Denial of Service and Distributed Denial of Service Attacks have significantly shackled the development of computer networks and the internet, and masked their innumerable benefits behind many hours of service unavailability. These attacks are fostered, especially in their distributed variant, by networks of compromised machines (known as botnets, that is, a network of bots) that are taken over by a hacker / attacker, and coordinated in such a way as to channel overwhelming loads of malicious or useless traffic towards resource-providing / request-servicing servers. In the long run, a sufficient load of these traffic, overwhelm target servers and constitute them unable to service the requests of legitimate users that have subscribed legally to use these resources. This army of compromised systems have also been recently linked to various malicious and nefarious activities that have been taking place on computer networks and the internet in recent times; such activities relate to malware injection / infiltration, fraud, espionage, amongst others. This paper reviews the operations and coordination of botnets and the interactions that take place within the botnet during such malicious activities. New, valuable insights are provided towards the detection of such malicious networks through the introduction of the reverse life cycle of botnets.
As at the time of this research, no globally adopted and unified legislation for cybersecurity exists that is currently operational, despite rife global clamours for such a legislative framework. This research paper synthesizes and reviews some of the key imposing factors, putting in perspective the surrounding realities that impede the successful actualisation of such a framework, using the qualitative-exploratory research methodology. Also, presenting the implications of these factors and associated realities for cyber peacekeeping and the struggle for a utopian global information society, and then proposing recommendations pertaining the feasibility and operability of a global cybersecurity legal framework.
Scope of the Journal IJBCRM is a refereed international journal that provides a professional and scholarly forum in the essential field of business continuity and risk management with particular emphasis on decision making using a multidisciplinary approach. Organisational resiliency through risk assessment, contingency planning, systems security, crisis and disaster management, and recovery planning, as well as public policy regarding infrastructure and security, are integrated in the journal's coverage.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.