A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing

Recently, botnets are the most radical of all cyberattacks and becoming the key issue in cloud computing. Botnets are the network of different compromised computers and/or smartphones. These devices are infected with malicious code by botmaster and controlled as groups. The attackers use these botne...

Full description

Bibliographic Details
Main Authors: Shahid, Anwar, Jasni, Mohamad Zain, Mohamad Fadli, Zolkipli, Zakira, Inayat
Format: Conference or Workshop Item
Language:English
English
Published: IEEE 2014
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/18451/
http://umpir.ump.edu.my/id/eprint/18451/1/A%20Review%20Paper%20on%20Botnet%20and%20Botnet%20Detection%20Techniques%20in%20Cloud%20Computing.pdf
http://umpir.ump.edu.my/id/eprint/18451/2/A%20Review%20Paper%20on%20Botnet%20and%20Botnet%20Detection%20Techniques%20in%20Cloud%20Computing%201.pdf
_version_ 1848820676471816192
author Shahid, Anwar
Jasni, Mohamad Zain
Mohamad Fadli, Zolkipli
Zakira, Inayat
author_facet Shahid, Anwar
Jasni, Mohamad Zain
Mohamad Fadli, Zolkipli
Zakira, Inayat
author_sort Shahid, Anwar
building UMP Institutional Repository
collection Online Access
description Recently, botnets are the most radical of all cyberattacks and becoming the key issue in cloud computing. Botnets are the network of different compromised computers and/or smartphones. These devices are infected with malicious code by botmaster and controlled as groups. The attackers use these botnets for criminal activities such as DDoS, click fraud, phishing, spamming, sniffing traffic and spreading new malware. The main issue is how to detect these botnets? It becomes more interesting for the researchers related to cyber-security? This motivates us to write a review on botnets, its architecture and detection techniques.
first_indexed 2025-11-15T02:13:14Z
format Conference or Workshop Item
id ump-18451
institution Universiti Malaysia Pahang
institution_category Local University
language English
English
last_indexed 2025-11-15T02:13:14Z
publishDate 2014
publisher IEEE
recordtype eprints
repository_type Digital Repository
spelling ump-184512019-10-15T07:32:51Z http://umpir.ump.edu.my/id/eprint/18451/ A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing Shahid, Anwar Jasni, Mohamad Zain Mohamad Fadli, Zolkipli Zakira, Inayat QA76 Computer software Recently, botnets are the most radical of all cyberattacks and becoming the key issue in cloud computing. Botnets are the network of different compromised computers and/or smartphones. These devices are infected with malicious code by botmaster and controlled as groups. The attackers use these botnets for criminal activities such as DDoS, click fraud, phishing, spamming, sniffing traffic and spreading new malware. The main issue is how to detect these botnets? It becomes more interesting for the researchers related to cyber-security? This motivates us to write a review on botnets, its architecture and detection techniques. IEEE 2014 Conference or Workshop Item PeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/18451/1/A%20Review%20Paper%20on%20Botnet%20and%20Botnet%20Detection%20Techniques%20in%20Cloud%20Computing.pdf application/pdf en http://umpir.ump.edu.my/id/eprint/18451/2/A%20Review%20Paper%20on%20Botnet%20and%20Botnet%20Detection%20Techniques%20in%20Cloud%20Computing%201.pdf Shahid, Anwar and Jasni, Mohamad Zain and Mohamad Fadli, Zolkipli and Zakira, Inayat (2014) A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing. In: Conference: ISCI 2014 – IEEE Symposium on Computers & Informatics , 28 - 29 September 2014 , Kota Kinabalu, Sabah, Malaysia. pp. 1-5.. (Published) https://www.researchgate.net/profile/Shahid_Anwar3/publication/283257776_A_Review_Paper_on_Botnet_and_Botnet_Detection_Techniques_in_Cloud_Computing/links/562f525308ae4742240abea7.pdf
spellingShingle QA76 Computer software
Shahid, Anwar
Jasni, Mohamad Zain
Mohamad Fadli, Zolkipli
Zakira, Inayat
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
title A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
title_full A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
title_fullStr A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
title_full_unstemmed A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
title_short A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
title_sort review paper on botnet and botnet detection techniques in cloud computing
topic QA76 Computer software
url http://umpir.ump.edu.my/id/eprint/18451/
http://umpir.ump.edu.my/id/eprint/18451/
http://umpir.ump.edu.my/id/eprint/18451/1/A%20Review%20Paper%20on%20Botnet%20and%20Botnet%20Detection%20Techniques%20in%20Cloud%20Computing.pdf
http://umpir.ump.edu.my/id/eprint/18451/2/A%20Review%20Paper%20on%20Botnet%20and%20Botnet%20Detection%20Techniques%20in%20Cloud%20Computing%201.pdf