RETRACTED: Analysis of Intrusion Detection Approaches for Network Traffic Anomalies with Comparative Analysis on Botnets (2008-2020) (Retracted Article)

被引:7
作者
Ahmad, Sultan [1 ]
Jha, Sudan [2 ]
Alam, Afroj [3 ]
Alharbi, Meshal [1 ]
Nazeer, Jabeen [1 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Dept Comp Sci, POB 151, Al Kharj 11942, Saudi Arabia
[2] Kathmandu Univ, Sch Engn, Dept Comp Sci & Engn, Kathmandu, Nepal
[3] Bakhtar Univ, Dept Comp Sci, Kabul, Afghanistan
关键词
BEHAVIOR; TRENDS;
D O I
10.1155/2022/9199703
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets are conglomerations of traded PCs (bots) that are remotely controlled by its originator (botmaster) under a command-and-control (C&C) foundation. Botnets are the making dangers against cutting edge security. They are the key vehicles for several Internet assaults, for example, spam, distributed denial-of-service (DDoS) attack, rebate distortion, malware spreading, and phishing. This review paper depicts the botnet examined in three domains: preview of botnets, observation, and analysis of botnets, apart from keeping track of them and protecting against them too. We have also attempted to the various ways to indicate differing countermeasures to the botnet dangers and propose future heading for botnet affirmation look into a consolidated report on the energy investigation and future headings for botnet break down are also been presented in this paper.
引用
收藏
页数:11
相关论文
共 57 条
[1]  
Al-Duwairi Basheer, 2010, Proceedings of the Fifth International Conference on Internet Monitoring and Protection (ICIMP 2010), P16, DOI 10.1109/ICIMP.2010.11
[2]   Defending from Stealthy Botnets Using Moving Target Defenses [J].
Albanese M. ;
Jajodia S. ;
Venkatesan S. .
IEEE Security and Privacy, 2018, 16 (01) :92-97
[3]  
Albanesius C., 2011, HACKERS TARGET MALAY
[4]   DNS rule-based schema to botnet detection [J].
Alieyan, Kamal ;
Almomani, Ammar ;
Anbar, Mohammed ;
Alauthman, Mohammad ;
Abdullah, Rosni ;
Gupta, B. B. .
ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (04) :545-564
[5]  
Alomari Esraa., 2012, International Journal of Computer Applications, V49, P24, DOI DOI 10.5120/7640-0724
[6]   New facets of mobile botnet: architecture and evaluation [J].
Anagnostopoulos, Marios ;
Kambourakis, Georgios ;
Gritzalis, Stefanos .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (05) :455-473
[7]  
[Anonymous], P 1 WORKSH HOT TOP U
[8]  
[Anonymous], P 13 NETW DISTR SYST
[9]  
[Anonymous], 2011, TECH4BIZ DDOS ATTACK
[10]  
[Anonymous], 2017, A Survey of Advances in Botnet Technologies