Abstract
Botnets are most commonly used in cyber-criminal activity. They’re used for spamming, phishing, denial-of-service attacks, stealing non-public data, and cyber warfare. A botnet may be a range of net computers that, though their homeowners are unaware of but have gotten wind of, forward transmissions (including spam or viruses) to alternative computers on the web. There is a two-stage approach for botnet detection. The primary stage detects and collects network anomalies that are related to the presence of a botnet whereas the second stage identifies the bots by analyzing these anomalies.
Author supplied keywords
Cite
CITATION STYLE
Maheswari, M., Bhavani, M. G., & Aggarwal, T. (2019). Randomised traffic path analysis and formation for detecting distributed denial of service botnet attacks. International Journal of Recent Technology and Engineering, 8(2), 128–130. https://doi.org/10.35940/ijrte.B1023.0782S419
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.