ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Advanced Research in Engineering and Technology (IJARET) (Vol.11, No. 12)

Publication Date:

Authors : ;

Page : 204-212

Keywords : Botnet Detection; Hyper Text Transfer Protocol; Internet Relay Chat; Intruder; Peer to Peer Botnet.;

Source : Downloadexternal Find it from : Google Scholarexternal


The botnet is one of electronic information and technology's most substantial threats. Because all people throughout the world are discovering new innovations, offenders are exploring new tools to offer crime in different meanings. It is not necessary to be available on the web of the criminal act due to the development of tech offenders. Intruders can target potential users directly and take hold of their passwords to perform multiple harmful operations. Original bots evolved throughout the Web's early years were malignant. The botnet, a system of web-connected manipulating computers operated by an intruder, is known as one of the most devastating risks to security. Whenever a machine is usually damaged by a drive-by-download, which has integrated malware, that machine has become a member of a botnet. A bot usually runs concealed and communicates in its operational server using a secret network. Botnets are managed by protocols like Internet Relay Chat and Hyper Text Transfer Protocol (HTTP) and in a protocol-consistent way which renders it a difficult issue to identify and monitor the botnet command. This paper gives a comprehensive overview of Botnet detection techniques followed by its merits, demerits and features employed in various techniques.

Last modified: 2021-02-23 15:04:00