Brief Report
Version 1
Preserved in Portico This version is not peer-reviewed
A Review on Botnet Attacks
Version 1
: Received: 30 June 2023 / Approved: 5 July 2023 / Online: 6 July 2023 (07:30:33 CEST)
How to cite: Deeks, M. A Review on Botnet Attacks. Preprints 2023, 2023070366. https://doi.org/10.20944/preprints202307.0366.v1 Deeks, M. A Review on Botnet Attacks. Preprints 2023, 2023070366. https://doi.org/10.20944/preprints202307.0366.v1
Abstract
Botnet Attacks are one of the many types of ways to attack users in their day to day browsing, often of different trends and techniques to take your information without your control. Most firewalls can amply protect you against these trends and techniques, but scarily enough, recent articles and research have shown that they are starting to bypass said firewalls through layers of attacks, confusing your best line of defense. In this Report, we will be looking into exactly what are Botnets and the different subsets, what we can do to combat Botnet Attacks, where do they come from, their origin, the analysis of their kit and what we can put together from information collected. Through this we will be able to reach a conclusion of what we can use to possibly mitigate the effect they have on the internet and stop them from enacting their purpose.
Keywords
honeypot; botnet; blockchain; security; IoT; auto-encoder
Subject
Computer Science and Mathematics, Analysis
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment