Network Forensics Investigation for Botnet Attack

被引:0
|
作者
Sembiring, Irwan [1 ]
Nugroho, Yonathan Satrio [1 ]
机构
[1] Satya Wacana Christian Univ, Diponegoro 52-60, Salatiga, Indonesia
来源
关键词
Malware; Botnet; Network forensics;
D O I
10.1007/978-981-10-6454-8_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays the internet users manipulated by several web applications which instruct them to download and install programs in order to interfere the computer system stabilities or other aims. Most users didn't realize that the applications might have been added with some malicious software such as Worms, and Trojan horse. After the malware infected the victim's computer, they made the machine to conduct for to the master's purposes. This process known as botnet. Botnet is categorized as difficult detected malware even with up-to-date antivirus software and causing lot of problems. Network security researcher has developed various methods to detect Botnet invasion. One of the method is forensics method. Network forensics is a branch of Digital forensics which the main task is to analyze the problem (e.g. Botnet's attack) by identify, classify the networks traffic and also recognize the attacker's behavior in the network. The output of this system will produce the pattern recognition of Botnet's attack and payload identification according to Network Forensics Analysis.
引用
收藏
页码:228 / 236
页数:9
相关论文
共 50 条
  • [1] Mobile Botnet Detection Using Network Forensics
    Vural, Ickin
    Venter, Hein
    [J]. FUTURE INTERNET-FIS 2010, 2010, 6369 : 57 - 67
  • [2] Enhanced neural network-based attack investigation framework for network forensics: Identification, detection, and analysis of the attack
    Bhardwaj, Sonam
    Dave, Mayank
    [J]. COMPUTERS & SECURITY, 2023, 135
  • [3] Attack Intention Analysis Model for Network Forensics
    Rasmi, M.
    Jantan, Aman
    [J]. SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 403 - 411
  • [4] A MODEL FOR NFAA-NETWORK FORENSICS ATTACK ANALYSIS
    Rasmi, M.
    Jantan, Aman
    [J]. THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 739 - 746
  • [5] Attack Graph Analysis for Network Anti-Forensics
    Chandran, Rahul
    Yan, Wei Q.
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (01) : 28 - 50
  • [6] XG-BoT: An explainable deep graph neural network for botnet detection and forensics
    Lo, Wai Weng
    Kulatilleke, Gayan
    Sarhan, Mohanad
    Layeghy, Siamak
    Portmann, Marius
    [J]. INTERNET OF THINGS, 2023, 22
  • [7] Crypto-Preserving Investigation Framework for Deep Learning Based Malware Attack Detection for Network Forensics
    Sonam Bhardwaj
    Mayank Dave
    [J]. Wireless Personal Communications, 2022, 122 : 2701 - 2722
  • [8] Crypto-Preserving Investigation Framework for Deep Learning Based Malware Attack Detection for Network Forensics
    Bhardwaj, Sonam
    Dave, Mayank
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (03) : 2701 - 2722
  • [9] Customized convolutional neural network model for IoT botnet attack detection
    Bojarajulu, Balaganesh
    Tanwar, Sarvesh
    [J]. SIGNAL IMAGE AND VIDEO PROCESSING, 2024, 18 (6-7) : 5477 - 5489
  • [10] Mirai Botnet Attack Detection in Low-Scale Network Traffic
    Guven, Ebu Yusuf
    Gurkas-Aydin, Zeynep
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 37 (01): : 419 - 437