{"title":"Botnet Detection Techniques and Research Challenges","authors":"Sudhakar, Sushil Kumar","doi":"10.1109/ICRAECC43874.2019.8995028","DOIUrl":null,"url":null,"abstract":"The botnet, a network of compromise internet connected devices, controlled by an attacker is considered to be the most catastrophic cybersecurity threat. In the large-scale cyberattacks, such as DDoS (Distributed Denial-of-Service), spamming, phishing, malware distribution using compromised websites, and malvertisement accomplished with the help of the bot army. This could affect the large enterprises as well as small enterprises. In this paper, we will be discussing the botnet detection techniques, based on their propagation and communication methods. Also, I have identified the various parameters at the network level for the detection purpose. Which are mentioned in the research challenges with some research problems.","PeriodicalId":137313,"journal":{"name":"2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRAECC43874.2019.8995028","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The botnet, a network of compromise internet connected devices, controlled by an attacker is considered to be the most catastrophic cybersecurity threat. In the large-scale cyberattacks, such as DDoS (Distributed Denial-of-Service), spamming, phishing, malware distribution using compromised websites, and malvertisement accomplished with the help of the bot army. This could affect the large enterprises as well as small enterprises. In this paper, we will be discussing the botnet detection techniques, based on their propagation and communication methods. Also, I have identified the various parameters at the network level for the detection purpose. Which are mentioned in the research challenges with some research problems.