Title :
Botnet Forensics Framework: Is Your System a Bot
Author :
Sakshi Bansal;Mir Qaiser;Shefali Khatri;Anchit Bijalwan
Author_Institution :
Dept. of Comput. Sci. &
fDate :
5/1/2015 12:00:00 AM
Abstract :
There has been increase in the sophisticated attacks, ruining the stability and correctness of many network and services. The continuous attack from the attackers and hackers on the entire network, intend to manipulate the things on the network. Due to these significant threats botnets are the emerging area of research. Botnet cooperates so to achieve a malicious purpose. The botnet distinguish itself from other malware in the ability of its compromised machines to establish connection with command and control server controlled by bot-master. Due to the large number of compromised system the damage caused from botnet attack is catastrophic. In this paper we identify different types of botnet and define the botnet architectures. We further propose a framework for detecting a botnet and stopping it to spread, affecting our system and breaching the security of the network.
Keywords :
"Servers","Computer architecture","Protocols","Forensics","Filtering","Malware","Peer-to-peer computing"
Conference_Titel :
Advances in Computing and Communication Engineering (ICACCE), 2015 Second International Conference on
Print_ISBN :
978-1-4799-1733-4
DOI :
10.1109/ICACCE.2015.124