Randomised traffic path analysis and formation for detecting distributed denial of service botnet attacks

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Botnets are most commonly used in cyber-criminal activity. They’re used for spamming, phishing, denial-of-service attacks, stealing non-public data, and cyber warfare. A botnet may be a range of net computers that, though their homeowners are unaware of but have gotten wind of, forward transmissions (including spam or viruses) to alternative computers on the web. There is a two-stage approach for botnet detection. The primary stage detects and collects network anomalies that are related to the presence of a botnet whereas the second stage identifies the bots by analyzing these anomalies.

Author supplied keywords

Cite

CITATION STYLE

APA

Maheswari, M., Bhavani, M. G., & Aggarwal, T. (2019). Randomised traffic path analysis and formation for detecting distributed denial of service botnet attacks. International Journal of Recent Technology and Engineering, 8(2), 128–130. https://doi.org/10.35940/ijrte.B1023.0782S419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free