Int
ern
at
i
onal
Journ
al of Ele
ctrical
an
d
Co
mput
er
En
gin
eeri
ng
(IJ
E
C
E)
Vo
l.
10
,
No.
4
,
A
ugus
t
2020
,
pp.
4168
~
41
75
IS
S
N:
20
88
-
8708
,
DOI: 10
.11
591/
ijece
.
v
10
i
4
.
pp
4168
-
41
75
4168
Journ
al h
om
e
page
:
http:
//
ij
ece.i
aesc
or
e.c
om/i
nd
ex
.ph
p/IJ
ECE
Internet
service p
roviders
responsi
bil
ities in
botnet mi
tiga
ti
on
:
a N
i
geri
an persp
ec
ti
ve
Olatunji
Okes
ola
1
,
M
ario
n
Ad
ebi
yi
2
,
Toc
hukwu
Osi
-
O
keke
3
,
Ad
e
yin
ka
Ad
ew
ale
4
, Ay
od
el
e
Ad
e
b
iyi
5
1
Com
puta
ti
onal
Scie
nc
es
Depa
r
t
m
ent
,
Firs
t
Tech
nic
a
l
Univer
si
t
y
,
Niger
i
a
2
,5
Depa
rtment
of
Com
pute
r
Sci
en
ce
,
L
andmark
U
nive
rsit
y
,
Nig
eria
2,5
Depa
rtment
of
Com
pute
r and
I
nform
at
ion
Sci
e
nce
s,
Cov
ena
n
t U
nive
rsit
y
,
Nige
ria
3
Depa
rtment of
Math
ematics a
n
d
Com
pute
r
Sci
e
nce
s,
Af
e
B
aba
l
ola
Univ
ersity
,
Niger
ia
4
Depa
rtment of
El
e
ct
ri
ca
l
and
In
form
at
ion
Eng
in
ee
ring
,
Cov
ena
n
t
Univer
si
t
y
,
Nig
eri
a
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
Ma
y
30
, 201
9
Re
vised
Feb 3
,
2020
Accepte
d
Fe
b 24
, 202
0
Botne
t
-
b
ase
d
at
t
ac
k
is
dange
rou
s
and
ext
remel
y
diffi
cul
t
to
over
come
as
al
l
the
primar
y
m
it
i
gat
ion
m
et
hods
are
passive
and
l
imite
d
in
foc
us.
A
combine
eff
orts
of
int
ern
et
service
provi
der
s
(ISP
s)
are
bet
t
er
guide
s
since
they
c
an
m
onit
or
the
tra
f
fic
tha
t
tr
ave
rse
through
the
ir
net
works
.
How
eve
r,
ISP
s
are
not
le
ga
lly
ban
ded
to
thi
s
role
and
m
a
y
not
vie
w
sec
urity
a
s
a
primar
y
conc
ern
.
Tow
ar
ds
under
stud
y
i
ng
the
invol
ve
m
ent
of
ISP
s
in
Botn
et
m
it
iga
ti
on
in
Niger
ia,
th
is
stud
y
elic
it
ed
a
nd
sum
m
ari
ze
d
m
it
iga
t
io
n
me
asure
s
from
scie
ntific
li
t
era
t
ure
s
to
creat
e
a
ref
ere
n
ce
m
ode
l
which
was
val
id
at
ed
b
y
stru
ct
ure
d
intervie
w
.
Although,
ISP
s
role
is
se
en
to
be
volunt
a
r
y
and
poorl
y
in
centivi
z
ed,
the
pr
ovide
rs
stil
l
ta
k
e
customers
sec
urity
v
e
r
y
serious
but concentrate
m
ore
o
n
t
he
pre
v
ent
iv
e an
d
noti
f
ic
a
ti
on
m
ea
sures.
Ke
yw
or
d
s
:
Botm
as
te
r
Botnet
In
ce
ntives
In
te
r
net
se
rv
ic
e pro
vid
e
r
Mi
ti
gation
Nige
ria
Copyright
©
202
0
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed
.
Corres
pond
in
g
Aut
h
or
:
Ma
ri
o
n
A
de
biyi
,
Dep
a
rtm
ent o
f C
om
pu
te
r
Scie
nces,
Lan
d
m
ark
Univers
it
y,
Om
uar
an,
K
wa
ra S
ta
te
, Nige
ri
a.
Em
a
il
: ay
o.
adeb
iy
i@lm
u.
ed
u.ng
1.
INTROD
U
CTION
A
net
work
of
infected
c
om
pu
te
rs
or
m
achines
is
cal
le
d
a
Botnet
an
d
each
of
these
c
om
pu
te
rs
is
ref
e
rr
e
d
to
as
a
Bot.
He
nce,
a
bo
t
net
is
a
connecti
on
of
c
om
pr
om
ise
d
com
pu
te
rs
co
ntr
olled
by
a
Bot
m
ast
e
r
who
distrib
ute
s
at
ta
cks
over
hundre
ds
of
c
om
pu
te
rs
ac
ross
the
I
nter
net
[
1].
T
he
c
umulat
ive
band
width
a
nd
la
rg
e
nu
m
ber
of
at
ta
cks
m
ake
bo
t
net
-
based
at
ta
cks
da
nger
ou
s
an
d
dif
ficult
t
o
ove
rco
m
e.
In
2009
f
or
insta
nce,
Bred
oLa
b
c
rea
te
d
a
n
est
im
at
e
d
thi
rty
m
i
ll
io
n
bo
ts
,
the
‘
Star
War
s
’
t
witt
er
bo
t
net.
T
hough
it
s
pu
rpose
is
sti
ll
unknow
n,
th
e
bo
t
net
is
sai
d
t
o
ha
ve
c
om
pr
om
ise
d
ov
e
r
350,000
twit
te
r
a
ccounts
[2
]
.
O
ne
of
the
po
pula
r
an
d
la
rg
est
botnets
at
ta
ck
was
C
it
adel
[3
]
w
he
re
keyl
og
ger
s
wer
e
i
ns
ta
ll
ed
on
t
o
victi
m
’s
com
pu
te
rs
th
ereby
enab
li
ng
botm
ast
er
to
m
on
it
or
keyst
r
ok
e
s
on
the
in
fecte
d
syst
em
s.
Over
fi
ve
m
illi
on
keyst
r
ok
es
of
us
e
rs
acro
s
s the
g
l
obe w
e
re log
ged
resu
lt
in
g
to
ov
er f
i
ve h
und
re
d m
il
l
ion
doll
ars
loss [1,
3].
Un
li
ke
oth
er
I
nter
net
m
al
war
e,
the
co
ntr
ol
c
omm
un
ic
at
ion
netw
ork
of
a
botnet
is
it
s
uni
qu
e
feat
ur
e
.
As
il
lustrate
d
in
Fig
ure
1
with
the
arro
ws
sh
owin
g
the
dir
ect
ion
of
netw
ork
co
nnect
ions,
bo
ts
in
the
bo
t
ne
t
connect
t
o
s
pe
ci
al
ho
sts
-
co
m
m
and
-
an
d
-
c
ontr
ol
(C&C
)
s
erv
e
rs,
w
ho
forw
a
rd
com
m
and
s
from
bo
tm
a
ste
r
t
o
the o
t
her b
ots i
n
the
n
et
wor
k
f
or a
po
ssi
ble at
ta
ck.
Nige
ria
is
a
co
un
t
r
y
with
a
ve
ry
high
i
nter
ne
t
cov
e
rage
wit
h
qu
al
it
y
wire
d
an
d
wi
reless
c
onnecti
ons.
Unfortu
natel
y,
sh
e
is
a
key
play
er
in
cy
ber
crim
e
and
has
beco
m
e
an
id
eal
ta
rg
et
fo
r
bo
t
nets
bein
g
a
m
ajor
so
urce
of
S
pa
m
[4
,
5
]
.
This
m
a
y
be
li
nke
d
to
the
fast
gro
wth
of
In
te
r
net
usa
ge
owi
ng
to
t
he
e
xplosio
n
of
internet
ser
vic
e
prov
i
der
s
(
ISPs)
-
or
gan
isa
t
ion
s
that
pro
vi
de
I
ntern
et
se
r
vices
as
well
as
so
ftwa
re
pac
kag
e
s
and e
-
m
ai
l acco
unts
[
6
].
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
In
te
r
net servic
e p
r
ovider
s res
pons
i
bili
ti
es in botn
et
miti
ga
ti
on: a Nige
ria
n pers
pecti
ve
(
Olatunji
O
kes
ola
)
4169
Figure
1
.
Ho
w a b
otn
et
wor
k
[
7
]
Pr
io
r
to
2013
,
f
our
pri
m
ary
m
et
ho
ds
c
om
m
on
ly
be
ing
us
e
d
to
m
iti
gate
D
DoS
at
ta
cks
we
re
com
m
ercial
se
cur
it
y
so
ft
ware,
crim
inal
enfor
cem
ent,
bo
t
net
sei
zur
e
by
fed
er
al
agen
c
ie
s,
and
pr
i
vate
ci
vil
act
ion
[8
]
.
Howev
e
r,
s
uch
e
ffor
ts,
th
ough
valua
ble,
are
passive
a
nd
li
m
it
ed
b
y
their
fo
cu
s
on
pr
e
ven
t
i
on
[9,
1
0].
A
le
a
di
ng
cl
ou
d
ba
se
d
ser
vice
pr
ovider,
Cl
ou
dF
la
re,
the
refore
offe
red
D
DoS
protect
io
n
capa
ble
of
m
at
ching
s
ophi
sti
cat
ed
DDoS
at
ta
cks.
This
was
m
or
e
e
ff
e
ct
ive
but
S
ood
et
al
.
,
[
3]
a
nd
Lo
ne
et
al
.
,
[
8]
ar
gu
e
d
that
i
m
pr
oved
resu
lt
is
poss
ible
with
boundle
ss
a
nd
col
la
borati
ve
ef
forts
of
both
t
he
pr
i
vate
an
d
public
orga
nizat
ion
s
in
Ni
ger
ia
inc
lud
in
g
t
he
I
S
Ps,
ec
onom
ic
an
d
fi
nan
ci
al
crim
es
co
m
m
issi
on
(E
FCC
)
a
nd
Cy
ber
crim
e
Pr
even
ti
on
Worki
ng
G
r
oup.
T
hi
s
stud
y
ther
ef
ore
aim
s
at
inv
est
igati
ng
the
r
ol
e
of
ISPs
in
N
igeria
towa
rd
s
asce
rtai
nin
g
thei
r
capab
il
it
y
of
co
m
bat
ing
botnet
s
in
isolat
ion
.
Fo
ll
owin
g
a
re
view
of
relat
ed
stud
ie
s
in
the
ne
xt
sect
ion
,
a
n
over
vi
ew
of
incenti
ve
s
that
at
tract
IS
Ps
to
botnet
m
itigati
on
is
pro
vid
e
d
al
ong
with
a ref
e
re
nce m
od
el
, while
a
ta
bl
e o
f
m
i
ti
gation
m
easur
es
for ISP a
re sum
m
a
rized i
n
the
lat
er
par
t
of this s
tud
y.
2.
RE
LATE
D
W
ORK
Modula
r
I
ntegr
at
e
d
Se
r
vices
Lim
i
te
d
[11]
hi
ghli
ghte
d
a
bigge
r
pictu
re
of
num
erou
s
reco
m
m
end
at
ion
s
dev
el
op
e
d
by
In
te
rn
at
io
nal
Tel
ecom
m
un
ic
at
io
n
U
nio
n
to
secu
re
te
le
com
m
un
ic
a
ti
ons
infr
a
struct
ur
e
and
a
sso
ci
at
ed
serv
ic
es
or
a
ppli
cat
ion
s
wh
e
re
im
ple
m
entation
of
t
he
inter
national
in
f
orm
at
io
n
so
ci
et
y
m
anag
e
m
ent
sta
nd
a
r
d
was
pr
ese
nt
ed
as
t
he
m
os
t
com
pr
ehe
nsi
ve
ap
proac
h
to
com
bat
bo
tnet.
Nonethe
le
ss
,
quantit
at
ive
a
na
ly
sis
[7
,
8
]
have
al
ways
pr
ese
nting
I
SPs
as
the
bette
r
gu
i
de
again
st
botnet
s
due
to
their
f
unct
ion
al
in
dis
pen
s
able
res
pons
i
bi
li
t
ie
s.
Nab
il
[
12
]
the
refor
e
gav
e
a
cl
assi
f
ic
at
ion
that
re
flect
s
the
li
fecyc
le
and
c
urre
nt
re
sil
ie
nce
te
chn
i
qu
e
s
of
botne
ts
by
analy
sin
g
com
m
on
al
it
i
es
from
a
network
pro
vid
er
s’ pe
rs
pecti
ve
t
o design an
d
im
ple
m
ent m
i
ti
gation st
rategies a
gainst
bo
t
nets.
IS
Ps
vie
w
c
ust
om
ers
-
secur
it
y
ro
le
as
vo
l
unta
ry
sinc
e
th
ey
hav
e
no
le
gal
bi
nd
i
ng
to
secu
re
t
heir
custom
ers
[6
]
but
they
a
re
in
an
op
ti
m
al
posit
ion
to
pro
vid
e
sec
ur
it
y
to
inter
net
us
ers
[
9].
Me
anwhil
e
,
Em
pirical
stud
y
and
li
te
ratu
r
e
rev
ie
w
of
Ti
m
o
et
al
.
[5
]
cl
aim
ed
that
no
orga
nisati
on
c
an
ef
fecti
vely
com
bat
bo
t
nets
in
is
ola
ti
on
b
ut
i
n
c
onjun
ct
io
n
with one
a
nd
ot
her
.
H
owe
ver,
Va
n
Eet
en
et
al
. [
13
]
,
recog
nised
I
SPs
as
a
key
con
tr
ol
po
i
nt,
in
their
stud
y
of
s
pa
m
traff
ic
wh
e
r
e
data
wer
e
c
ollec
te
d
on
th
e
locat
ion
of
infecte
d
m
achines
ove
r
tim
e
to
exa
m
ine
the
r
ole
of
I
S
Ps
in
m
it
igati
n
g
botn
et
s.
T
his
validat
es
Sta
m
at
ou
di’s
f
un
c
ti
on
al
def
i
niti
on
of
an
IS
P
as
“a
pa
ssive
carrie
r
that
m
us
t
blo
ck
m
at
erial
acce
ss
upon
recei
ving
noti
ce
of
an
al
le
ged
m
al
war
e” [
14
]
.
No
ti
ng
that
ISPs
in
Nige
ria
m
ay
be
un
awa
re
of
the
vulne
rab
il
it
ie
s
the
us
e
of
their
in
frast
ru
ct
ure
i
s
po
si
ng,
L
onge
et
al
.
,
[
1]
c
onduct
ed
a
s
urvey
on
the
im
pact
of
ISPs
a
gainst
botnet.
Leavi
ng
c
hi
-
s
qu
a
re
at
0.0
5
le
vel
of
sig
nificance,
t
heir
de
scriptive
sta
ti
sti
cs
sh
owe
d
tha
t
the
le
vel
of
s
ecur
it
y
pro
vide
d
agai
ns
t
cri
m
e
by
IS
Ps a
re r
el
at
iv
el
y l
ow
r
es
ulti
ng
i
n
a posit
iv
e relat
ion
s
hip
betwee
n
th
e le
vel of inter
net crim
e and
the att
it
ud
es
of
IS
P
s
to
t
heir
netw
orks
safet
y.
He
nce,
Bre
nt
et
al
.
,
[
9]
belie
ved
that
I
SPs
sh
oul
d
be
m
oti
vated
a
nd
the
r
efore
pro
po
se
d
a
fur
t
her stu
dy to
i
de
ntify h
ow
bes
t ISP
s
could
b
e
incen
ti
vise
d.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
4
,
A
ugus
t
2020
:
4168
-
4175
4170
3.
RESEA
R
CH MET
HO
D
A
li
te
ratu
re
s
urvey
a
nd
em
pirical
stud
y
were
co
nducted
to
exam
ine
m
itigati
on
m
easur
es
(N
i
ger
ia
n)
IS
Ps
ha
ve
ta
ke
n,
t
ho
s
e
they
c
ou
l
d
hav
e
ta
ke
n,
a
nd o
the
rs
t
hey
pla
n
to
ta
ke
again
st
botne
t.
This
s
pecific
was
t
o
identify
botnet
s
C&C
-
str
uctu
res
an
d
t
heir
r
el
evan
t
feat
ur
e
s.
A
‘r
e
fer
e
nc
e
m
od
el
’
s
umm
arisi
ng
m
itigati
on
m
easur
es
s
uc
h
as
te
ch
nical
,
orga
nisati
on
a
l
and
ju
ridical
m
easur
es
wa
s
us
e
d.
The
e
m
pirical
stud
y
was
restrict
ed
to
N
igeria
as
inte
r
views
were
co
nducted
to
validat
e
res
ults
obta
ined
f
ro
m
t
he
li
te
ratur
e
study
.
T
he
inte
rv
ie
w
ees
are
sec
ur
i
ty
of
ficers
an
d
ser
vice
m
a
nag
e
rs
at
to
p
Nige
rian
IS
P
s
who
ha
ve
a
cl
ear
unde
rstan
ding
of the i
ncen
ti
ve
s and m
it
igatio
n m
easur
es.
4.
ISPs
AND SE
CURIT
Y
I
NCE
NTIVES
Since
IS
Ps
know
w
hat
t
raff
ic
trave
rses
t
he
ir
net
wor
k,
t
hey
are
in
th
e
best
posit
io
n
t
o
detect
m
al
ic
iou
s
traffi
cs
and
quara
ntine
the
infe
ct
ed
com
pu
te
r
s
in
their
network
[
4
]
.
He
nce,
they
are
m
os
tly
exp
ect
e
d
to
ta
ke
the
respo
ns
ib
il
ity
of
m
it
igatin
g
sp
am
,
com
p
ute
r
viruses,
f
raud
ulent
em
ail,
an
d
s
pywa
re
[15]
Howe
ver,
sinc
e
they
are
no
t
the
r
oot
cau
se
of
at
ta
cks
and
m
i
ti
gation
com
es
with
it
s
own
c
os
t,
IS
P
s
m
ay
be
unwill
ing
to
ta
ke
act
ion
if
t
he
res
pons
i
bili
ty
do
es
n
ot
at
tract
inc
entives/
fact
or
s
.
H
ence
,
Q
ua
ntit
at
ive
analy
sis
[
7,
8
]
at
tribu
te
s
la
ck
of
incenti
ve
s
as
a
m
ajo
r
f
act
or
res
pons
i
ble
for
a
low
act
ion
rate
in
bo
t
net
m
itigati
on
sinc
e. Sin
ce I
SPs n
at
ur
al
ly
r
esp
on
d
to ec
onom
ic
(cu
st
om
ers
su
pport
, price, etc
.
)
an
d
no
n
-
ec
on
om
i
c
(p
ee
r
pr
ess
ure
,
pee
r
recog
niti
on
,
et
c.
)
i
nc
entives
[16],
i
ncen
ti
ve
s
are
tho
se
facto
rs
consi
der
e
d
by
both
the in
div
id
ual
and or
gan
iz
at
ion
al
decisi
on
-
m
aker
s to
m
iti
gate botnets
.
4.1
.
Org
an
is
at
io
nal
ince
nt
ives
These
are
fact
or
s
t
hat
IS
Ps
ha
ve
so
m
e
le
vels
of
co
ntr
ols
ov
e
r
w
hich
m
ay
include
b
usi
ness
m
od
el
.
pr
i
or
it
y
giv
e
n
to
secur
it
y,
cy
ber
-
i
nsura
nce
,
awar
e
ness
a
nd
trai
ning,
pa
rtic
ipati
on
in
secur
it
y
effort
s,
siz
e
of
cust
om
er
base,
cost
of
cust
om
er
suppo
rt,
c
os
t
of
m
anag
em
ent
ab
us
e,
an
d
cost
of
inf
ras
tructu
re
exp
a
ns
i
on
[17
]
.
The
bigge
r
IS
Ps
g
ene
rall
y
perform
better
but
they
experience
hi
gh
secur
it
y
at
ta
cks
a
nd
po
s
sibly
hi
gh
inv
e
ntion
[
16
]
,
there
by
in
ves
t
m
or
e
in
cy
be
r
-
in
surance
.
Si
m
il
arly
,
the
higher
t
he
us
a
ge
of
pirated
s
of
twa
r
e,
the
hi
gh
e
r
t
he
ISP’s
ex
pos
ure
to
bot
net,
a
nd
th
e
higher
th
e
se
cu
rity
awa
r
eness
of
c
us
to
m
ers
and staf
f,
t
he h
igh
e
r
the
co
m
petences a
nd the
low
e
r
t
he
le
ve
l of b
otn
et
att
a
cks.
Since
“Ve
ry
la
rg
e
IS
Ps
a
re
ef
fecti
vely
exem
pted
from
peer
pr
ess
ure
as
ot
her
s
ca
nnot
a
fford
to
c
ut
them
of
f,
m
uch
of
the
w
or
l
d
bad
tra
ff
ic
co
m
es
f
ro
m
the
netw
orks
of
th
ese
too
bi
g
to
blo
c
k‟
pro
vid
e
rs”
[
14]
.
Howe
ver,
la
rge
IS
Ps
has
lo
wer
i
nf
ect
io
n
rates
than
sm
a
ll
IS
Ps
[
17
]
be
cause
they
ar
e
highly
auto
m
at
ed
to
identify
,
noti
f
y
and
m
i
ti
gate
infected
c
ust
om
ers
thereb
y
m
aking
the
m
itigati
on
process
ec
on
om
ic
al
l
y
eff
ic
ie
nt
[
4
].
4.2
.
Inst
it
ut
io
na
l i
ncenti
ves
These
a
re
fac
tors
beyo
nd
I
SPs’
direct
c
on
t
ro
l
bu
t
i
nst
it
uted
by
the
poli
c
y
m
aker
s
or
m
ark
et
conditi
ons.
T
he
y
are
def
ine
d
le
gal
fr
am
ewo
r
ks
in
w
hich
IS
Ps
op
e
rate
and
incl
ude
cy
be
r
-
sec
ur
it
y
la
w
s
and
regulat
ion
s
,
bl
ackli
sti
ng
,
pee
r
pr
es
sure,
re
pu
ta
ti
on
eff
ect
s,
com
petit
ive
cost
pr
ess
ur
e
,
cost
of
cu
stom
er
acqu
isi
ti
on,
a
nd
co
st
of
te
ch
nolo
gy
m
it
igatio
n
[
17
]
.
Re
gu
l
at
ion
-
a
n
e
ff
e
ct
ive
incenti
ve
[18]
-
r
eq
uire
s
cy
ber
secur
it
y
incide
nts
be
natio
nal
ly
m
i
ti
ga
te
d
[19]
since
nationa
l
anti
-
botnet
centre
usual
ly
are
ha
r
dly
infe
ct
ed.
Nati
on
al
init
ia
ti
ves
on
bo
t
net
m
itigati
on
sho
uld
the
refor
e
be
pr
om
oted
an
d
good
m
od
el
s
ci
rcu
la
te
d
[20]
wh
il
e
po
li
cy
m
aker
s
giv
e
ISPs
m
ore
in
centi
ves
for
ta
ki
ng
act
ion
[
2].
He
nce,
I
S
Ps
are
bei
ng
pushe
d
by
regul
at
or
y
bodies
s
uc
h
a
s
inter
net
en
gin
eeri
ng
ta
s
k
f
or
ce
(IETF
)
a
nd
O
rg
a
nisati
on
f
or
Ec
onom
ic
Coo
pe
rati
on
a
nd
Dev
el
op
m
ent (OECD
)
t
o
cl
ea
n
-
up their
cust
om
ers
infected
co
m
pu
te
rs [
21]
.
Wh
e
re
IS
Ps a
r
e m
os
tly dr
ive
n
by i
ns
ti
tuti
onal
incen
ti
ves
, th
ey
are
e
xpect
ed
to
pe
rfor
m
sa
m
e in term
s
of
bot
net
m
itigati
on
as
incent
ive
structu
re
m
ay
hav
e
to
be
changed
if
t
hey
are
to
incr
ease
their
effo
rts
[16].
Howe
ver,
sinc
e
IS
Ps
perf
or
m
ver
y
diff
e
ren
tl
y
wh
e
n
ex
pose
d
to
bo
t
h
com
par
a
ble
insti
t
ut
ion
al
ince
nt
ive
s
and
econom
ic
ci
rcu
m
sta
nces
[
16
]
,
t
he
c
ou
ntry
-
le
vel
m
itigati
on
m
easur
es
can
not
be
s
uffici
ent
unle
ss
orga
nizat
ion
al
incenti
ves
are
addresse
d
a
nd
reali
gn
e
d
t
og
et
her.
4.3
.
Org
an
is
at
io
nal
v
s ins
tituti
on
al incen
tives
The
ince
ntive
structu
re
of
an
IS
P
is
a
fu
nc
ti
on
of
the
insti
tuti
on
al
an
d
or
gan
iz
at
io
nal
factors
–
the
set
s
that
are
cl
os
el
y
interrelat
ed
an
d
ver
y
dif
ficult
to
separa
te
.
Wh
il
e
po
li
cy
m
aker
s
po
s
tulat
e
insti
tuti
on
al
in
centi
ves,
orga
nizat
ion
al
one
s
are
bein
g
de
te
rm
ined
by
the
ind
i
vidual
IS
Ps
in
li
ne
with
the
inst
it
utio
na
l
incenti
ves
.
M
uch
[
18
,
22
]
ha
ve
bee
n
done
on
the
ince
ntiv
es
of
IS
Ps
to
im
pr
ov
e
sec
uri
ty
,
an
d
so
m
e
hav
e
bee
n
ide
ntifie
d
a
s
en
han
ci
ng
sec
ur
it
y
w
hile
othe
rs
w
ork
agai
nst
it
.
Howe
ve
r,
the
net
e
ff
ec
ts
of
these
ince
ntiv
es
on
eac
h
I
SP
i
s
sti
ll
un
cl
ear
as
t
he
I
SPs
be
hav
e
di
ff
ere
ntly
w
he
n
e
xpos
e
d
t
o
sim
il
ar
incenti
ves
.
It
is
ther
ef
or
e
im
portant
t
o
know
how
m
uch
di
screti
on
each
IS
P
has
f
or
botnet
m
i
ti
gation.
E
very
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
In
te
r
net servic
e p
r
ovider
s res
pons
i
bili
ti
es in botn
et
miti
ga
ti
on: a Nige
ria
n pers
pecti
ve
(
Olatunji
O
kes
ola
)
4171
IS
P
s
houl
d
de
c
ide
how
to
m
iti
gate
botnet
a
nd
determ
ine
their
orga
nisati
ona
l
i
ncen
ti
ves
e
ve
n
w
he
n
face
d
with
a
com
m
on
set
of
insti
tuti
onal
incenti
ves
as
def
ine
d
by
the
co
un
try
le
ga
l
fr
am
ewo
rk
[16].
IS
Ps
’
at
ti
tud
e
towa
rd
s
botnet
m
itigati
on
is
m
os
tly
deter
m
i
ned
by
insti
tuti
on
al
ince
ntives
.
H
ow
e
ver,
the
ir
var
yi
ng
beh
a
viou
r
wh
e
n
s
ubj
ect
e
d
to
sam
e
incenti
ves
s
uggests
that
le
gal
f
ra
m
ewo
r
k
on
it
s
own
ca
nnot
be
su
f
fici
ent
to
m
itigate
bo
t
net unless
orga
nisati
on
al
incen
ti
ve
s are
a
lso a
ddresse
d
a
nd pr
op
e
rly
ali
gn
e
d [
8].
4.4
.
Be
st
pr
act
ic
es
a
n
d incen
tive
s
Althou
gh,
m
os
t
Nige
rian
org
anisa
ti
on
s
are
il
l
-
equ
ip
pe
d
to
m
it
igate
m
alw
are
thr
eat
s,
s
tud
ie
s
ha
ve
sh
ow
n
that
organ
isa
ti
ons
ca
nnot
ef
fecti
vel
y
m
itigate
botnet
in
isolat
ion
[
5
]
.
Bot
h
pr
i
vate
an
d
public
orga
nisati
on
s
c
ollaborat
e
to
fi
gh
t
botnet
bu
t
the
in
div
id
uals
an
d
c
orporate
entit
ie
s
in
t
he
pr
i
vate
sect
or
sti
ll
rem
ai
ns
the
big
ges
t
victi
m
of
cy
be
rcr
im
e
[2
3
-
25
]
.
T
oward
s
fi
gh
ti
ng
against
al
l
fo
r
m
s
of
finan
ci
al
and
cy
ber
-
c
rim
es
t
her
e
fore
EFCC
was
set
up
a
nd
em
po
wer
e
d
by
Nige
rian
gove
rn
m
ent
to
work
ha
nd
in
ha
nd
wit
h
the cybe
rcr
im
e
Pr
e
ve
ntion
Wo
r
king
Gro
up to
c
om
bat f
inan
ci
al
cri
m
es.
In
te
r
natio
nally
,
orga
nizat
ion
s
su
c
h
as
a
nti
-
phishi
ng
w
orkin
g
group
(
APWG
),
c
omm
un
ic
at
ions
secur
it
y,
reli
a
bili
ty
and
intero
per
a
bili
ty
(CSRIC),
E
uro
pean
netw
ork
and
in
f
or
m
ation
sec
ur
it
y
agen
cy
(ENIS
A), I
T
A
sso
ci
at
ion
f
or
te
le
com
m
un
ic
ation
s
,
m
essaging
,
m
al
war
e
, and
m
ob
il
e anti
-
abu
s
e wor
king
gro
up
(M3
AAWG),
and
onli
ne
t
rust
al
li
ance
(OTA)
ha
ve
c
om
e
tog
et
he
r
f
or
t
he
s
ole
pur
pose
of
m
itigati
ng
bo
t
net.
Dif
fere
nt
init
ia
ti
ves
su
ch
as
i
ntern
et
exc
ha
nge
po
i
nt
of
Niger
ia
(
IXPN
)
and
Associ
at
ion
of
Tel
ecom
m
un
icati
on
s
Com
pa
nies
of
Ni
geri
a
are
em
po
wer
i
ng
sta
ke
holde
rs
on
ca
pacit
y
bu
il
di
ng
an
d
encou
rag
i
ng
s
yner
gy
am
on
gst
the
var
i
ou
s
age
ncies.
Th
is
is
beca
us
e
trai
ning,
a
w
aren
es
s,
a
nd
public
e
m
po
we
rm
ent
on
cy
ber
sec
ur
it
y
ser
vices,
strat
e
gy,
an
d
intel
li
gen
t
buil
ding
s
houl
d
go
a
hea
d
of
cy
ber
crim
inals
[1,
26]
,
as
public
a
nd
pri
vate
org
anisat
ion
s
ha
ve
to
rec
onside
r
their
a
ppr
oaches
to
cy
be
r
t
hreat
s
in
order
to
est
a
bl
ish
the
re
qu
ir
e
d
sec
ur
it
y
prac
ti
ces
on
t
he
c
riti
cal
IT
inf
rast
ru
ct
ur
e
[
23
]
.
I
SPs
s
houl
d
the
refor
e
consi
der,
as
a
top
pract
ic
e,
a
w
aren
es
s
a
nd
t
ra
ining,
c
on
ti
nu
ous
m
on
it
or
i
ng
and
lo
g
a
naly
sis,
vulne
ra
bili
ty
an
d
patch
m
anag
e
m
ent,
con
ti
nu
ou
s
risk
asse
s
sm
ent
and
treatm
ent,
m
anag
em
ent
serv
ic
es
and
in
de
pe
nd
e
nt
rev
ie
ws
[
23]
.
Nige
ria
as
a
country,
al
s
o
ha
s
to
co
ntin
uous
ly
inv
est
in
researc
h,
buil
d
local
cy
be
r
threa
t
m
anag
em
ent inf
rastr
uctu
re t
o im
pr
ove
her
a
bi
li
t
y t
o
antic
ipa
te
, d
et
ect
, res
pond a
nd c
on
ta
i
n
cy
be
r
t
hr
eat
s.
5.
THE
R
EFE
R
ENCE
MO
DE
L
This
sect
ion
presents
a
ref
e
r
ence
m
od
el
(
T
able
1)
sim
i
la
r
to
[
4
]
wh
e
re
bo
t
net
m
itigati
on
m
easur
es
for
IS
P
are
s
um
m
arised.
The
m
od
el
is
in
li
ne
with
structu
r
e
of
anti
-
bo
t
ne
t
li
fecyc
le
and
ecosyst
em
def
ined
by
the
onli
ne
tr
ust
al
li
ance
-
O
TA
[20].
T
he
seq
uen
ce
of
th
e
five
sta
ges
-
pr
e
ve
ntio
n,
de
te
ct
ion
,
no
ti
fi
cat
ion,
rem
ediat
ion
and
recovery
-
m
akes
up a
n
a
nti
-
bo
tnet l
ifecy
cl
e presente
d
in
F
igure
2
w
her
e
:
Pr
e
ven
ti
on
-
proacti
ve
m
easure
s of a
n ISP
to a
ver
t
us
e
r’
s
d
e
vices f
r
om
p
otentia
l at
ta
cks.
Detect
ion
-
m
easur
e
s to
ide
ntify t
hr
eat
s
, vul
ne
rab
il
it
ie
s
or att
acks
on the
ISP’s
netw
ork
.
No
ti
ficat
io
n: m
easur
e
s take
n b
y ISP
t
o
al
ert c
us
tom
ers
of se
cur
it
y b
reac
hes
.
Rem
ediat
ion
:
correct
ive
m
e
asur
e
s
init
ia
ted
by
an
I
SP
to
cl
ean
com
prom
ise
d
syste
m
of
m
al
iciou
s
so
ft
war
e
.
Re
cov
e
ry:
acti
viti
es o
f
an I
SP
targ
et
e
d
a
t
regai
nin
g t
he
im
pact o
f
an at
ta
ck
.
Figure
2.
A
nti
-
bo
t
net li
fecyc
le
[
4
]
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
4
,
A
ugus
t
2020
:
4168
-
4175
4172
5.1.
M
itig
at
i
on
me
as
ures
Tel
ecom
m
un
icati
on
s
Act
[27]
m
and
at
es
IS
Ps
to
prote
ct
their
c
us
to
m
ers
agai
ns
t
cy
ber
crim
e
fo
ll
owin
g
Tec
hn
ic
al
,
orga
niz
at
ion
al
an
d
le
gal
m
easur
es
as
postulat
ed
by
As
ghari
[28].
Sim
i
la
rly
,
IS
Ps
a
re
exp
ect
e
d
to
tel
l t
heir
c
us
tom
ers
the
risks
relat
ed
to
the
us
e
of
w
e
b
se
rv
ic
es t
hey offe
re
d
by
the I
S
Ps,
as
we
ll
as
wh
at
c
us
tom
ers
ought
to
do
to
scal
e
do
wn
these
ris
ks
.
H
oweve
r,
t
he
Act
[27]
is
sil
ent
on
the
ro
le
of
IS
P
s
wh
e
n
botnet
i
s
detect
ed
i
n
i
ts
netw
ork
t
he
reb
y
im
plyi
ng
that
ISPs
act
ion
agai
ns
t
bot
net
is
not
ob
li
gated
by
la
w
.
Hav
i
ng
el
a
borated
on
t
he
gen
e
ral
bo
t
net
m
itigatio
n
m
easur
es,
this
stu
dy
a
da
pt
ed
th
os
e
m
ea
su
re
s
der
i
ved
by
[
4
]
to
determ
ine
wh
et
her
eac
h
m
easur
e
obse
r
ved
by
ISPs
is
aim
ed
at
their
cust
om
ers,
the
ISP
it
sel
f
or
oth
er
sta
ke
ho
l
der
s
.
The
stu
dy
is
al
so
ai
m
ing
at
knowin
g
w
hethe
r
the
m
e
asur
e
is
te
c
hnic
al
,
orga
nizat
ion
al
,
or
le
gal.
T
he
r
esearch
fin
dings
are
a
s
prese
nted
on
T
able 1
f
ollo
wing
a
de
ta
il
ed
exp
la
na
ti
on
of
the li
fecyc
le
stage.
Table
1.
T
he
r
e
fer
e
nce
m
od
el
Tar
g
et set
Asp
ect
Descripti
o
n
Te
ch
n
ical
Organ
izatio
n
al
Legal
PREVE
NTI
ON
Cu
sto
m
er
PC
-
1
Cu
sto
m
ers
ar
e
pro
v
id
ed
with en
d
p
o
i
n
t secu
rity
so
lu
tio
n
s
o
o
PC
-
2
Cu
sto
m
ers
ar
e
alw
ay
s ed
u
cated o
n
bo
tn
et threats and
m
i
tig
atio
n
o
o
o
Oth
er
PO
-
3
ISPs sh
are
inf
o
r
m
a
tio
n
on
bo
t
n
et
m
iti
g
atio
n
th
rou
g
h
co
llab
o
ration
o
PO
-
4
There
is
co
llab
o
rat
iv
e initiativ
es f
o
r
b
o
tn
et
m
itig
atio
n
o
ISP
PI
-
5
Intru
sio
n
p
reven
tio
n
sy
ste
m
(I
PS)
is bein
g
app
lied
o
PI
-
6
Techn
ical
m
easu
re
s are
ap
p
lied
again
st b
o
tn
et inf
ectio
n
s
o
PI
-
7
Inf
o
r
m
atio
n
regard
in
g
b
o
tn
et
m
itig
ati
o
n
is alway
s u
p
to
d
ate
o
o
PI
-
8
There
is p
rocess
f
o
r
cu
sto
m
er
su
p
p
o
rt
o
PI
-
9
There
is
s
ervice l
e
v
el agree
m
en
ts
(S
LA)
o
PI
-
10
Secu
rity stan
d
ards
is ad
h
ered to
o
DET
ECTI
ON
Cu
sto
m
er
DC
-
1
Self
-
id
en
tity
po
rtal
is presen
ted
o
DC
-
2
ISPs r
e
ceiv
e inf
o
rm
a
tio
n
on
po
ss
ib
le
bo
tn
et attacks
o
Oth
er
DO
-
3
Detected
(
b
o
tn
et)
i
n
f
ectio
n
s is
bro
ad
c
asted
o
DO
-
4
Extern
al parties
pr
o
v
id
e info
r
m
atio
n
on
po
ss
i
b
le inf
ectio
n
o
DO
-
5
Inf
o
r
m
atio
n
on
po
ss
ib
le attack ar
e r
e
c
eiv
ed
f
ro
m
Ab
u
seHu
b
ISP
DI
-
6
Ho
n
ey
n
et is app
lie
d
o
DI
-
7
Intru
sio
n
d
etectio
n
sy
ste
m
(
IDS
)
is ap
p
lied
o
o
DI
-
8
Inf
ectio
n
s are
activ
ely
valid
ated
o
DI
-
9
Ab
u
se tea
m
is
pu
t in p
lace
o
NOTIF
ICA
TI
O
N
Cu
sto
m
er
NC
-
1
Inf
ected cu
sto
m
e
rs
ar
e no
tif
ied
o
NC
-
2
No
tif
icatio
n
s are
p
rov
id
ed
with re
m
e
d
iatio
n
too
ls
o
o
Oth
er
NO
-
3
Oth
er
p
rov
id
ers are n
o
tif
ied
abo
u
t in
fection
s
o
REME
DIA
TI
O
N
Cu
sto
m
er
RC
-
1
Inf
ected cu
sto
m
e
rs
ar
e iso
lated
o
o
RC
-
2
Inf
o
r
m
atio
n
to
m
iti
g
ate po
ten
tial bo
tn
et attacks is
p
u
b
lic
ised
o
o
RC
-
3
Link
s f
o
r
p
rof
ess
io
n
al su
p
p
o
rts ar
e pr
o
v
id
ed
in case of
i
n
f
ectio
n
o
Cu
sto
m
er
/Oth
er
RV
-
4
in
f
o
r
m
atio
n
on
wal
led
gard
en
pro
cedu
re
is sh
ared
o
Oth
er
RO
-
5
Bes
t practices f
o
r
r
e
m
o
v
al of
inf
ectio
n
s is sh
ared
o
RECOVER
Y
Cu
sto
m
er
Re
-
1
Cu
sto
m
er
’s intern
e
t con
n
ectio
n
is activated
o
o
Re
-
2
Cu
sto
m
ers
ar
e
su
p
p
o
rted o
n
r
ecov
ery p
rocess
o
Re
-
3
Cu
sto
m
ers
a
re
in
for
m
ed
o
f
th
e
p
o
te
n
tial
i
m
p
acts
o
f
recov
ery
o
n
p
erso
n
al data and
acc
o
u
n
ts
o
5.2
.
Preven
tion
Pr
e
ven
ti
on
is
the
first
an
d
m
os
t
i
m
po
rtant
secur
it
y
m
easur
e
agai
nst
po
te
ntial
cy
ber
-
at
ta
c
ks
.
An
ti
ci
pato
ry
m
easur
es
s
uch
as
anti
-
vir
us,
anti
-
w
or
m
s
and
sec
ured
routers
ar
e
good
en
dpoi
nt
secur
it
y
so
luti
ons
(P
C
-
1)
that
hav
e
prov
e
n
e
ff
e
ct
ive
against
botnet
infecti
ons
w
he
n
pro
vid
e
d
by
the
I
SPs.
Sim
ilarly
,
IS
Ps
usual
ly
c
om
e
up
with
se
ries
of
sec
uri
ty
awa
ren
es
s
pro
gr
am
m
es
(train
ing
,
co
nfere
nc
es,
et
c.)
to
rais
e
their
custom
ers’
aw
aren
es
s
on
bo
t
net
threats
an
d
m
it
igati
on
(P
C
-
2).
Co
untrie
s
hav
e
ass
ociat
ion
s
(
nationa
l
an
d
internati
onal
)
of
IS
Ps
a
nd
insti
tuti
on
s
(cy
ber
sec
uri
ty
centre,
et
c.
)
w
her
e
iss
ues
re
gardin
g
sec
ur
i
ty
are
discusse
d
a
nd
i
niti
at
ives
to
m
i
ti
gate
bo
tnets
a
re
de
velo
pe
d
(
PO
-
4).
T
hey
colla
borate
to
s
har
e
i
nfor
m
at
i
on
a
nd
exp
e
riences
to
wards m
it
igatin
g b
otn
et
s
(
P
O
-
3).
Hav
i
ng
reali
zed
that
the
sa
f
et
y
of
their
c
us
tom
ers’
dat
a
al
so
li
es
on
the
platf
or
m
[8,
14]
,
ISP
s
e
m
br
ace
m
eas
ur
es
that
sa
feguar
d
thei
r
op
e
r
at
ion
s
a
nd
in
frast
ru
ct
ures.
T
he
y
update
the
m
se
lves
with
s
ecur
it
y
inf
or
m
at
ion
(PI
-
7)
a
nd
a
pp
ly
intru
sio
n
pr
e
ve
ntion
syst
em
-
IP
S
(P
I
-
5)
an
d
oth
e
r
te
ch
nical
m
easur
es
ag
ai
ns
t
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
In
te
r
net servic
e p
r
ovider
s res
pons
i
bili
ti
es in botn
et
miti
ga
ti
on: a Nige
ria
n pers
pecti
ve
(
Olatunji
O
kes
ola
)
4173
bonets
in
fecti
ons
(
PI
-
6).
By
e
m
br
aci
ng
ef
fe
ct
ive
custom
ers’
sup
ports
pr
ocesses
(P
I
-
8)
with
ade
quat
e
SLA
s
(
P
I
-
9
)
,
t
h
e
y
a
d
h
e
r
e
s
t
r
i
c
t
l
y
t
o
i
n
d
u
s
t
r
i
a
l
s
e
c
u
r
i
t
y
s
t
a
n
d
a
r
d
s
i
n
c
l
u
d
i
n
g
I
S
O
2
7
0
0
6
:
2
0
0
7
a
n
d
2
7
0
0
2
:
2
0
0
5
(
PI
-
1
0
)
.
5.3
.
Det
ec
tion
Eve
n
wh
e
n
ad
equ
at
e
pre
ven
t
ion
s
are
in
pla
ce,
secur
it
y
breac
hes
m
ay
still
occu
r
le
adin
g
to
syst
e
m
bein
g
in
fected
and
ad
de
d
to
a
botnet.
This
is
beca
us
e
c
ontr
ol
m
ay
no
t
be
total
especial
ly
in
risk
m
anage
m
ent
processes
su
c
h
as
c
hange
m
anag
em
ent
wh
e
re
process
fail
ur
e
is
pos
sible.
Detect
iv
e
con
t
ro
l
is
t
her
e
fore
require
d
to
ide
ntify
error
s
,
irr
egu
la
riti
es
or
a
tt
ac
ks
after
the
ir
occurre
nces
[10,
29
]
.
Bot
ne
t
detect
ion
can
be
cl
assifi
ed
by
botm
ast
ers,
bo
ts
or
C
&C
ser
ve
rs.
T
he
detect
ion
c
ould
be
a
ct
ive
if
cl
assifi
ed
by
honey
ne
ts
bu
t
passive
if
by
I
DS
us
in
g
ei
the
r
D
NS
-
ba
sed
,
ho
st
-
ba
sed
,
net
work
-
base
d
or
hybri
d
-
detect
io
n
[
4
]
.
Howe
ve
r,
for
reasons
yet
to be
fu
ll
y i
nvest
igate
d, I
SPs p
re
fer
t
o fo
c
us
on
bo
ts
.
IS
Ps
pro
vi
de
portal
s
that
al
lo
w
thei
r
c
u
stom
ers
to
sel
f
-
ide
nt
ify
bo
t
-
m
al
war
e
in
fecti
on
(
D
C
-
1)
a
nd
in
return,
ob
ta
in
inf
or
m
at
ion
on
possible
at
ta
ck
from
custome
rs
(D
C
-
2).
Si
m
il
arly
,
IS
Ps
s
har
e
in
form
at
i
on
on
detect
ed
botne
t
infecti
on
s
wi
th
oth
e
r
sh
ar
e
ho
l
der
s
(
DC
-
3)
and
in
return,
recei
ve
inf
orm
at
ion
on
po
ssible
at
ta
cks
from
bo
th
th
e
A
buse
Hub
(DO
-
5)
a
nd
e
xter
nal
part
ie
s
(D
O
-
4)
.
ISPs
ap
ply
I
DS
s
(DI
-
7)
t
o
detect
issues
on
t
heir
netw
ork
,
an
d
ho
neyn
et
s
(D
I
-
6)
for
s
ecur
it
y
issues
arou
nd
t
heir
in
te
rn
al
operati
on
an
d
in
fr
a
struc
ture.
On
detect
ion
of
a
ny
in
fecti
on,
they
valid
at
e
the
at
ta
ck
(DI
-
8)
t
o
av
oid
false
posit
ive
an
d
s
ub
se
qu
e
ntl
y
insti
tute ab
us
e
te
a
m
to
ha
nd
le
the in
fecti
on (DI
-
9).
5.4
.
Notifica
tio
n
An
in
fected
c
ust
om
er
sh
ould
be
no
ti
fie
d
by
IS
Ps
(
NC
-
1)
once
a
n
i
nf
ect
io
n
is
detect
ed.
Othe
r
I
SPs
sh
oul
d
be
ade
qu
at
el
y
in
form
ed
(
NC
-
3)
as
well
to
inc
reas
e
awar
e
ness
a
nd
av
oid
re
occ
urren
ce
.
No
ti
fi
cat
ion
m
ay
be
thr
ough
em
ail,
phone
cal
ls
or
te
xt/bro
wser
m
essages
a
nd
s
houl
d
c
om
e
with
rem
edial
m
easur
e
s
(NC
-
2).
5.5
.
Remedi
at
io
n
Upo
n
detect
io
n
of
infecti
ons
and
no
ti
fyi
ng
the
sta
kehold
ers
(c
us
tom
ers
and
oth
er
pee
r
IS
P
s),
IS
P
s
ta
ke
i
m
m
ediate
rem
ediat
ion
m
easur
es
to
a
ddress
the
c
om
pr
omi
sed
syst
e
m
s
of
a
botnet.
In
wh
ic
h
case,
infected
cust
om
ers
are
is
olate
d
(RC
-
1)
an
d
I
nfo
rm
at
ion
to
m
itigate
pote
ntial
botnet
at
ta
ck
s
is
publici
sed
(RC
-
2)
wh
il
e
li
nk
s
for
prof
es
sion
al
s
upports
are
gi
ven
t
o
the
cu
stom
er
(RC
-
3).
Be
st
pr
act
ic
es
fo
r
rem
ov
al
of
infecti
ons
is
s
har
e
d
only
to
the
sta
ke
holder
s
(RO
-
5)
but
inf
or
m
at
ion
on
processes
t
o
deal
with
the
i
so
la
te
d
com
pr
om
ise
d
syst
e
m
is
sh
are
d
to
both
the
c
us
tom
ers
an
d o
ther
sta
kehol
de
rs
(R
V
-
4).
5.6
.
Recover
y
This
is
the
fi
na
l
ste
p
of
t
he
m
it
igati
on
m
eas
ur
es
an
d
it
is
m
or
e
of
a
n
e
xt
ensio
n
of
rem
ediat
ion
sta
ge.
On
ce
the
in
fec
ti
on
is
re
m
ov
e
d,
ISPs
reacti
va
te
custom
ers’
internet
conne
ct
ion
(Re
-
1)
a
nd
prov
i
de
effe
ct
ive
custom
er
supports
th
r
oughou
t
the
recove
ry
proc
ess
(Re
-
2).
Be
f
or
e
rec
overy
process
c
omm
ences,
ISPs
do
ens
ur
e
t
hat
cu
stom
ers
are
a
dequatel
y
inf
orm
ed
of
t
he
possible
im
pacts
on
thei
r
acc
ounts
a
nd
pe
r
so
na
l
detai
ls (Re
-
3).
6.
RESU
LT
S
A
ND
DI
SCUS
S
ION
This
sect
io
n
va
li
dates
the
re
f
eren
ce
m
od
el
us
e
d
in
t
his
e
m
pirical
stud
y
an
d
inte
rpreted
the
res
ults
discusse
d.
The
intervie
wees
e
xam
ined
ever
y
par
t
of
the
refe
ren
ce
m
od
el
f
or
c
om
plete
ness
and
c
orrectne
ss
to
ascerta
in
t
he
va
li
dity
and
rel
ia
bili
ty
of
the
researc
h
i
ns
tr
um
ent.
Com
m
o
n
fo
ll
ow
-
up
a
ct
ion
s
of
m
iti
gatin
g
b
ot
nets
inclu
de
:
sh
utti
ng
dow
n
C&C
-
se
rv
e
rs
,
hij
ac
king
C&
C
-
ser
ver
s
to
ha
ck
bac
k
or
infi
lt
rati
on
to
dis
m
antle
the
bo
t
net
fro
m
within,
rem
ote
disinf
ect
i
on
of
c
om
pr
om
i
sed
syst
em
s,
u
ns
olici
te
d
te
rm
inati
on
of
cust
om
er’
s
con
t
racts
after
m
ulti
ple
at
tack
s,
a
nd
blo
c
k
in
g
of
botm
al
war
e
in
fected
we
bs
it
es.
T
his
stu
dy
rec
ognises
the
im
po
rtanc
e
of
t
hese
a
ddit
ion
al
act
io
ns.
H
oweve
r,
it
do
e
s
not
ext
end
t
he
m
od
el
to
them
since
bo
t
h
the
cy
be
r
sec
uri
ty
center
(
NC
SC) a
nd all
the
I
SP
s alrea
dy a
ff
irm
ed
that t
he
y har
dly co
ve
r
s
uch
act
ions.
This
stu
dy
al
so
noti
ced
that
it
is
no
t
ever
y
aspects
of
ou
r
m
od
el
th
at
are
ap
plica
ble
to
eve
ry
IS
P
.
This
is
de
picte
d
on
Ta
ble
1
and
s
umm
arised
on
Table
2
w
her
e
col
our
Re
d
represe
nts
aspects
that
are
hardl
y
app
li
ed
by
IS
P
s,
Tan
are
ad
opte
d
by
just
fe
w
IS
Ps
,
an
d
O
range
col
our
are
tho
se
a
pp
li
e
d
by
al
l
the
IS
Ps
in
Nige
ria.
Alth
ough
the
re
are
five
secu
rity
asp
ect
s
that
are
ge
ner
al
ly
not
bei
ng
at
te
nde
d
to
by
the
ISPs
an
d
ni
ne
oth
e
rs
are
bei
ng
patr
on
ise
d
by
on
ly
a
fe
w
,
16
out
of
30
(r
ep
rese
ntin
g
53.33%
)
secu
r
it
y
aspects
are
du
ly
pr
act
ic
ed
b
y al
l Nige
rian ISP
s
.
Desp
it
e
that
t
hey
are
not
t
he
m
ajo
r
ca
us
e
s
of
at
ta
cks
[
27,
30]
an
d
botnet
is
eve
n
exp
e
ns
i
ve
to
m
itigate,
ISPs
sti
ll
ta
ke
safety
against
bo
t
ne
t
at
ta
cks
ve
ry
serio
us
ly
.
E
ve
n
th
ough,
ni
ne
secu
rity
aspec
ts
are
no
t
co
ve
red
by
two
of
the
I
S
P
s
for
adm
inist
rati
ve
reasons
a
s
sh
ow
n
in
T
a
ble
2
,
oth
er
16
of
30
a
re
co
vered
by
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
4
,
A
ugus
t
2020
:
4168
-
4175
4174
al
l
the
seven
I
SPs
le
avin
g
only
five
aspect
s
representi
ng
16.7%
not
bei
ng
c
overe
d.
We
noti
ce
further
on
T
able
1
that
t
hese
16
as
pec
ts
a
re
in
rati
o
7:5
:
4
re
sp
ect
ively
represe
nt
in
g
c
us
tom
ers,
ISPs,
an
d
ot
her
s
.
Hen
ce
,
I
SPs
giv
e
highe
r
pr
ioriti
es
to
thei
r
cu
stom
ers’
s
afety
an
d
are
capa
ble
of
pe
rfor
m
ing
a
dvance
d
detect
ion an
d
f
ollow
-
up acti
ons.
Table
2.
N
ine
s
ecur
it
y aspe
ct
s
Descripti
o
n
s
A
sp
ects List
No
of
Asp
ects
No
of
I
SPs
Asp
ects wh
ich
I
SP
s h
ardly
h
an
d
le
PI5, DC1
,
DC2
,
D
I6, DI
7
5
Asp
ects p
erfo
r
m
ed
by
ju
st f
ew
ISPs
PI6, PI
9
,
DO3,
NO
3
,
RC
3
,
RV4
,
RO5
,
Re2
,
Re3
9
5
Asp
ects app
lied
by
all
th
e
ISPs
PC1
,
PC2
,
PC3
,
PC4
,
PI7,
PI8,
PI10
,
DO4
,
DO5
,
DI8, D
I9, NC1
,
N
C2
,
RC
1
,
RC
2
,
Re
1
16
7
On
ly
on
e
out
of
seve
n
i
ntervi
ewed
IS
P
s
im
plem
ent
IP
S
(
PI
5)
a
nd
a
no
t
he
r
one
receives
inf
or
m
at
ion
on
po
te
ntial
bo
tnet
at
ta
cks
(
DC2).
Wh
il
e
none
of
the
I
SPs
ha
ve
a
po
rtal
for
cust
om
ers
to
sel
f
-
identify
po
te
ntial
bo
tne
t
infecti
on
(
D
C1),
on
ly
tw
o
app
ly
ho
neyne
t
(D
I
6)
a
nd
a
nothe
r
two
a
pply
ID
S
(
DI7
)
in
thei
r
netw
orks
e
ve
n
though,
on
a
ve
ry
sm
all
scal
e.
T
he
I
SPs
a
re
gen
e
rall
y
not
pe
rfor
m
ing
Dee
p
Pac
ket
In
s
pe
ct
ion
as they fail
to
m
on
it
or
the contents of the tr
aff
i
c g
e
n
erate
d by their cus
to
m
ers.
They al
l at
tribu
te
this f
a
il
ur
e to
po
s
sible
high
r
unning c
os
t a
nd a
re th
e
refore
lookin
g
at
c
omm
ercial
isi
ng
th
e ser
vice.
So
m
e
no
ta
ble n
um
ber
s o
f
ISPs
ap
ply
te
chn
i
cal
m
easur
es
s
uch
a
s
pa
sswo
r
d
dual
isa
ti
on
a
gainst b
ot
net
infecti
ons
(
PI6
).
S
om
e
of
fer
SLA
s
t
o
their
custom
ers
(PI9
)
to
bind
their
bu
si
ness
relat
ion
s
hi
p
w
hile
ot
hers
broa
dcast
botn
et
infecti
on
w
hen
detect
ed
(
DO3)
a
nd
eve
n
noti
fy
oth
e
r
IS
Ps
to
raise
secur
it
y
aware
ness
(NO3). Des
pite t
hat a good n
um
ber
o
f IS
Ps
pro
vid
e li
nks f
or
pro
fessio
nal
suppor
ts i
n
ca
se o
f
i
nf
ect
io
n (RC
3),
inf
or
m
at
ion
sha
rin
g
on
wall
e
d
garde
n
pr
oc
edure
(RV
4)
a
s
well
as
s
ha
ring
of
best
pr
a
ct
ic
es
for
rem
ov
al
of
infecti
ons
(R
O5)
is
li
m
it
e
d.
It
is
on
ly
so
m
e
IS
Ps
t
ha
t
app
ly
rem
e
dial
m
easur
es
su
c
h
as
cu
stom
er’
s
su
pp
or
ts
(Re2
)
and
a
war
e
nes
s/e
nligh
te
nm
ent
(Re3)
on
t
he
po
te
ntial
i
m
p
act
s
of
re
co
ve
ry
on
pe
rsonal
data
and
acc
ounts.
Since preve
ntion
of
att
acks
is
alway
s b
et
te
r
than
c
ur
e [
30,
31]
, I
SPs
a
re d
ir
ect
ing
great
er
effor
ts
on
botnet
prev
ention
a
nd
not
ific
at
ion
.
E
ven
though
they
a
re
not
unde
r
a
ny
obli
gation
t
o
ta
ke
s
uch
ac
ti
on
s
,
they
i
m
ple
m
e
nt
cust
om
er
su
pp
or
t
proces
ses
f
or
a
de
quat
e
pr
e
ven
ti
on
an
d
detect
io
n
[
31]
but
li
tt
le
for
rem
ediat
ion
and
recovery.
7.
CONCL
US
I
O
N
Fr
a
udulent
m
a
il
s
e
m
anati
ng
f
ro
m
Niger
ia
ha
ve
de
nted
t
he
i
m
age
of
Ni
ge
rian
inter
net
us
ers
.
T
his
is
cal
li
ng
f
or
fur
ther
e
ff
ect
i
ve
bo
t
net
m
itigatio
ns
as
a
si
gn
i
ficant
nu
m
ber
of
syst
em
s
are
co
ntin
uous
ly
bei
ng
at
ta
cked
.
Cri
m
inals
are
in
creasin
gly
la
unchi
ng
s
oph
ist
ic
at
ed
at
ta
cks
on
inte
rn
et
dev
ic
es
by
de
plo
yi
ng
coor
din
at
ed
at
ta
cks
s
uch
as
m
a
lware
th
re
at
s,
inside
r
th
reats,
data
bre
aches
(r
es
ulti
ng
f
r
om
po
or
acce
ss
con
t
ro
ls
)
an
d
s
yst
e
m
m
isc
on
f
igurat
ion
s
.
Sta
nd
a
r
d
m
et
ho
ds
of
r
ep
or
ti
ng
s
pam
even
ts,
ch
aracte
rizi
ng
pa
r
ti
cular
sp
am
,
and
of
s
end
i
ng
sp
am
con
t
ro
l
data
m
a
y
be
hel
pful
t
o
fi
gh
t
cy
ber
c
r
i
m
e
in
Niger
ia
but
a
colla
bo
r
at
ive
effor
t
is
m
uch
m
or
e
re
quire
d
usi
ng
to
ols
and
sta
ndar
ds
that
boos
t
i
nfo
rm
ation
exc
ha
ng
e
an
d
c
oor
di
nation
perform
ance.
ACKN
OWLE
DGE
MENTS
This
stud
y
wa
s
j
oin
tl
y
sp
ons
ored
by
both
C
ov
e
na
nt
Un
i
ve
rsity
,
Ota
and
First
Tech
nical
Un
ive
rsity
,
Ib
a
da
n,
Nige
ria.
REFERE
NCE
S
[1]
A.
Longe
,
O.B.,
Chie
m
eke
,
S.C.
,
Fashola,
S.,
Longe
,
F.,
and
Om
il
abu,
“
Inte
rne
t
Service
Provi
der
s
and
Cy
b
erc
r
ime
in
Niger
ia
Balan
ci
ng
Serv
ic
es
an
d
ICT
Dev
el
opm
ent
,
”
So
ci
al
Sc
ience
In
te
rnationa
l
Journal
,
v
ol
.
6,
pp.
1
–
11,
2007.
[2]
Feder
al
Com
m
u
nic
a
ti
ons
Com
mi
ss
ion,
“
U.S.
A
nti
-
Bot
Code
of
Conduct
(ABC)
for
Inte
rne
t
Services
Providers
(ISP
s),”
Marc
h
2
012.
[Onlin
e]
.
A
vai
l
abl
e
:
htt
ps://
it
l
aw.
wiki
a.
org/wik
i/
U.S._
Anti
-
Bot_Code
_
of_Conduct
_
(A
BCs
)_for_Int
ern
et
_Servi
ce
_Prov
ide
rs_(IS
Ps
).
[3]
A.
K.
Sood
and
R.
Bansal,
“
Pros
ec
ti
ng
the
Ci
tadel
Botn
et
-
Re
vea
l
ing
the
Do
m
ina
nce
of
th
e
Ze
us
Desce
nd
en
t,
”
Vi
rus
Bul
l
etin
,
p
p.
1
–
17
,
Sep
.
20
14.
[4]
J.
Pij
pker
and
H.
Vranke
n,
“
The
Role
of
Internet
Service
Providers
in
Botne
t
Miti
ga
ti
on
,
”
2016
European
Inte
lligen
ce and Sec
urit
y
Informa
ti
cs
Conf
ere
nc
e (
EISI
C)
,
Upps
al
a,
pp
.
24
-
31
,
201
6.
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
In
te
r
net servic
e p
r
ovider
s res
pons
i
bili
ti
es in botn
et
miti
ga
ti
on: a Nige
ria
n pers
pecti
ve
(
Olatunji
O
kes
ola
)
4175
[5]
T.
Schle
ss
and
H.
V.
Open,
“
Counte
r
botne
t
ac
ti
v
it
i
es
in
the
Nethe
rl
ands:
a
Stud
y
on
Organi
sati
on
an
d
Eff
ective
n
ess,”
8th
Inte
rnationa
l
Confe
renc
e
fo
r
Inte
rnet
Techn
ology
and
Sec
ur
ed
Tr
ansacti
ons
(
ICI
TST
-
2013
)
,
pp.
75
–
82
,
2013
.
[6]
S.
H.
Us
m
an,
“A
rev
ie
w
of
resp
onsibil
ities
of
in
te
rne
t
service
pr
ovide
rs
towar
d
t
hei
r
customers’
net
work
sec
uri
t
y,
”
Journal
of
Theoretical
and
App
lied
Information
Technol
og
y
,
vol.
49,
no
.
1
,
pp
.
70
–
78,
Mar
.
2013
.
[7]
Aheli
oT
ec
h
“
Botne
ts :
Dawn
of
the
conne
cted
dea
d
,
”
AhelioTec
h
,
2017.
[Online
]
.
Avail
able
:
htt
ps://
ww
w.a
h
e
li
otech.com
/bl
og
/bot
net
s
-
d
awn
-
of
-
the
-
conn
ecte
d
-
dea
d/
[8]
Q.
Lone,
G.
C.
M.
Moura,
and
M.
Van
Ee
t
en,
“
Towa
rds
inc
e
nti
vizing
ISP
s
t
o
m
it
iga
t
e
botn
et
s,”
AIM
S
201
4:
Monit
oring and
Sec
uring
Vi
rtual
ized
N
e
tworks
a
nd
Serv
i
ce
s
,
vol
.
8508
,
pp.
57
–
62
,
2014
.
[9]
B.
Rowe,
W
.
Dall
as,
R.
Dougl
as,
and
B.
Fern,
“
The
Role
of
Inte
r
net
Service
Providers
in
C
y
b
er
Secur
i
t
y
,
”
Inst
it
ut
e
for Homel
and
S
e
curiry
Solu
t
ions
,
pp.
1
–
10,
Apr
.
2
009.
[10]
K.
O.
Okokpujie
,
E.
Nom
a
-
Os
agha
e,
O.
J.
Oke
sola,
S.
N.
John,
and
O.
Robert
,
“
Design
and
I
m
ple
m
ent
at
ion
of
a
Student
At
te
nd
anc
e
S
y
stem
Us
ing
Iris
Biom
et
ri
c
Rec
ogn
it
ion
,
”
2017
Inte
rnation
al
Confe
ren
ce
o
n
Computati
ona
l
Sci
en
ce and
Co
mputati
onal
Intelli
gen
ce
(
CSCI)
, L
as
Vega
s
,
NV
,
pp.
563
-
567
,
20
17
.
[11]
M.
Inte
gra
te
d,
“
Final
Report
for:
Deve
lop
m
ent
of
Best
Prac
tices
in
In
form
at
ion
Infra
struct
ure
Secu
ri
t
y
Mana
gement,”
Department
Of
New
Me
dia
And
Information
Sec
urity
Pl
ot
423
A
guiy
i
Irons
i
Way
Mait
ama,
Abuja
,
pp.
1
–
134
,
2016
.
[12]
N.
Hac
hem,
Y.
Ben
Mus
ta
pha,
G.
G.
Grana
di
l
lo,
and
H.
Deb
ar,
“
Botne
ts:
L
i
fecy
c
le
and
t
ax
onom
y
,
”
2011
Confe
renc
e
on
N
et
work
and
Infor
mation
Syst
ems Se
curity
,
La Rochelle,
pp.
1
-
8,
20
11.
[13]
M.
van
Eeten
,
Q.
Lone
,
G
.
Moura,
H.
As
ghar
i
,
and
M.
Korcz
yński,
“
Eva
luatin
g
the
Im
pac
t
of
Abus
e
HU
B
o
n
Botne
t
Miti
g
at
io
n,
”
arX
iv
,
De
c
.
2
016.
[14]
I.
Stamatoudi
,
“
The
role
of
Inte
r
net
Service
Providers
in
cop
y
r
ig
ht
infri
ngements
,
”
Re
search
Han
dbook
on
Cross
-
border E
nforcem
ent
of
Int
el
l
ec
t
ual
Propert
y
,
pp
.
789
–
818
,
2014
.
[15]
Z.
Lerner
,
“
Microsoft
the
Botne
t
Hunter
:
The
Rol
e
of
Public
-
Priv
at
e
Partn
ershi
ps
in
Miti
gating
Bo
tne
ts,
”
Har
vard
Journal
of
Law
and
Technol
og
y
,
vol. 28, no. 1,
p
p.
237
-
261
,
201
4.
[16]
D.
R.
Michel
v
an
Eeten
a
,
Joha
nnes
M.
Baue
r
,
Hadi
As
ghar
i,
Shirin
Ta
b
a
ta
b
aie,
“
The
Rol
e
of
Inte
rne
t
Service
Providers
in
Bo
t
net
Mi
ti
ga
ti
on,
”
Chair I
nnov. Re
gul.
Dig
it
.
Serv
.
,
pp.
1
–
31,
2010.
[17]
M.
Van
Ee
t
en,
J.
M.
Baue
r
,
H.
As
ghar
i,
S.
Tabat
ab
ai
e
,
and
D.
Rand,
“
The
Ro
le
of
ISP
s
in
Botne
t
Mit
iga
t
ion
:
an
Em
p
i
ric
a
l
Anal
y
sis
Based
on
Spa
m
Data
,
”
Delf
t
Univ.
Te
chn
ol.
,
2009.
[O
nli
ne]
.
Avail
ab
le
:
htt
ps://
ss
rn.com
/a
bstract=
198919
8
[18]
H.
As
ghar
i,
M.
J.
G.
Van
Ee
te
n
,
and
J.
M.
Baue
r,
“
Ec
onom
ic
s
of
Fighti
ng
Botne
ts:
Le
ss
ons
from
a
Dec
ade
of
Miti
gation,
”
in
I
EE
E
Sec
uri
ty
&
Priv
ac
y
,
vol. 13, n
o.
5,
pp.
16
-
23
,
Sep
.
-
Oct. 2015
.
.
[19]
H.
Tiirm
aa
-
kl
aa
r
,
J.
Gass
en,
and E.
Ge
rha
rds
-
pad
il
la,
“
Botn
et
s
-
SpringerBriefs i
n
C
y
ber
se
cur
i
t
y
,”
Springer
,
2019
.
[20]
OTA,
“
Botne
t
R
emedia
t
ion
Over
vie
w &
Prac
ti
c
e
s,”
Onlin
e
Tr
ust
Al
li
an
ce
,
pp
.
1
–
18,
Oct
.
2013
.
[21]
J.
Li
vingood
,
N
.
Mod
y
,
and
M.
O’Reirda
n,
“
Rec
om
m
enda
ti
ons
for
the
R
emediation
of
Bots
in
ISP
Networks,”
Inte
rnet
Engi
n
eer
ing
Tas
k
Force
(
IETF
)
,
pp.
1
–
29
,
Mar
.
2012
.
[22]
H.
Lords,
“
Personal
Int
ern
e
t
Se
cur
ity
,
”
Hous
e
Lor
d,
Sci
.
Te
ch
nol.
Comm
it
t
ee
,
5th
Rep
.
Sess
.
2006
-
07,
vol
.
2
,
pp.
1
–
444
,
2007
.
[23]
Seria
nu,
“
Achi
e
ving
C
y
b
er
Se
c
urity
Resi
li
en
ce
:
Enha
nc
ing
Vis
ibi
lit
y
and
In
creasing
Aw
are
nes
s,”
2016
Ken
y
a
C
y
ber
Secur
.
R
e
p.
,
p
p
.
51,
2016.
[24]
Kenne
d
y
Okokpujie,
E
ti
nosa
No
m
a
-
Os
agha
e,
Ol
at
unji
Okesola
,
Os
emw
egi
e
Omoru
y
i
,
Chinonso
Okere
ke
,
Sam
ue
l
John
,
and
Im
ha
de
P.
Okokpuji
e
,
“
Inte
gr
ation
of
Iris
Biom
et
ri
cs
in
Autom
at
e
d
Te
l
le
r
Ma
chines
for
Enha
n
c
ed
Us
er
Authent
ica
ti
on,
”
Inte
rnat
io
nal
Confe
renc
e
on
Information
Sci
en
ce
and
Appl
ic
a
ti
ons
(
ICISA)
,
vol.
514
,
pp.
219
–
228
,
Jul
y
2018.
[25]
E.
Nom
a
-
osagha
e,
R.
Okonigene,
O.
Chinonso,
O.
J.
Okesola,
a
nd
K.
O.
Okokpujie,
“
Design
an
d
Im
ple
m
ent
at
io
n
of
an
Iris
Biom
e
tri
c
Door
Acc
es
s
Control
Sy
ste
m
,
”
2017
Inte
rnational
Confe
re
nce
on
Computati
onal
Scienc
e
and
Computati
onal I
nte
lligen
ce (
CSC
I)
,
La
s V
eg
as,
N
V,
pp.
590
-
593,
2017.
[26]
O.
Aw
odel
e,
O.
Okesola,
K.
O
kokpuji
e
,
F.
Da
m
il
ola
,
and
A.
Ku
y
oro,
“
Cr
y
pt
ogra
ph
y
and
th
e
Im
prove
m
ent
of
Secur
ity
in
W
ir
el
ess
Sensor
Networks,”
in
Pro
ce
ed
ings
of
the
World
Congress
on
Engi
nee
ring
2018
,
vol.
1
,
pp.
4
–
7
,
Jul.
201
8
.
[27]
Niger
ia
nGovt
,
“
Niger
ia
n
Telec
o
m
m
unic
at
ion
Act,”
F
ed.
Re
pub
.
Nige
r
.
Off
.
Ga
zett
e
,
F
ed.
Go
v.
Print
.
,
vo
l.
9
0
,
no.
62
,
pp
.
1
–
21
,
2003.
[28]
H.
As
ghar
i, “Bot
net
Mi
ti
ga
ti
on
a
nd
the Rol
e
of
I
SP
s,”
Master
’
s T
hesis
Delf
t
Univ.
Technol
.
,
p
p
.
1
-
187,
2010
.
[29]
K.
Okokpujie
,
et
al
.
,
“
Fingerpri
nt
Biom
et
ri
c
Authent
i
ca
t
ion
Based
Point
of
Sale
Te
rm
ina
l
,
”
Inte
rnat
iona
l
Confe
renc
e
on
I
nformation
Sc
ience
and
App
li
ca
t
ions I
CISA
,
vol
.
514,
pp
.
229
–
23
8,
Jul.
2018.
[30]
E.
N.
Os
agha
e
,
K.
Okokpujie
,
C.
Ndujiuba,
an
d
O.
Okesola,
“
Epi
demic
Al
e
rt
S
y
stem :
A
W
eb
-
base
d
Grass
roots
Model,
”
Int
ernati
onal
Journal
o
f
Elec
tric
al
and
Computer
Eng
i
nee
ring
(
IJE
C
E)
,
vol
.
8
,
no
.
5
,
pp.
3809
–
3828,
Oct.
2018
.
[31]
I.
P.
L.
Png
an
d
C.
W
ang,
“
T
he
Det
err
ent
Ef
fec
t
of
Enfor
cem
ent
against
C
om
pute
r
Hac
ker
s:
Cross
-
Countr
y
Evi
den
ce
,
”
D
ep
artment
of
Infor
mation
Syst
ems, National
Uni
ve
r
sity
o
f
Singapore
,
2007
.
Evaluation Warning : The document was created with Spire.PDF for Python.