Network Forensics Investigation for Botnet Attack

被引:0
作者
Sembiring, Irwan [1 ]
Nugroho, Yonathan Satrio [1 ]
机构
[1] Satya Wacana Christian Univ, Diponegoro 52-60, Salatiga, Indonesia
来源
IT CONVERGENCE AND SECURITY 2017, VOL 2 | 2018年 / 450卷
关键词
Malware; Botnet; Network forensics;
D O I
10.1007/978-981-10-6454-8_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays the internet users manipulated by several web applications which instruct them to download and install programs in order to interfere the computer system stabilities or other aims. Most users didn't realize that the applications might have been added with some malicious software such as Worms, and Trojan horse. After the malware infected the victim's computer, they made the machine to conduct for to the master's purposes. This process known as botnet. Botnet is categorized as difficult detected malware even with up-to-date antivirus software and causing lot of problems. Network security researcher has developed various methods to detect Botnet invasion. One of the method is forensics method. Network forensics is a branch of Digital forensics which the main task is to analyze the problem (e.g. Botnet's attack) by identify, classify the networks traffic and also recognize the attacker's behavior in the network. The output of this system will produce the pattern recognition of Botnet's attack and payload identification according to Network Forensics Analysis.
引用
收藏
页码:228 / 236
页数:9
相关论文
共 50 条
  • [31] An architecture for SCADA network forensics
    Kilpatrick, T.
    Gonzalez, J.
    Chandia, R.
    Papa, M.
    Shenoi, S.
    ADVANCES IN DIGITAL FORENSICS II, 2006, 222 : 273 - +
  • [32] The application research on network forensics
    Jingfang, H. (jdzhjf@163.com), 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (05): : 167 - 173
  • [33] Modeling the network forensics behaviors
    Ren, Wei
    Jin, Hai
    2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 3 - 10
  • [34] Deep learning-based classification model for botnet attack detection
    Ahmed, Abdulghani Ali
    Jabbar, Waheb A.
    Sadiq, Ali Safaa
    Patel, Hiran
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 13 (7) : 3457 - 3466
  • [35] Deep learning-based classification model for botnet attack detection
    Abdulghani Ali Ahmed
    Waheb A. Jabbar
    Ali Safaa Sadiq
    Hiran Patel
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 3457 - 3466
  • [36] Network monitoring for security and forensics
    Shanmugasundaram, Kulesh
    Memon, Nasir
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 56 - +
  • [37] Network Forensics: Notions and Challenges
    Almulhem, Ahmad
    2009 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT 2009), 2009, : 463 - 466
  • [38] A Revised Ant colony Optimization Scheme for Discovering Attack Paths of Botnet
    Wang, Ping
    Lin, Hui-Tang
    Wang, Tzy Shiah
    2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 918 - 923
  • [39] IoT Botnet Attack Detection Model Based on DBO-Catboost
    Yang, Changjin
    Guan, Weili
    Fang, Zhijie
    APPLIED SCIENCES-BASEL, 2023, 13 (12):
  • [40] Digital Forensics Research on Cloud Computing: An investigation of Cloud Forensics Solutions
    Morioka, Erni
    Sharbaf, Mehrdad S.
    2016 IEEE SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2016,