WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • Fees
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • FAQs
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Advancements in Botnet Detection

Minal Dhankar

Download Paper

Paper Contents

Abstract

Abstract The word "botnet" blends the words "robot" and "network". Botnets are a serious danger to computer network security and stability because they can be used to carry out malicious operations like spam distribution, data exfiltration, and distributed denial-of-service (DDoS) assaults by using networked compromised devices. An increasing number of detection systems are becoming more proactive and adaptive as a result of the traditional signature-based detection methods inability to keep up with the sophistication of botnet strategies. The present review paper critically examines the use of machine learning (ML) approaches for detecting botnet activity within network traffic.The paper's first section provides an overview of botnets, emphasizing how they work and the difficulties typical security solutions have in dealing with them. It then delves into the shortcomings of traditional detection techniques and encourages using machine learning as a viable substitute. An extensive review of recent ML-based botnet detection research projects is done, covering a range of ML algorithms, feature extraction methods, and dataset attributes.The review classifies current methods for machine learning-based botnet identification into three categories: semi-supervised, supervised, and supervised learning paradigms. It examines the benefits and drawbacks of every strategy, clarifying elements like computational efficiency, scalability, and detection accuracy. The review also looks at the variety of features used in botnet traffic analysis, such as deep packet inspection, behavioral analysis, and statistical flow-based features.

Copyright

Copyright © 2025 Minal Dhankar. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS51100067824
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Chat with us on WhatsApp: +91 909-885-5509
  • Email us: editor@ijprems.com
  • Sun-Sat: 9:00 AM - 9:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science. All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us