
Randomised Traffic Path Analysis and Formation for Detecting Distributed Denial of Service Botnet Attacks
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.b1023.0782s419
Subject(s) - botnet , spamming , denial of service attack , phishing , computer security , computer science , honeypot , world wide web , the internet
Botnets are most commonly used in cyber- criminal activity. They’re used for spamming, phishing, denial-of-service attacks, stealing non-public data, and cyber warfare. A botnet may be a range of net computers that, though their homeowners are unaware of but have gotten wind of, forward transmissions (including spam or viruses) to alternative computers on the web. There is a two-stage approach for botnet detection. The primary stage detects and collects network anomalies that are related to the presence of a botnet whereas the second stage identifies the bots by analyzing these anomalies