{"title":"BotTROP: Detection of a Botnet-based Threat using Novel Data Mining Algorithm","authors":"Hubert Ostap, R. Antkiewicz","doi":"10.5171/2022.156851","DOIUrl":null,"url":null,"abstract":"Nowadays botnet-based threat, such as ransomwares, trojans and botnets per se, is still very dangerous for our privacy and data. Depending on their management architecture (centralized, decentralized, hybrid), they could be controlled from single or multi point servers called Command&Control (C2), what makes them very difficult to detect and mitigate before malicious action takes place.","PeriodicalId":187676,"journal":{"name":"Communications of the IBIMA","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Communications of the IBIMA","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5171/2022.156851","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Nowadays botnet-based threat, such as ransomwares, trojans and botnets per se, is still very dangerous for our privacy and data. Depending on their management architecture (centralized, decentralized, hybrid), they could be controlled from single or multi point servers called Command&Control (C2), what makes them very difficult to detect and mitigate before malicious action takes place.