Back to Search Start Over

Analysis of Intrusion Detection Approaches for Network Traffic Anomalies with Comparative Analysis on Botnets (2008–2020).

Authors :
Ahmad, Sultan
Jha, Sudan
Alam, Afroj
Alharbi, Meshal
Nazeer, Jabeen
Source :
Security & Communication Networks; 5/12/2022, p1-11, 11p
Publication Year :
2022

Abstract

Botnets are conglomerations of traded PCs (bots) that are remotely controlled by its originator (botmaster) under a command-and-control (C&C) foundation. Botnets are the making dangers against cutting edge security. They are the key vehicles for several Internet assaults, for example, spam, distributed denial-of-service (DDoS) attack, rebate distortion, malware spreading, and phishing. This review paper depicts the botnet examined in three domains: preview of botnets, observation, and analysis of botnets, apart from keeping track of them and protecting against them too. We have also attempted to the various ways to indicate differing countermeasures to the botnet dangers and propose future heading for botnet affirmation look into a consolidated report on the energy investigation and future headings for botnet break down are also been presented in this paper. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
19390114
Database :
Complementary Index
Journal :
Security & Communication Networks
Publication Type :
Academic Journal
Accession number :
156849812
Full Text :
https://doi.org/10.1155/2022/9199703