PEER-TO-PEER BOTNETS

A SURVEY ON PROPAGATION, DETECTION AND DETECTION EVASION TECHNIQUES

Authors

  • A. M. Oyelakin
    Computer Science Unit, Department of Science Education, Al-Hikmah University, Ilorin, Nigeria
  • Salau-Ibrahim T. T.
    Department of Computer Sciences, Al-Hikmah University, Ilorin, Nigeria
  • Ogidan B. S.
    Department of Computer Sciences, Al-Hikmah University, Ilorin, Nigeria
  • Azeez R. D.
    ICT Unit, Al-Hikmah University, Ilorin, Ilorin, Nigeria
  • Ajiboye I. K.
    Computer Science Department, Abdul-Raheem College of Advanced Studies

Keywords:

Array, Array, Array, Array, Array

Abstract

Botnets have been identified as one of the major threats to users in the internet space, nowadays. Unlike other categories of malware, botnets use Command and Control channels to launch and propagate their attacks. These botnets have been classified as centralised and decentralised (Peer-to-Peer). Due to the structure, Peerto-Peer botnets have different behavioural characteristics from centralised botnets. Past researches have equally identified that Peer-to-Peer botnets are more difficult to detect and shutdown compared to centralised botnets. This work provides a survey on the propagation, detection and detection evasion techniques of Peerto-Peer botnets. The study was able to identify various machine learning-based classifiers that have been proposed to detect Peer-to-Peer botnets in the cyber space. It is believed that any identified gap in the detection mechanisms will bring better insights into P2P botnet researches. The work concluded that identifying some of the Peer-to-Peer botnet propagation mechanisms and their detection evasion techniques will enable security researchers and experts to come up with improved botnet identification and mitigation approaches.

Dimensions
front

Published

31-12-2019

How to Cite

PEER-TO-PEER BOTNETS: A SURVEY ON PROPAGATION, DETECTION AND DETECTION EVASION TECHNIQUES. (2019). FULafia Journal of Science and Technology , 5(2), 13-18. https://lafiascijournals.org.ng/index.php/fjst/article/view/190

How to Cite

PEER-TO-PEER BOTNETS: A SURVEY ON PROPAGATION, DETECTION AND DETECTION EVASION TECHNIQUES. (2019). FULafia Journal of Science and Technology , 5(2), 13-18. https://lafiascijournals.org.ng/index.php/fjst/article/view/190

Similar Articles

21-29 of 29

You may also start an advanced similarity search for this article.