Review of Peer-to-Peer Botnets and Detection Mechanisms

07/17/2022
by   Khoh Choon Hwa, et al.
0

Cybercrimes are becoming a bigger menace to both people and corporations. It poses a serious challenge to the modern digital world. According to a press release from 2019 Cisco and Cybersecurity Ventures, Cisco stopped seven trillion threats in 2018, or 20 billion threats every day, on behalf of its clients. According to Cybersecurity Ventures, the global cost of cybercrime will reach $6 trillion annually by 2021, which is significantly more than the annual damage caused by all natural disasters and more profitable than the global trade in all major illegal narcotics put together. Malware software, including viruses, worms, spyware, keyloggers, Trojan horses, and botnets, is therefore frequently used in cybercrime. The most common malware employed by attackers to carry out cybercrimes is the botnet, which is available in a variety of forms and for a variety of purposes when attacking computer assets. However, the issue continues to exist and worsen, seriously harming both enterprises and people who conduct their business online. The detection of P2P (Peer to Peer) botnet, which has emerged as one of the primary hazards in network cyberspace for acting as the infrastructure for several cyber-crimes, has proven more difficult than regular botnets using a few existing approaches. As a result, this study will explore various P2P botnet detection algorithms by outlining their essential characteristics, advantages and disadvantages, obstacles, and future research.

READ FULL TEXT
research
07/05/2022

Malware and Ransomware Detection Models

Cybercrime is one of the major digital threats of this century. In parti...
research
06/10/2021

Use of a non-peer reviewed sources in cyber-security scientific research

Most publicly available data on cyber incidents comes from private compa...
research
03/05/2021

SoK: Cryptojacking Malware

Emerging blockchain and cryptocurrency-based technologies are redefining...
research
07/17/2022

Mobile Security for the modern CEO: Attacks, Mitigations, and Future Trends

Todays world is digital, global, and interconnected and mobile devices a...
research
02/23/2018

Enhanced PeerHunter: Detecting Peer-to-peer Botnets through Network-Flow Level Community Behavior Analysis

Peer-to-peer (P2P) have become one of the major threats in network secur...
research
12/10/2017

Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies

The scalable, low overhead attributes of Peer-to-Peer (P2P) Internet pro...

Please sign up or login with your details

Forgot password? Click here to reset