Network Forensics Investigation for Botnet Attack

被引:0
|
作者
Sembiring, Irwan [1 ]
Nugroho, Yonathan Satrio [1 ]
机构
[1] Satya Wacana Christian Univ, Diponegoro 52-60, Salatiga, Indonesia
来源
IT CONVERGENCE AND SECURITY 2017, VOL 2 | 2018年 / 450卷
关键词
Malware; Botnet; Network forensics;
D O I
10.1007/978-981-10-6454-8_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays the internet users manipulated by several web applications which instruct them to download and install programs in order to interfere the computer system stabilities or other aims. Most users didn't realize that the applications might have been added with some malicious software such as Worms, and Trojan horse. After the malware infected the victim's computer, they made the machine to conduct for to the master's purposes. This process known as botnet. Botnet is categorized as difficult detected malware even with up-to-date antivirus software and causing lot of problems. Network security researcher has developed various methods to detect Botnet invasion. One of the method is forensics method. Network forensics is a branch of Digital forensics which the main task is to analyze the problem (e.g. Botnet's attack) by identify, classify the networks traffic and also recognize the attacker's behavior in the network. The output of this system will produce the pattern recognition of Botnet's attack and payload identification according to Network Forensics Analysis.
引用
收藏
页码:228 / 236
页数:9
相关论文
共 50 条
  • [1] Mobile Botnet Detection Using Network Forensics
    Vural, Ickin
    Venter, Hein
    FUTURE INTERNET-FIS 2010, 2010, 6369 : 57 - 67
  • [3] Crypto-Preserving Investigation Framework for Deep Learning Based Malware Attack Detection for Network Forensics
    Bhardwaj, Sonam
    Dave, Mayank
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (03) : 2701 - 2722
  • [4] Crypto-Preserving Investigation Framework for Deep Learning Based Malware Attack Detection for Network Forensics
    Sonam Bhardwaj
    Mayank Dave
    Wireless Personal Communications, 2022, 122 : 2701 - 2722
  • [5] Improving IoT Botnet Investigation Using an Adaptive Network Layer
    Ceron, Joao Marcelo
    Steding-Jessen, Klaus
    Hoepers, Cristine
    Granville, Lisandro Zambenedetti
    Margi, Cintia Borges
    SENSORS, 2019, 19 (03):
  • [6] A MODEL FOR NFAA-NETWORK FORENSICS ATTACK ANALYSIS
    Rasmi, M.
    Jantan, Aman
    THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 739 - 746
  • [7] Attack Graph Analysis for Network Anti-Forensics
    Chandran, Rahul
    Yan, Wei Q.
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (01) : 28 - 50
  • [8] Botnet Forensics Framework: Is your System a Bot
    Bansal, Sakshi
    Qaiser, Mir
    Khatri, Shefali
    Bijalwan, Anchit
    2015 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION ENGINEERING ICACCE 2015, 2015, : 535 - 540
  • [9] Network Attack Origin Forensics with Fuzzy Logic A case study on buffer overflow attack
    Rostamipour, Maryam
    Sadeghiyan, Babak
    2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2015, : 67 - 72
  • [10] Network Flow based IoT Botnet Attack Detection using Deep Learning
    Sriram, S.
    Vinayakumar, R.
    Alazab, Mamoun
    Soman, K. P.
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 189 - 194