CFP last date
20 June 2024
Reseach Article

Botnet-A Network Threat

Published on March 2012 by Sonal P.Patil, Swatantra Kumar
International Conference on Recent Trends in Information Technology and Computer Science
Foundation of Computer Science USA
ICRTITCS - Number 1
March 2012
Authors: Sonal P.Patil, Swatantra Kumar

Sonal P.Patil, Swatantra Kumar . Botnet-A Network Threat. International Conference on Recent Trends in Information Technology and Computer Science. ICRTITCS, 1 (March 2012), 28-35.

author = { Sonal P.Patil, Swatantra Kumar },
title = { Botnet-A Network Threat },
journal = { International Conference on Recent Trends in Information Technology and Computer Science },
issue_date = { March 2012 },
volume = { ICRTITCS },
number = { 1 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 28-35 },
numpages = 8,
url = { /proceedings/icrtitcs/number1/5174-1006/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Proceeding Article
%1 International Conference on Recent Trends in Information Technology and Computer Science
%A Sonal P.Patil
%A Swatantra Kumar
%T Botnet-A Network Threat
%J International Conference on Recent Trends in Information Technology and Computer Science
%@ 0975-8887
%N 1
%P 28-35
%D 2012
%I International Journal of Computer Applications

Botnet are network threats that generally occur from cyber attacks, which results in serious threats to our network assets and organization’s properties. Botnets are collections of compromised computers (Bots) which are remotely controlled by its originator (BotMaster) under a common Command-and-Control (C&C) infrastructure. Among the various forms of malware, botnets are emerging as the most serious threat against cyber-security as they provide a distributed platform for several illegal activities such as launching distributed denial of service attacks against critical targets, malware dissemination, phishing, and click fraud. The most important characteristic of botnets is the use of command and control channels through which they can be updated and directed. The target of the botnet attacks on the integrity and resources of users might be multifarious; including the teenagers evidencing their hacking skills to organized criminal syndicates, disabling the infrastructure and causing financial damage to organizations and governments. In this context, it is crucial to know in what ways the system could be targeted. The major advantage of this classification is to identify the problem and find the specific ways of defense and recovery. This paper aims to provide a concise overview of major existing types of Botnets on the basis of attacking techniques.

  1. Hossein Rouhani Zeidanloo, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Mazdak Zamani, Saman Shojae Chaeikar, “A Proposed Framework for P2P Botnet Detection” IACSIT International Journal of Engineering and Technology, Vol.2, No.2, April 2010.
  2. Fatima Naseem, Mariam shafqat, Umbreen Sabir, Asim Shahzad, “A Survey of Botnet Technology and Detection” International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol: 10 No: 01.Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
  3. Hailong Wang, Zhengu Gong, “Collaboration-based Botnet Detection Architecture”, 2009 Second International Conference on Intelligent Computation Technology and Automation.
  4. Maryam Feily, Alireza Shahrestani, Sureswaran Ramadass, “A Survey of Botnet and Botnet Detection” 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
  5. Alireza Shahrestani, Maryam Feily, Rodina Ahmad, Sureswaran Ramadass, “architecture for applying data mining and visualization on network flow for botnet traffic detection”, 2009 International Conference on Computer Technology and Development.
  6. Hossein Rouhani Zeidanloo, Azizah Bt Manaf, Payam Vahdani, Farzaneh Tabatabaei, Mazdak Zamani, “Botnet Detection Based on Traffic Monitoring”, 201O International Conference on Networking and Information Technology.Y.T. Yu, M.F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
  7. Jae-Seo Lee, HyunCheol Jeong, Jun-Hyung Park, Minsoo Kim, Bong-Nam Noh, “The Activity Analysis of Malicious HTTPbased Botnets using Degree of Periodic Repeatability”, IEEE International Conference on Security Technology, 2008.
  8. Wen-Hwa Liao, Chia-Ching Chang, “Peer to Peer Botnet Detection Using Data Mining Scheme”, IEEE 2010=
Index Terms

Computer Science
Information Sciences


Botnet Bots Botnet Detection