Identifying Botnets Intrusion & Prevention – A Review

Main Article Content

Lubasi Kakwete Musambo Melissa K. Chinyemba Jackson Phiri

Abstract

Systems and networks will be compromised, almost always regardless of what network engineers do. It is then paramount to install and manage systems that have a capacity to identify all forms of intrusions and possibly prevent those intrusions and related attacks on a computer network especially bots. Bots are at the midpoint of most network problems because almost all major cybercrimes and breaches can be traced back to them. This paper reviews three ways in which an intrusion may occur on networks with a focus on botnets and ways in which botnet mitigation may be enhanced.

Article Details

How to Cite
MUSAMBO, Lubasi Kakwete; CHINYEMBA, Melissa K.; PHIRI, Jackson. Identifying Botnets Intrusion & Prevention – A Review. Zambia ICT Journal, [S.l.], v. 1, n. 1, p. 63-68, dec. 2017. ISSN 2616-2156. Available at: <http://ictjournal.icict.org.zm/index.php/zictjournal/article/view/28>. Date accessed: 17 aug. 2018.
Section
Articles