July 27, 2022, 1:20 a.m. | Wong Yan Shen, Selvakumar Manickam, Mahmood A. Al-Shareeda

cs.CR updates on arXiv.org arxiv.org

Internet security is getting less secure because of the existing of botnet
threats. An attack plan can only be planned out to take down the botnet after
the monitoring activities to understand the behaviour of a botnet. Nowadays,
the architecture of the botnet is developed using Peer-to-Peer (P2P) connection
causing it to be harder to be monitored and track down. This paper is mainly
about existing botnet monitoring tools. The purpose of this paper is to study
the ways to …

advanced botnets monitoring p2p peer-to-peer review

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Dir-Information Security - Cyber Analytics

@ Marriott International | Bethesda, MD, United States

Security Engineer - Security Operations

@ TravelPerk | Barcelona, Barcelona, Spain

Information Security Mgmt- Risk Assessor

@ JPMorgan Chase & Co. | Bengaluru, Karnataka, India

SAP CO Consultant

@ Atos | Istanbul, TR