2021
DOI: 10.1109/access.2021.3108181
|View full text |Cite
|
Sign up to set email alerts
|

Dynamics of Botnet Propagation in Software Defined Networks Using Epidemic Models

Abstract: During COVID-19 the new normal became an increased reliance on remote connectivity, and that fact is far away to change any time soon. The increasing number of networked devices connected to the Internet is causing an exponential growth of botnets. Subsequently, the number of DDoS (Distributed Denial of Service) attacks registered around the world also increased, especially during the pandemic lockdown. Therefore, it is crucial to understand how botnets are formed and how bots propagate within networks. In par… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 43 publications
0
2
0
Order By: Relevance
“…In the research of virus propagation in communication networks and computer networks, epidemic models are often used for quantitative risk analysis [25]. Referring to this method, this paper introduces an improved epidemic model which called the SIOR model, to analyze the lateral diffusion of information risk in the CPDS communication network.…”
Section: Risk Propagation Model Of the Communication Layermentioning
confidence: 99%
“…In the research of virus propagation in communication networks and computer networks, epidemic models are often used for quantitative risk analysis [25]. Referring to this method, this paper introduces an improved epidemic model which called the SIOR model, to analyze the lateral diffusion of information risk in the CPDS communication network.…”
Section: Risk Propagation Model Of the Communication Layermentioning
confidence: 99%
“…Many approaches have been applied to mitigate DDoS attacks including entropy mechanism ( [8], [9], [10] and [11]), blockchain method ( [12], [13], [14] and [15]), machine learning approach ( [16], [17], [18] and [19]), statistical technique ( [20], [21] and [22]) and epidemic approach [23], [24], [25], [26], [27], [28], [29] and [30]). Though, each of these approaches has contributed to some extents to the mitigation of DDoS attacks in networks.…”
Section: Introductionmentioning
confidence: 99%