Prevention of Mobile Botnet in VPN
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 112

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Prevention of Mobile Botnet in VPN

Sukhwinder Singh, Navdeep Kaur

Threats are everywhere on the internet, but most significant and crucial threat is Botnet that control and command by a Botmaster. Bot is simply a machine that act as a zombie and try to effect all other machine available in network and that all machine are comes under control of Botmaster. It can detect by using honeypots, spamming botnet, network based, behavior based techniques. There are techniques to detect botnet but there is no scheme for prevent the network from Bot. In this thesis, prevention of botnet can be done by cryptography. Although two basics algorithms MD5 and Blowfish are used to detect and prevent the compromise node. Botnet cannot be delete from the network but possibility is that, neglect compromised node from the network. So, after detection, simply remove that node from the network then network became reliable to communicate.

Keywords: Mobile Botnet, vpn, blowfish, md5

Edition: Volume 3 Issue 9, September 2014

Pages: 572 - 575

Share this Article

How to Cite this Article?

Sukhwinder Singh, Navdeep Kaur, "Prevention of Mobile Botnet in VPN", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14162, Volume 3 Issue 9, September 2014, 572 - 575

Enter Your Email Address




Similar Articles with Keyword 'vpn'

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1695 - 1698

Trusted Framework for Secured Information Storage over Cloud Environment

P. Pothuraju, Dasari Rajesh

Share this Article

Downloads: 112

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1079 - 1082

Information Leak Detection and Prevention

Deepika. S. Patil, Dr. Sujata Terdal

Share this Article

Similar Articles with Keyword 'blowfish'

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1844 - 1847

A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication

Kale Rohitkumar Bhausaheb, R.L.Paikrao

Share this Article

Similar Articles with Keyword 'md5'

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1324 - 1327

Improving Security for Digital Signature by Using Steganography

G. Pranitha, Ch. Suman Chakravarthy

Share this Article

Similar Articles with Keyword 'Mobile'

Downloads: 1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 705 - 706

An Analysis on Voice Assistant

Shravankumar Jha

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Botnet'

Downloads: 102 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1368 - 1371

Spam and Zombie Detection System with Machine Learned Spot Algorithm

Manishankar.S, Sobin E. S

Share this Article



Top