A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Breaking botnets: A quantitative analysis of individual, technical, isolationist, and multilateral approaches to cybersecurity
2021
Journal of Cybersecurity
Malicious networks of botnets continue to grow in strength as millions of new users and devices connect to the internet each day, many becoming unsuspectingly complicit in cyber-attacks or unwitting accomplices to cybercrimes. Both states and nonstate actors use botnets to surreptitiously control the combined computing power of infected devices to engage in espionage, hacking, and to carry out distributed denial of service attacks to disable internet-connected targets from businesses and banks
doi:10.1093/cybsec/tyab003
fatcat:kciksuavlbb7tgslydzvmhqv34