A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing

Recently, botnets are the most radical of all cyberattacks and becoming the key issue in cloud computing. Botnets are the network of different compromised computers and/or smartphones. These devices are infected with malicious code by botmaster and controlled as groups. The attackers use these botne...

Full description

Bibliographic Details
Main Authors: Shahid, Anwar, Jasni, Mohamad Zain, Mohamad Fadli, Zolkipli, Zakira, Inayat
Format: Conference or Workshop Item
Language:English
English
Published: IEEE 2014
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/18451/
http://umpir.ump.edu.my/id/eprint/18451/
http://umpir.ump.edu.my/id/eprint/18451/1/A%20Review%20Paper%20on%20Botnet%20and%20Botnet%20Detection%20Techniques%20in%20Cloud%20Computing.pdf
http://umpir.ump.edu.my/id/eprint/18451/2/A%20Review%20Paper%20on%20Botnet%20and%20Botnet%20Detection%20Techniques%20in%20Cloud%20Computing%201.pdf
id ump-18451
recordtype eprints
spelling ump-184512019-10-15T07:32:51Z http://umpir.ump.edu.my/id/eprint/18451/ A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing Shahid, Anwar Jasni, Mohamad Zain Mohamad Fadli, Zolkipli Zakira, Inayat QA76 Computer software Recently, botnets are the most radical of all cyberattacks and becoming the key issue in cloud computing. Botnets are the network of different compromised computers and/or smartphones. These devices are infected with malicious code by botmaster and controlled as groups. The attackers use these botnets for criminal activities such as DDoS, click fraud, phishing, spamming, sniffing traffic and spreading new malware. The main issue is how to detect these botnets? It becomes more interesting for the researchers related to cyber-security? This motivates us to write a review on botnets, its architecture and detection techniques. IEEE 2014 Conference or Workshop Item PeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/18451/1/A%20Review%20Paper%20on%20Botnet%20and%20Botnet%20Detection%20Techniques%20in%20Cloud%20Computing.pdf application/pdf en http://umpir.ump.edu.my/id/eprint/18451/2/A%20Review%20Paper%20on%20Botnet%20and%20Botnet%20Detection%20Techniques%20in%20Cloud%20Computing%201.pdf Shahid, Anwar and Jasni, Mohamad Zain and Mohamad Fadli, Zolkipli and Zakira, Inayat (2014) A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing. In: Conference: ISCI 2014 – IEEE Symposium on Computers & Informatics, 28 - 29 September 2014 , Kota Kinabalu, Sabah, Malaysia. pp. 1-5.. https://www.researchgate.net/profile/Shahid_Anwar3/publication/283257776_A_Review_Paper_on_Botnet_and_Botnet_Detection_Techniques_in_Cloud_Computing/links/562f525308ae4742240abea7.pdf
repository_type Digital Repository
institution_category Local University
institution Universiti Malaysia Pahang
building UMP Institutional Repository
collection Online Access
language English
English
topic QA76 Computer software
spellingShingle QA76 Computer software
Shahid, Anwar
Jasni, Mohamad Zain
Mohamad Fadli, Zolkipli
Zakira, Inayat
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
description Recently, botnets are the most radical of all cyberattacks and becoming the key issue in cloud computing. Botnets are the network of different compromised computers and/or smartphones. These devices are infected with malicious code by botmaster and controlled as groups. The attackers use these botnets for criminal activities such as DDoS, click fraud, phishing, spamming, sniffing traffic and spreading new malware. The main issue is how to detect these botnets? It becomes more interesting for the researchers related to cyber-security? This motivates us to write a review on botnets, its architecture and detection techniques.
format Conference or Workshop Item
author Shahid, Anwar
Jasni, Mohamad Zain
Mohamad Fadli, Zolkipli
Zakira, Inayat
author_facet Shahid, Anwar
Jasni, Mohamad Zain
Mohamad Fadli, Zolkipli
Zakira, Inayat
author_sort Shahid, Anwar
title A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
title_short A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
title_full A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
title_fullStr A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
title_full_unstemmed A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
title_sort review paper on botnet and botnet detection techniques in cloud computing
publisher IEEE
publishDate 2014
url http://umpir.ump.edu.my/id/eprint/18451/
http://umpir.ump.edu.my/id/eprint/18451/
http://umpir.ump.edu.my/id/eprint/18451/1/A%20Review%20Paper%20on%20Botnet%20and%20Botnet%20Detection%20Techniques%20in%20Cloud%20Computing.pdf
http://umpir.ump.edu.my/id/eprint/18451/2/A%20Review%20Paper%20on%20Botnet%20and%20Botnet%20Detection%20Techniques%20in%20Cloud%20Computing%201.pdf
first_indexed 2023-09-18T22:26:09Z
last_indexed 2023-09-18T22:26:09Z
_version_ 1777415979942281216