Please use this identifier to cite or link to this item:
http://ir.lib.seu.ac.lk/handle/123456789/4314
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ahamed Sabani, Mohamed Jamaldeen | - |
dc.contributor.author | Krishnamoorthy, Janarthanan | - |
dc.date.accessioned | 2020-01-27T07:51:26Z | - |
dc.date.available | 2020-01-27T07:51:26Z | - |
dc.date.issued | 2019-11-25 | - |
dc.identifier.citation | 8th Annual International Research Conference - 2019, on "Sustainability through Business, Humanities and Technologies", pp. 170-176. | en_US |
dc.identifier.isbn | 978-955-627-195-9 | - |
dc.identifier.uri | http://ir.lib.seu.ac.lk/handle/123456789/4314 | - |
dc.description.abstract | Modern network system facing challenges in securing network infrastructure. Cybercrime has been becoming challenge to the security filed cause of increasing growth of internet usage. One of the most significant threats faced by the network connected system is Botnet. The Botnet is an evolving threat to the cybersecurity, and with the existence of command and control server (C&C server). It makes most malware attack compared to all other attacks. The bots in a network which causes a malicious act is known as the Botnet attack. The main aim of the Bot attack will vary from key-logging attack in a network to severe attack like Distributed Denial of Service (DDoS). An attacker called Bot-master controls this Botnet. This paper discusses different types of architecture in botnets such Centralized botnets with HTTP and IRC protocols, Decentralized botnets with P2P and Hybrid architecture. Meanwhile it discusses various threats and different detection mechanisms based on Signature, Anomaly, DNS, Data mining and Machine learning detection methods which used to detect bots in a network system. However many pieces of research have been done on a botnet to detect and control the botnet activities, but still, it's a challenging topic in cyber security. Botnets are now in raising the edge of attack by an attacker, thus researches on detecting the botnets with higher accuracy, especially on bot cloud, mobile Botnet is timely required. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Faculty of Management and Commerce, South Eastern University of Sri Lanka. | en_US |
dc.subject | Bot | en_US |
dc.subject | Botnet | en_US |
dc.subject | Command and Control Server | en_US |
dc.subject | DDoS | en_US |
dc.subject | Centralized Botnet | en_US |
dc.subject | Decentralized Botnet | en_US |
dc.title | Cyber threats based on botnet and its detection mechanisms | en_US |
dc.type | Article | en_US |
Appears in Collections: | 8th Annual International Research Conference - 2019 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
final bind-AIRC online proceedings 13.01.2020 (Finalized) - Page 170-176.pdf | 370.35 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.