The Architectural Dynamics of Encapsulated Botnet Detection (EDM)

Botnet is one of the numerous attacks ravaging the networking environment. Its approach is said to be brutal and dangerous to network infrastructures as well as client systems. Since the introduction of botnet, different design methods have been employed to solve the divergent approach but the method of taking over servers and client systems is unabated. To solve this, we first identify Mpack, ICEpack and Fiesta as enhanced IRC tool. The analysis of its role in data exchange using OSI model was carried out. This further gave the needed proposal to the development of a High level architecture representing the structural mechanism and the defensive mechanism within network server so as to control the botnet trend. Finally, the architecture was designed to respond in a proactive state when scanning and synergizing the double data verification modules in an encapsulation manner within server system.

READ FULL TEXT
research
09/20/2022

Carbon: An Asynchronous Voting-Based Payment System for a Client-Server Architecture

We present Carbon, an asynchronous payment system. To the best of our kn...
research
06/16/2018

Mitigating Botnet Attack Using Encapsulated Detection Mechanism (EDM)

Botnet as it is popularly called became fashionable in recent times owin...
research
03/02/2019

The Historical Perspective of Botnet tools

Bot as it is popularly called is an inherent attributes of botnet tool. ...
research
08/31/2020

SOPI design and analysis for LDN

Liquid Data Networking (LDN) is an ICN architecture that is designed to ...
research
09/27/2020

Addressless: A New Internet Server Model to Prevent Network Scanning

Eliminating unnecessary exposure is a principle of server security. The ...
research
03/16/2019

Architecture for Integrating Learning Platforms Using Adapter

The advantage of the electronic and mobile learning platforms is the dis...
research
11/04/2021

Earthquake detection at the edge: IoT crowdsensing network

Earthquake Early Warning state of the art systems rely on a network of s...

Please sign up or login with your details

Forgot password? Click here to reset