Please use this identifier to cite or link to this item: http://ir.lib.seu.ac.lk/handle/123456789/4314
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAhamed Sabani, Mohamed Jamaldeen-
dc.contributor.authorKrishnamoorthy, Janarthanan-
dc.date.accessioned2020-01-27T07:51:26Z-
dc.date.available2020-01-27T07:51:26Z-
dc.date.issued2019-11-25-
dc.identifier.citation8th Annual International Research Conference - 2019, on "Sustainability through Business, Humanities and Technologies", pp. 170-176.en_US
dc.identifier.isbn978-955-627-195-9-
dc.identifier.urihttp://ir.lib.seu.ac.lk/handle/123456789/4314-
dc.description.abstractModern network system facing challenges in securing network infrastructure. Cybercrime has been becoming challenge to the security filed cause of increasing growth of internet usage. One of the most significant threats faced by the network connected system is Botnet. The Botnet is an evolving threat to the cybersecurity, and with the existence of command and control server (C&C server). It makes most malware attack compared to all other attacks. The bots in a network which causes a malicious act is known as the Botnet attack. The main aim of the Bot attack will vary from key-logging attack in a network to severe attack like Distributed Denial of Service (DDoS). An attacker called Bot-master controls this Botnet. This paper discusses different types of architecture in botnets such Centralized botnets with HTTP and IRC protocols, Decentralized botnets with P2P and Hybrid architecture. Meanwhile it discusses various threats and different detection mechanisms based on Signature, Anomaly, DNS, Data mining and Machine learning detection methods which used to detect bots in a network system. However many pieces of research have been done on a botnet to detect and control the botnet activities, but still, it's a challenging topic in cyber security. Botnets are now in raising the edge of attack by an attacker, thus researches on detecting the botnets with higher accuracy, especially on bot cloud, mobile Botnet is timely required.en_US
dc.language.isoen_USen_US
dc.publisherFaculty of Management and Commerce, South Eastern University of Sri Lanka.en_US
dc.subjectBoten_US
dc.subjectBotneten_US
dc.subjectCommand and Control Serveren_US
dc.subjectDDoSen_US
dc.subjectCentralized Botneten_US
dc.subjectDecentralized Botneten_US
dc.titleCyber threats based on botnet and its detection mechanismsen_US
dc.typeArticleen_US
Appears in Collections:8th Annual International Research Conference - 2019

Files in This Item:
File Description SizeFormat 
final bind-AIRC online proceedings 13.01.2020 (Finalized) - Page 170-176.pdf370.35 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.