PEER-TO-PEER BOTNETS

A SURVEY ON PROPAGATION, DETECTION AND DETECTION EVASION TECHNIQUES

المؤلفون

  • A. M. Oyelakin Computer Science Unit, Department of Science Education, Al-Hikmah University, Ilorin, Nigeria مؤلف
  • T. T. Salau-Ibrahim Department of Computer Sciences, Al-Hikmah University, Ilorin, Nigeria مؤلف
  • B. S. Ogidan Department of Computer Sciences, Al-Hikmah University, Ilorin, Nigeria مؤلف
  • R. D. Azeez ICT Unit, Al-Hikmah University, Ilorin, Ilorin, Nigeria مؤلف
  • I. K. Ajiboye Computer Science Department, Abdul-Raheem College of Advanced Studies مؤلف

الكلمات المفتاحية:

Peer-to-Peer Botnets، Evasion Techniques، Malware، Adversarial Attacks، Botnet Detection

الملخص

Botnets have been identified as one of the major threats to users in the internet space, nowadays. Unlike other categories of malware, botnets use Command and Control channels to launch and propagate their attacks. These botnets have been classified as centralised and decentralised (Peer-to-Peer). Due to the structure, Peerto-Peer botnets have different behavioural characteristics from centralised botnets. Past researches have equally identified that Peer-to-Peer botnets are more difficult to detect and shutdown compared to centralised botnets. This work provides a survey on the propagation, detection and detection evasion techniques of Peerto-Peer botnets. The study was able to identify various machine learning-based classifiers that have been proposed to detect Peer-to-Peer botnets in the cyber space. It is believed that any identified gap in the detection mechanisms will bring better insights into P2P botnet researches. The work concluded that identifying some of the Peer-to-Peer botnet propagation mechanisms and their detection evasion techniques will enable security researchers and experts to come up with improved botnet identification and mitigation approaches.

التنزيلات

تنزيل البيانات ليس متاحًا بعد.
front

التنزيلات

منشور

2019-12-31

كيفية الاقتباس

PEER-TO-PEER BOTNETS: A SURVEY ON PROPAGATION, DETECTION AND DETECTION EVASION TECHNIQUES. (2019). FULafia Journal of Science and Technology , 5(2), 13-18. https://lafiascijournals.org.ng/index.php/fjst/article/view/190

الأعمال الأكثر قراءة لنفس المؤلف/المؤلفين

<< < 9 10 11 12 13 14 15 16 17 18 > >> 

المؤلفات المشابهة

1-10 من 22

يمكنك أيضاً إبدأ بحثاً متقدماً عن المشابهات لهذا المؤلَّف.