A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
Recently, botnets are the most radical of all cyberattacks and becoming the key issue in cloud computing. Botnets are the network of different compromised computers and/or smartphones. These devices are infected with malicious code by botmaster and controlled as groups. The attackers use these botne...
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
IEEE
2014
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/18451/ http://umpir.ump.edu.my/id/eprint/18451/ http://umpir.ump.edu.my/id/eprint/18451/1/A%20Review%20Paper%20on%20Botnet%20and%20Botnet%20Detection%20Techniques%20in%20Cloud%20Computing.pdf http://umpir.ump.edu.my/id/eprint/18451/2/A%20Review%20Paper%20on%20Botnet%20and%20Botnet%20Detection%20Techniques%20in%20Cloud%20Computing%201.pdf |
Summary: | Recently, botnets are the most radical of all cyberattacks and becoming the key issue in cloud computing. Botnets are the network of different compromised computers and/or smartphones. These devices are infected with malicious code by botmaster and controlled as groups. The attackers use these botnets for criminal activities such as DDoS, click fraud, phishing, spamming, sniffing traffic and spreading new malware. The main issue is how to detect these botnets? It becomes more interesting for the researchers related to cyber-security? This motivates us to write a review on botnets, its architecture and detection techniques. |
---|