets via DNS Traffic Analysis Using Machine Learning

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.