Authors
Devendra Sharma, Aman Sharma
Abstract
Botnet is currently the most emerging risk to the internet safety needs much attention as it have made already a big impact. In criminal activities such as DDoS, click fraud, phishing spamming, sniffing and spreading new malware, botnets are used by the attackers. It is worst when peer-to-peer technology underlying exchanges files and botnets become much tougher to identify and lock down due to which it becomes one of the biggest danger to internet constancy and safety. Hence, botnets are becoming more highlighted for the topic of research. Botnet attacks can be prevented, detected and mitigated by various types of proposed techniques hence, the current trend of botnet techniques and different criterias has beend discussed in this review study. Keywords: Bots, Botnet, Botmaster, Detection Techniques, Botnet Architecture, Botnet Attacks
Introduction
Internet becomes a vital need for everyone in this current scenario. This fast and sharp increase of internet have increase the growth of online attacks. There are many sophisticated attacks are being launched by many cyber criminals towards the network organization through several universally secluded hosts and it is done with the determination of the misuse and is certainly enthused by political and financial intentions.One of the most emergent threat of online attack is Botnet attack which had previously made a huge effect and need much attention. Rapid botnets require uninterrupted work to make sure the detection methods of botnets and have bad impact. Therefore the basic criterion has been selected for the success of botnet detection.
Botnet
Nowadays, botnets are the serious manifestation of advanced malware. An assortment of computers infested by the malevolent software to make drones, bots and zombies, are called botnets. This have been integrated into a massive collective through a centralized expertise and controlled set-up. Botnets act as army for cyber attack by exploiting and recruiting computer and can be used for fake websites, spamming, DDoS attacks, worms, and viruses. Widespread security analysis and safety issues are created by the malicious behaviours of botnets that propagating the cyber crimes.
References
Abdullah, Raihana Syahirah, et al. “Revealing the Criterion on Botnet Detection Technique.” IJCSI International Journal of Computer Science Issues, vol. 10, no. 2, Mar. 2013, pp. 208–215.
Alzahrani, Sabah, and Liang Hong. “A Survey of Cloud Computing Detection Techniques against DDoS Attacks.” Journal of Information Security, vol. 09, no. 01, 2018, pp. 45–69.
Anwar, Shahid, et al. “A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing.” IEEE Symposium on Computers & Informatics, At Kota Kinabalu, Sabah, Malaysia, Sept. 2014.
Karim, Ahmad, et al. “Botnet Detection Techniques: Review, Future Trends, and Issues.” Journal of Zhejiang University SCIENCE C, vol. 15, no. 11, 2014, pp. 943–983.
Kaur, Parneet, and Anuj Gupta. “A Study on Botnet Detection in Cloud Network.” International Journal of Computer Science Engineering, vol. 6, no. 11, Dec. 2017, pp. 225–229.
Lin, Kuan-Cheng, et al. “Botnet Detection Using Support Vector Machines with Artificial Fish Swarm Algorithm.” Journal of Applied Mathematics, vol. 2014, 2014, pp. 1–9.
Prabhu, S. Nagendra, and D. Shanthi. “A Survey on Anomaly Detection of Botnet in Network.” International Journal of Advance Research in Computer Science and Management Studies, vol. 2, no. 1, Jan. 2014, pp. 552–558.
Thangapandiyan, M., and P. M. Rubesh Anand. “Botnet Detection Techniques in Cloud Computing Environment: A Survey.” International Journal of Pure and Applied Mathematics, vol. 118, no. 22, pp. 929–939.
Zhao, Yao, et al. “BotGraph: Large Scale Spamming Botnet Detection.” Symposium on Networked Systems Design and Implementation, pp. 321–334.
How to cite this article?
APA Style | Sharma, D. and Sharma, A. (2019). Botnet and Botnet Detection Techniques. Academic Journal of Information Security, 1(1), 6-10. |
Chicago Style | |
MLA Style | |
DOI | |
URL |