Main Article Content
Systems and networks will be compromised, almost always regardless of what network engineers do. It is then paramount to install and manage systems that have a capacity to identify all forms of intrusions and possibly prevent those intrusions and related attacks on a computer network especially bots. Bots are at the midpoint of most network problems because almost all major cybercrimes and breaches can be traced back to them. This paper reviews three ways in which an intrusion may occur on networks with a focus on botnets and ways in which botnet mitigation may be enhanced.