Details about the attack, resolutions, and concerned parties will be studied. Zombies are not self-directed like internet worms; they need proper direction to carry out a particular function. Zombies can be transmitted by a variety of channels for instance, an Internet Relay Chat IRC channel, from where the commands are sent by a master channel by these zombies Jermyn et. One email address could be attacked by numerous zombie devices instigating a denial of service.
The emergence of cloud-computing models opens up new opportunities to address this challenge by leveraging the power of parallel computing.
In this paper, we design and implement a novel system called BotGraph to detect a new type of botnet spamming attacks targeting major Web email providers.
BotGraph uncovers the correlations among botnet activities by constructing large user-user graphs and looking for tightly connected subgraph components.
This enables us to identify stealthy botnet users that are hard to detect when viewed in isolation. To deal with the huge data volume, we implement BotGraph as a distributed application on a computer cluster, and explore a number of performance optimization techniques.
The running time of constructing and analyzing a GB Hotmail log is around 1. We believe both our graph-based approach and our implementations are generally applicable to a wide class of security applications for analyzing large datasets.
Copyright to this work is retained by the author[s]. Permission is granted for the noncommercial reproduction of the complete work for educational or research purposes.propagation methods used in these botnets can form the basis for modeling and simulating botnet propagation in research studies.
The remainder of this paper is structured as follows. The research objective of this project is to investigate one possible advanced botnet– honeypotaware peer-to-peer (P2P) botnet: verifying our analysis of the propagation of a honeypot-aware P2P botnet, and then showing the feasibility of developing a such botnet.
Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, signiﬁcant research effort has been invested to gain a better understanding of the botnet phe- For our paper, we study the size of the botnet and compare our results to alternative ways of counting.
A Survey of Botnet and Botnet Detection Maryam Feily National Advanced IPv6 Center of Excellence (NAv6) IMPACT Research Team Universiti Sains Malaysia (USM) Penang, Malaysia [email protected] Alireza Shahrestani Faculty of Computer Science and Information Technology This paper is a survey of botnet and botnet detection.
While botnets are widespread, the research and solutions for botnets are still in their infancy. The paper also summarizes the existing research and proposes future directions for botnet research.
Published in: Computer Software and Applications, We are a c3 non-profit, all volunteer organization. Consider donating to support our forensic challenges, tools development, and research.