PEER-TO-PEER BOTNETS

A SURVEY ON PROPAGATION, DETECTION AND DETECTION EVASION TECHNIQUES

Authors

  • A. M. Oyelakin Computer Science Unit, Department of Science Education, Al-Hikmah University, Ilorin, Nigeria Author
  • Salau-Ibrahim T. T. Department of Computer Sciences, Al-Hikmah University, Ilorin, Nigeria Author
  • Ogidan B. S. Department of Computer Sciences, Al-Hikmah University, Ilorin, Nigeria Author
  • Azeez R. D. ICT Unit, Al-Hikmah University, Ilorin, Ilorin, Nigeria Author
  • Ajiboye I. K. Computer Science Department, Abdul-Raheem College of Advanced Studies Author

Keywords:

Peer-to-Peer Botnets, Evasion Techniques, Malware, Adversarial Attacks, Botnet Detection

Abstract

Botnets have been identified as one of the major threats to users in the internet space, nowadays. Unlike other categories of malware, botnets use Command and Control channels to launch and propagate their attacks. These botnets have been classified as centralised and decentralised (Peer-to-Peer). Due to the structure, Peerto-Peer botnets have different behavioural characteristics from centralised botnets. Past researches have equally identified that Peer-to-Peer botnets are more difficult to detect and shutdown compared to centralised botnets. This work provides a survey on the propagation, detection and detection evasion techniques of Peerto-Peer botnets. The study was able to identify various machine learning-based classifiers that have been proposed to detect Peer-to-Peer botnets in the cyber space. It is believed that any identified gap in the detection mechanisms will bring better insights into P2P botnet researches. The work concluded that identifying some of the Peer-to-Peer botnet propagation mechanisms and their detection evasion techniques will enable security researchers and experts to come up with improved botnet identification and mitigation approaches.

Downloads

Download data is not yet available.
front

Downloads

Published

31-12-2019

How to Cite

PEER-TO-PEER BOTNETS: A SURVEY ON PROPAGATION, DETECTION AND DETECTION EVASION TECHNIQUES. (2019). FULafia Journal of Science and Technology , 5(2), 13-18. https://lafiascijournals.org.ng/index.php/fjst/article/view/190

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 10 > >> 

Similar Articles

1-10 of 19

You may also start an advanced similarity search for this article.