posted on 2023-05-17, 15:48authored byRahim, ASM, Hayat, K, Sher, M, Kim, TH
Comprised computer so called bot obey the order of master. These bots perform malicious activities and group together to form botnet. Different mechanism exists to detect the botnet. IP Blacklist is used for this purpose but it also contains some drawbacks. Some legitimate users become the part of IP blacklist because of spoofed IP address. In this paper we have proposed a certified list to remove legitimate users and overcome the deficiency of IP blacklist. We also measure quality of blacklist by determine the responsiveness and completeness of blacklist.
History
Publication title
Information
Volume
14
Issue
10
Pagination
3335-3341
ISSN
1343-4500
Department/School
School of Information and Communication Technology
Publisher
International Information Institute
Place of publication
Japan
Rights statement
Copyright 2011 International Information Institute
Repository Status
Restricted
Socio-economic Objectives
Communication technologies, systems and services not elsewhere classified