Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Reviewing the Current Threat Landscape of Botnets

View through CrossRef
Botnets have been around for about three decades, and their sophistication and capabilities have evolved rapidly over the period. Originally simple codes that were used for the administration of IRC channels, botnets today pose very formidable threats to systems and network infrastructure. They have become one of the more-preferred options in the toolkit of hackers and cybercriminals; particularly due to their ability to subvert and overrun secure infrastructures within a relatively short time. Research has greatly advanced in trying to keep up with the rapid evolution of the botnet threat. At this time, it is important to review the status of the threat, vis-á-vis the extent of research that has emerged in relation to the threat. This is crucial for understanding the future prospects of the threat, in terms of where it is headed next; as well as what research areas require more work. This exploratory research serves this purpose. It introduces the botnet threat from its early origins; then it traverses the current status of botnets, and summarizes research efforts so far (highlighting some limitations of modern countermeasures). It further goes on to discuss the future trends of botnets and botnet research, before bringing it together to present the current threat landscape.
Title: Reviewing the Current Threat Landscape of Botnets
Description:
Botnets have been around for about three decades, and their sophistication and capabilities have evolved rapidly over the period.
Originally simple codes that were used for the administration of IRC channels, botnets today pose very formidable threats to systems and network infrastructure.
They have become one of the more-preferred options in the toolkit of hackers and cybercriminals; particularly due to their ability to subvert and overrun secure infrastructures within a relatively short time.
Research has greatly advanced in trying to keep up with the rapid evolution of the botnet threat.
At this time, it is important to review the status of the threat, vis-á-vis the extent of research that has emerged in relation to the threat.
This is crucial for understanding the future prospects of the threat, in terms of where it is headed next; as well as what research areas require more work.
This exploratory research serves this purpose.
It introduces the botnet threat from its early origins; then it traverses the current status of botnets, and summarizes research efforts so far (highlighting some limitations of modern countermeasures).
It further goes on to discuss the future trends of botnets and botnet research, before bringing it together to present the current threat landscape.

Related Results

Understanding Botnets: Architecture, Attacks, and Mitigation Strategies
Understanding Botnets: Architecture, Attacks, and Mitigation Strategies
Botnets represents a significant threat in the cybersecurity landscape. Botnets relies on the set of compromised devices called as bots or zombies which are remotely connected and ...
A Hybrid Association Rule-Based Method to Detect and Classify Botnets
A Hybrid Association Rule-Based Method to Detect and Classify Botnets
Nowadays, botnet has become a threat in the area of cybersecurity, and, worse still, it is difficult to be detected in complex network environments. Thus, traffic analysis is adopt...
A STUDY ON ADVANCED BOTNETS DETECTION IN VARIOUS COMPUTING SYSTEMS USING MACHINE LEARNING TECHNIQUES
A STUDY ON ADVANCED BOTNETS DETECTION IN VARIOUS COMPUTING SYSTEMS USING MACHINE LEARNING TECHNIQUES
Due to the rapid growth and use of Emerging technologies such as Artificial Intelligence, Machine Learning and Internet of Things, Information industry became so popular, meanwhile...
Detecting Malicious Botnets in IoT Networks Using Machine Learning Techniques
Detecting Malicious Botnets in IoT Networks Using Machine Learning Techniques
The widespread use of the Internet of Things (IoT) has led to a rise in botnet attacks, with the Mirai botnet being a major source of Distributed Denial of Service (DDOS) attacks. ...
ThreatBased Security Risk Evaluation in the Cloud
ThreatBased Security Risk Evaluation in the Cloud
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources f...
GIS-based landscape design research
GIS-based landscape design research
Landscape design research is important for cultivating spatial intelligence in landscape architecture. This study explores GIS (geographic information systems) as a tool for landsc...
Integrated Effecient Approach to Botnet Detection using Supervised Machine Learning
Integrated Effecient Approach to Botnet Detection using Supervised Machine Learning
Abstract Botnets are one of the most significant threats to cybersecurity. These are networks of compromised nodes of computers and other devices on the internet commonly u...
The source model of group threat: Responding to internal and external threats
The source model of group threat: Responding to internal and external threats
We introduce a model of group threat that articulates the opposing effects of intergroup (between-groups) and intragroup (within-group) threat on identity processes and group relat...

Back to Top