Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/1101
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLokhande, P. S.-
dc.date.accessioned2014-11-12T10:20:21Z-
dc.date.available2014-11-12T10:20:21Z-
dc.date.issued2014-03-
dc.identifier.citationVolume 4, Issue 3, Pg.36-42.en_US
dc.identifier.issn2277 128X-
dc.identifier.urihttp://hdl.handle.net/123456789/1101-
dc.description.abstractThis paper examines botnet behavior and provides the basis for the development of an application tool used to investigate the properties of botnets in large-scale networks. Botnets are breaching security and data safety and are used by hackers for initiating various cyber-attacks. Botnet causes various problems such as information search and theft, denial of service attack, sending SPAM e-mail, and so on. The purpose of this paper is to study basic details of security threats that users of Internet are facing from malicious botnets. There is a need to develop effective mechanism for detecting and mitigating the malicious behavior of botnets. This study helps: (i) To understand behavior of bots and Botmaster. (ii) To study botnet topologies, behavior, lifecycle events and actions; and (iii) to study preventive steps to stop the botnet attacks. Keywords— Botnet, Bot, Botnet Maker, Botmaster, Botnet Detector, Zombie, IRC, DDoS, Spam, Internet Security, Bot Hunter, WebSecurityen_US
dc.language.isoenen_US
dc.publisherInternational Journal of Advanced Research in Computer Science and Software Engineeringen_US
dc.subjectStaff Publication - SoETen_US
dc.subjectStaff Publication - COen_US
dc.titleBotnet: Understanding Behavior, Life Cycle Events & Actionsen_US
dc.typeArticleen_US
Appears in Collections:Research - Dept. of Computer Engg.

Files in This Item:
File Description SizeFormat 
BOTNET UNDERSTANDING ---- IJARCSSE-2014.pdf809.9 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.