dc.contributor.advisor | Chakrabarty, Dr. Amitabha | |
dc.contributor.author | Binte istiaq, Faiza | |
dc.contributor.author | E Mohammad, Rubaiyat | |
dc.contributor.author | Tasnia, Moriom | |
dc.contributor.author | Hassan, Kazi Moinul | |
dc.contributor.author | Tabassum, Tanjim | |
dc.date.accessioned | 2024-06-06T10:14:54Z | |
dc.date.available | 2024-06-06T10:14:54Z | |
dc.date.copyright | 2022 | |
dc.date.issued | 2022-09 | |
dc.identifier.other | ID: 18301227 | |
dc.identifier.other | ID: 18301103 | |
dc.identifier.other | ID: 18301058 | |
dc.identifier.other | ID: 18301290 | |
dc.identifier.other | ID: 20101629 | |
dc.identifier.uri | http://hdl.handle.net/10361/23221 | |
dc.description | This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science, 2022. | en_US |
dc.description | Cataloged from PDF version of thesis. | |
dc.description | Includes bibliographical references (pages 46-50). | |
dc.description.abstract | "Botnet” refers to a network of compromised machines that the bot master remotely
controls to prosecute innumerable malicious activities through a CC server and mis cellaneous slave machines. It is possible to categorize botnets as centralized (CC)
or decentralized (P2P). According to their distributed functionality,recently P2P
botnets is the most significant risks to network security . In this paper, we sys tematically analyze and compare some very recent peer-to-peer botnet algorithms
and methods such as Honeypots, AutoBotCatcher, SDN, and PeerGrep to ascertain
the most appropriate one for real-world applications. To perform this comparison,
we examine AutuBotCatcher, an algorithm that utilizes the community detection
method, Honeypot system, where we focus on the Nepethesis honeypot method.
Additionally, the PeerGrep system integrates the PeerGrep algorithm, CART algo rithm, and P2P traffic in SDN to automate and flexibly manage flow entries through
machine learning. | en_US |
dc.description.statementofresponsibility | Faiza Binte istiaq | |
dc.description.statementofresponsibility | Rubaiyat E Mohammad | |
dc.description.statementofresponsibility | Moriom Tasnia | |
dc.description.statementofresponsibility | Kazi Moinul Hassan | |
dc.description.statementofresponsibility | Tanjim Tabassum | |
dc.format.extent | 50 pages | |
dc.language.iso | en | en_US |
dc.publisher | Brac University | en_US |
dc.rights | Brac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. | |
dc.subject | Botnet | en_US |
dc.subject | Peer to peer | en_US |
dc.subject | Honeypots | en_US |
dc.subject | AutoBotCatcher | en_US |
dc.subject | SDN | en_US |
dc.subject | PeerGrep | en_US |
dc.subject.lcsh | Computer security. | |
dc.subject.lcsh | Computer networks--Security measures. | |
dc.title | Systematic analysis on peer-to-peer botnet attack detection | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Department of Computer Science and Engineering, Brac University | |
dc.description.degree | B.Sc in Computer Science | |