Network Forensics Investigation for Botnet Attack

被引:0
|
作者
Sembiring, Irwan [1 ]
Nugroho, Yonathan Satrio [1 ]
机构
[1] Satya Wacana Christian Univ, Diponegoro 52-60, Salatiga, Indonesia
来源
关键词
Malware; Botnet; Network forensics;
D O I
10.1007/978-981-10-6454-8_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays the internet users manipulated by several web applications which instruct them to download and install programs in order to interfere the computer system stabilities or other aims. Most users didn't realize that the applications might have been added with some malicious software such as Worms, and Trojan horse. After the malware infected the victim's computer, they made the machine to conduct for to the master's purposes. This process known as botnet. Botnet is categorized as difficult detected malware even with up-to-date antivirus software and causing lot of problems. Network security researcher has developed various methods to detect Botnet invasion. One of the method is forensics method. Network forensics is a branch of Digital forensics which the main task is to analyze the problem (e.g. Botnet's attack) by identify, classify the networks traffic and also recognize the attacker's behavior in the network. The output of this system will produce the pattern recognition of Botnet's attack and payload identification according to Network Forensics Analysis.
引用
收藏
页码:228 / 236
页数:9
相关论文
共 50 条
  • [31] MIRAI Botnet Attack Detection with Auto-Associative Dense Random Neural Network
    Nakip, Mert
    Gelenbe, Erol
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [32] Lightweight Model for Botnet Attack Detection in Software Defined Network-Orchestrated IoT
    Negera, Worku Gachena
    Schwenker, Friedhelm
    Debelee, Taye Girma
    Melaku, Henock Mulugeta
    Feyisa, Degaga Wolde
    APPLIED SCIENCES-BASEL, 2023, 13 (08):
  • [33] On Forensics: A Silent SMS Attack
    Croft, Neil
    2012 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA), 2012,
  • [34] Reconstruction of Potential Attack Scenarios of the OpenID Protocol Towards Network Forensics Analysis
    Ji, Dongyao
    Liu, Junliang
    Yao, Gang
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 101 - 113
  • [35] Botnet Attack Detection Approach in IoT Networks
    T. M. Tatarnikova
    I. A. Sikarev
    P. Yu. Bogdanov
    T. V. Timochkina
    Automatic Control and Computer Sciences, 2022, 56 : 838 - 846
  • [36] Botnet Attack Detection Approach in IoT Networks
    Tatarnikova, T. M.
    Sikarev, I. A.
    Bogdanov, P. Yu.
    Timochkina, T. V.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2022, 56 (08) : 838 - 846
  • [37] Botnet attack detection in IoT using hybrid optimisation enabled deep stacked autoencoder network
    Kalidindi, Archana
    Arrama, Mahesh Babu
    INTERNATIONAL JOURNAL OF BIO-INSPIRED COMPUTATION, 2023, 22 (02) : 77 - 88
  • [38] Digital forensics investigation methodology applicable for social network services
    Yu-Jong Jang
    Jin Kwak
    Multimedia Tools and Applications, 2015, 74 : 5029 - 5040
  • [39] Digital forensics investigation methodology applicable for social network services
    Jang, Yu-Jong
    Kwak, Jin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (14) : 5029 - 5040
  • [40] Getting Prepared for the Next Botnet Attack Detecting Algorithmically Generated Domains in Botnet Command and Control
    Kelley, Tim
    Furey, Eoghan
    2018 29TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2018,