Loading

Botnet Detection Techniques – An Analysis
Jwala Sharma1, Samarjeet Borah2
1Jwala Sharma, Department of Information Technology, DDE, Sikkim Manipal University, Sikkim, India.
2Samarjeet Borah, Department of Computer Applications, Sikkim Manipal Institute of Technology, Sikkim, India.

Manuscript received on 09 April 2019 | Revised Manuscript received on 17 May 2019 | Manuscript published on 30 May 2019 | PP: 2130-2137 | Volume-8 Issue-1, May 2019 | Retrieval Number: A1903058119 /19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A botnet is a network of computers that has been compromised under the influence of malware code and being controlled by botmaster remotely. Every single day botnets develop new evasion techniques to make their presence undetectable. Knowing the consequences of botnets attacks; security analyzer must develop more robust detection methods. In this paper, an overview of botnets along with some real example of the same i.e. rustock, waledac, zeus, conficker are given. Signature based detection technique focuses on pattern, such as network traffic and then search for the known malicious pattern only. Therefore, to detect unknown attacks a robust detection technique is required. Anomaly-based detection techniques are used in such cases. Analysis of anomaly-based detection techniques are probed in this paper.
Keywords: Botnet, Security, Botmaster, Signature Based Detection, Anomaly Based Detection

Scope of the Article: Predictive Analysis