Review Article

[Retracted] Analysis of Intrusion Detection Approaches for Network Traffic Anomalies with Comparative Analysis on Botnets (2008–2020)

Table 1

Various DDoS attacks on botnet.

S/no.AuthorsTargetDescription

1Hill [8]Tunisian government websitesSite blackout that incorporated the president, head administrator, service of industry, service of remote issues, and stock trade.
2Somaiya [9]Egyptian government websitesSite went detached from the most punctual beginning stage of the revolt until the point when the moment that the president wandered down.
3Bright [10]HB gary federalHacked by dumping 68,000 messages from the structure.
4Author [11]Operation ouraborusPerils from a secretive attacker.
5Segall [12]New York (CNN money)The monster attack hit the association’s server ranches with an enormous number of packs each second.
6Uygar [13]Operation empire state rebellionBank of America affected badly with unknown threats.
7Takahashi [14]Operation “SONY”Play station network affected shockingly.
8Technology [15]Police department of SpainDDoS attack.
9Albanesius [16]Operation@Malaysia https://Malaysia.gov.my91 Malaysian government portals got breakdown. The attack started approximately at 7:30 pm GMT.
10Mack [17]Operation@OrlandoGovernmental portals of Orlando abruptly got breakdown and then went offline. The attack was through LOIC tool and continued daily.
11Halliday [18]VISA/MASTER/WIKILEAKS/https://www.paypal.comMajor payment links got breakdown for high-ranked payment gateways.
12Tech4Biz [19]A stock exchange at Hong Kong Aug 15, 2011100 of companies’ portal got breakdown through a single attack.
13Mills [20]Portals of jurisdiction department <https://justice.gov>; https://hadopi.fr; https://MPAA.org; https://BMI.com; https://copyright.com; viacom, anti-piracy.be/nl; https://vivendi.fr; https://ChrisDodd.com,This was the greatest breakdown occurred in the year 2012 by a bewildered and unethical attacker. All the portals got shut down for approximately ten minutes.
14Yair Meidan [21]Mirai and BASHLITEExtraction of behaviour snapshots of the network and using deep autoencoders for detecting anomalous network traffic from affected IoT devices.
15Hoang and Nguyen [22]Signature-based anomaly detection methodsAbnormal botnet detection methods are more efficient than the signature-based methods as they do not require prebuilt botnet signatures.
16Vengatesan et al. [23]Intrusion detection systemsA novel deep learning intrusion detection system is found effective than the traditional signature-based systems.
17McDermott et al. [24]Consumer IoT devices and networksDeep learning application based on BLSTM-RNN for detection of various attack vectors used by mirai botnet.
18Albanese et al. [25]Moving target defense (MTD)MTD creates an asymmetric uncertainty which provides the defender with an advantage over the attacker.
19Koroniotis et al. [26]IoT-enabled botnetsIoT-enabled botnets are technologically advanced and use high-speed networks that are capable of investigating activities.
20Zhong et al. [27]C&C channel in the bitcoin networkA novel P2P botnet model based on bitcoin transactions for preparing for new cyber threats.
21Alieyan et al. [28]DNS trafficThis aims at detection of abnormalities in the DNS query and responsive behaviors.
22Banerjee et al. [29]HoneyNetHoneyNet provides the activity logs for the intrusion attempts as well as network traffic dump.
23Lysenko et al. [30]Low-rate DDOS attacksThis detection technique involves the network traffic analysis generated by botnets.
24Hashemi et al. [31]Graph clusteringGraph clustering is a major trend in machine learning aiming to graph the vertices.