International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 113

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014


Prevention of Mobile Botnet in VPN

Sukhwinder Singh [7] | Navdeep Kaur [4]


Abstract: Threats are everywhere on the internet, but most significant and crucial threat is Botnet that control and command by a Botmaster. Bot is simply a machine that act as a zombie and try to effect all other machine available in network and that all machine are comes under control of Botmaster. It can detect by using honeypots, spamming botnet, network based, behavior based techniques. There are techniques to detect botnet but there is no scheme for prevent the network from Bot. In this thesis, prevention of botnet can be done by cryptography. Although two basics algorithms MD5 and Blowfish are used to detect and prevent the compromise node. Botnet cannot be delete from the network but possibility is that, neglect compromised node from the network. So, after detection, simply remove that node from the network then network became reliable to communicate.


Keywords: Mobile Botnet, vpn, blowfish, md5


Edition: Volume 3 Issue 9, September 2014,


Pages: 572 - 575


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Sukhwinder Singh, Navdeep Kaur, "Prevention of Mobile Botnet in VPN", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 572-575, https://www.ijsr.net/get_abstract.php?paper_id=SEP14162

Similar Articles with Keyword 'vpn'

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1695 - 1698

Trusted Framework for Secured Information Storage over Cloud Environment

P. Pothuraju | Dasari Rajesh [6]

Share this Article

Downloads: 112

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1079 - 1082

Information Leak Detection and Prevention

Deepika. S. Patil | Dr. Sujata Terdal [2]

Share this Article
Top