Author : T N Prakash 1
Date of Publication :1st April 2018
Abstract: Systems try to discover botnets by examining traffic content for IRC commands or by fitting honeynets. Our approach for detective work botnets is to look at flow characteristics reminiscent of information measure, duration, and packet temporal arrangement trying to find proof of botnet command and management activity. we've got made associate degree design that initial eliminates traffic that's unlikely to be a region of a botnet, classifies the remaining traffic into a bunch that's possible to be a part of a botnet, then correlates the possible traffic to search out common communications patterns that might counsel the activity of a botnet. Our results show that botnet proof is extracted from a traffic trace containing virtually nine million
Reference :
-
- “Three charged with Seattle hospital botnet attack,” The Register, February 14, 2006.
- National Infrastructure Security Coordination Center, “Targeted Trojan Email Attacks,” NISCC Briefing 08/2005, June 16, 2005.
- Rob Thormeyer, “Hacker Arrested for Breaching DoD Systems with „Botnets‟,” Government Computer News, November 4, 2005.