z-logo
open-access-imgOpen Access
Randomised Traffic Path Analysis and Formation for Detecting Distributed Denial of Service Botnet Attacks
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.b1023.0782s419
Subject(s) - botnet , spamming , denial of service attack , phishing , computer security , computer science , honeypot , world wide web , the internet
Botnets are most commonly used in cyber- criminal activity. They’re used for spamming, phishing, denial-of-service attacks, stealing non-public data, and cyber warfare. A botnet may be a range of net computers that, though their homeowners are unaware of but have gotten wind of, forward transmissions (including spam or viruses) to alternative computers on the web. There is a two-stage approach for botnet detection. The primary stage detects and collects network anomalies that are related to the presence of a botnet whereas the second stage identifies the bots by analyzing these anomalies

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here