Abstract: Now the most of our daily activities are automatized and available for the use on internet. In which security is rarely a top consideration. Which results The most prevalent and frequent type of botnet in use today cyberattack by which our personal information can be misused by others? Botnet is collection of the system over the internet which are controlled remotely. This is done by the malware. malware is any software which intentionally designed to cause damage to a computer and perform such tasks which is not interest of the user. The botnet master will communicate with the bots via existing IRC c&c channels.And the techniques of the detection which can be used......
Keywords: Botnet, Intrusion, Malware, P2P, Mining, Detection-Techniques
[1]. Honeynet project, know your Enemy tracking Botnets, march 2005.
www.honeynet.org/paper/bots
[2]. R. Lemos, Bot software looks to improve peer-age.
www.securityfocus.com/news/11390,2006.
[3]. Saad, S., Traore, I., Ghorbani, A., Sayed, B., Zhao, D., Lu, W., ... & Hakimian, P. (2011, July). Detecting P2P botnets through network behavior analysis and machine learning. In 2011 Ninth annual international conference on privacy, security and trust (pp. 174-180). IEEE.
[4]. Zeidanloo, H. R., Manaf, A. B., Vahdani, P., Tabatabaei, F., & Zamani, M. (2010, June). Botnet detection based on traffic monitoring. In 2010 International Conference on Networking and Information Technology (pp. 97-101). IEEE.
[5]. Erquiaga, M. J., Catania, C., & García Garino, C. (2012). An analysis of network traffic characteristics for Botnet detection. In XVIII Congreso Argentino de Ciencias de la Computación.