Botnet Detection Techniques and Research Challenges

Sudhakar, Sushil Kumar
{"title":"Botnet Detection Techniques and Research Challenges","authors":"Sudhakar, Sushil Kumar","doi":"10.1109/ICRAECC43874.2019.8995028","DOIUrl":null,"url":null,"abstract":"The botnet, a network of compromise internet connected devices, controlled by an attacker is considered to be the most catastrophic cybersecurity threat. In the large-scale cyberattacks, such as DDoS (Distributed Denial-of-Service), spamming, phishing, malware distribution using compromised websites, and malvertisement accomplished with the help of the bot army. This could affect the large enterprises as well as small enterprises. In this paper, we will be discussing the botnet detection techniques, based on their propagation and communication methods. Also, I have identified the various parameters at the network level for the detection purpose. Which are mentioned in the research challenges with some research problems.","PeriodicalId":137313,"journal":{"name":"2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRAECC43874.2019.8995028","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The botnet, a network of compromise internet connected devices, controlled by an attacker is considered to be the most catastrophic cybersecurity threat. In the large-scale cyberattacks, such as DDoS (Distributed Denial-of-Service), spamming, phishing, malware distribution using compromised websites, and malvertisement accomplished with the help of the bot army. This could affect the large enterprises as well as small enterprises. In this paper, we will be discussing the botnet detection techniques, based on their propagation and communication methods. Also, I have identified the various parameters at the network level for the detection purpose. Which are mentioned in the research challenges with some research problems.
僵尸网络检测技术与研究挑战
僵尸网络是一种由攻击者控制的互联网连接设备组成的网络,被认为是最具灾难性的网络安全威胁。在大规模的网络攻击中,例如DDoS(分布式拒绝服务),垃圾邮件,网络钓鱼,使用受损网站分发恶意软件,以及在机器人军队的帮助下完成恶意广告。这既可能影响大型企业,也可能影响小型企业。在本文中,我们将讨论僵尸网络的检测技术,基于它们的传播和通信方法。此外,我已经确定了用于检测目的的网络级别的各种参数。这些都是在研究中提到的挑战和一些研究问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信