Skip to main content

2017 | OriginalPaper | Buchkapitel

A Practical Procedure for Collecting More Volatile Information in Live Investigation of Botnet Attack

verfasst von : Yashar Javadianasl, Azizah Abd Manaf, Mazdak Zamani

Erschienen in: Multimedia Forensics and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays because of the growth of internet usage in all over the world, users of this global service are faced with many different threats. Attackers are trying to improve their methods in order to penetrate the users’ machines to misuse their systems and their information. Most of the cyber-crimes are the result of one attack to a user or a network of many users. One of the important attacks in this area is Botnet which is controlling some compromised computers by an attacker remotely in terms of specific victim. This study tries to propose and implement a procedure in order to extract information and footprints of infected system with Botnet in order to reconstruct the Botnet attack and prepare a digital evidence package which shows the malicious activities and malicious files of this attack to present in a court.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zeidanloo, H.R., et al.: Botnet detection based on traffic monitoring. In: 2010 International Conference on Networking and Information Technology (ICNIT). IEEE (2010) Zeidanloo, H.R., et al.: Botnet detection based on traffic monitoring. In: 2010 International Conference on Networking and Information Technology (ICNIT). IEEE (2010)
2.
Zurück zum Zitat Boe, B.: Super Awesome Project Name Here (2009) Boe, B.: Super Awesome Project Name Here (2009)
3.
Zurück zum Zitat Brand, M., Valli, C., Woodward, A.: Malware Forensics: Discovery of the Intent of Deception (2010) Brand, M., Valli, C., Woodward, A.: Malware Forensics: Discovery of the Intent of Deception (2010)
4.
Zurück zum Zitat Law, F.Y.W., et al.: A host-based approach to botnet investigation? Digital Forensics Cyber Crime 161–170 (2010) Law, F.Y.W., et al.: A host-based approach to botnet investigation? Digital Forensics Cyber Crime 161–170 (2010)
5.
Zurück zum Zitat Silva, S.S., et al.: Botnets: a survey. Comput. Netw. 57(2), 378–403 (2013)CrossRef Silva, S.S., et al.: Botnets: a survey. Comput. Netw. 57(2), 378–403 (2013)CrossRef
6.
Zurück zum Zitat Zhu, Z., et al.: Botnet research survey. In: Computer software and applications, 2008. In: COMPSAC’08, 32nd Annual IEEE International. IEEE (2008) Zhu, Z., et al.: Botnet research survey. In: Computer software and applications, 2008. In: COMPSAC’08, 32nd Annual IEEE International. IEEE (2008)
7.
Zurück zum Zitat Casey, E.: Handbook of Computer Crime Investigation: Forensic Tools and Technology. Academic Press (2004) Casey, E.: Handbook of Computer Crime Investigation: Forensic Tools and Technology. Academic Press (2004)
8.
Zurück zum Zitat Hay, B., Nance, K., Bishop, M.: Live analysis: progress and challenges. IEEE Secur. Priv. 7(2), 30–37 (2009)CrossRef Hay, B., Nance, K., Bishop, M.: Live analysis: progress and challenges. IEEE Secur. Priv. 7(2), 30–37 (2009)CrossRef
9.
Zurück zum Zitat Adelstein, F.: Live forensics: diagnosing your system without killing it first. Commun. ACM 49(2), 63–66 (2006)CrossRef Adelstein, F.: Live forensics: diagnosing your system without killing it first. Commun. ACM 49(2), 63–66 (2006)CrossRef
10.
Zurück zum Zitat Ilavarasan, E., Muthumanickam, K.: A Survey on host-based Botnet identification. In: 2012 International Conference on Radar, Communication and Computing (ICRCC). IEEE (2012) Ilavarasan, E., Muthumanickam, K.: A Survey on host-based Botnet identification. In: 2012 International Conference on Radar, Communication and Computing (ICRCC). IEEE (2012)
11.
Zurück zum Zitat Wang, S.J., Kao, D.Y.: Internet forensics on the basis of evidence gathering with peep attacks. Comput. Stand. Interfaces 29(4), 423–429 (2007)MathSciNetCrossRef Wang, S.J., Kao, D.Y.: Internet forensics on the basis of evidence gathering with peep attacks. Comput. Stand. Interfaces 29(4), 423–429 (2007)MathSciNetCrossRef
12.
Zurück zum Zitat Cavalca, D., Goldoni, E.: An open architecture for distributed malware collection and analysis. In: Open Source Software for Digital Forensics, pp. 101–116. Springer (2010) Cavalca, D., Goldoni, E.: An open architecture for distributed malware collection and analysis. In: Open Source Software for Digital Forensics, pp. 101–116. Springer (2010)
13.
Zurück zum Zitat Britz, M.T.: Computer Forensics and Cyber Crime: An Introduction, 2/E. Pearson Education India (2009) Britz, M.T.: Computer Forensics and Cyber Crime: An Introduction, 2/E. Pearson Education India (2009)
14.
Zurück zum Zitat Ligh, M., et al.: Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code. Wiley (2010) Ligh, M., et al.: Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code. Wiley (2010)
15.
Zurück zum Zitat Ard, C.: Botnet analysis. Int. J. Forensic Comput. Sci. 2(1), 65–74 (2007)CrossRef Ard, C.: Botnet analysis. Int. J. Forensic Comput. Sci. 2(1), 65–74 (2007)CrossRef
16.
Zurück zum Zitat Feily, M., Shahrestani, A., Ramadass, S.: A survey of botnet and botnet detection. In: SECURWARE’09. Third International Conference on Emerging Security Information, Systems and Technologies, 2009. IEEE (2009) Feily, M., Shahrestani, A., Ramadass, S.: A survey of botnet and botnet detection. In: SECURWARE’09. Third International Conference on Emerging Security Information, Systems and Technologies, 2009. IEEE (2009)
17.
Zurück zum Zitat Annis, J., et al.: Zombie networks: an investigation into the use of anti-forensic techniques employed by botnets (2008) Annis, J., et al.: Zombie networks: an investigation into the use of anti-forensic techniques employed by botnets (2008)
18.
Zurück zum Zitat Jackson, A.W., et al.: SLINGbot: a system for live investigation of next generation botnets. in Conference For Homeland Security, 2009. In: CATCH’09. Cybersecurity Applications and Technology. IEEE (2009) Jackson, A.W., et al.: SLINGbot: a system for live investigation of next generation botnets. in Conference For Homeland Security, 2009. In: CATCH’09. Cybersecurity Applications and Technology. IEEE (2009)
19.
Zurück zum Zitat Brand, M., Valli, C., Woodward, A.: Malware forensics: discovery of the intent of deception. J. Digital Forensics Secur. Law 5(4), 31–42 (2010) Brand, M., Valli, C., Woodward, A.: Malware forensics: discovery of the intent of deception. J. Digital Forensics Secur. Law 5(4), 31–42 (2010)
20.
Zurück zum Zitat Hay, B., Bishop, M., Nance, K.: Live analysis: progress and challenges. IEEE Secur. Priv. 7(2), 30–37 (2009)CrossRef Hay, B., Bishop, M., Nance, K.: Live analysis: progress and challenges. IEEE Secur. Priv. 7(2), 30–37 (2009)CrossRef
21.
Zurück zum Zitat Junewon, P.: Acquiring Digital Evidence from Botnet Attacks: Procedures and Methods. AUT University (2011) Junewon, P.: Acquiring Digital Evidence from Botnet Attacks: Procedures and Methods. AUT University (2011)
22.
Zurück zum Zitat Tabish, S.M., Shafiq, M.Z., Farooq, M.: Malware detection using statistical analysis of byte-level file content. In: Proceedings of the ACM SIGKDD Workshop on Cybersecurity and Intelligence Informatics. ACM (2009) Tabish, S.M., Shafiq, M.Z., Farooq, M.: Malware detection using statistical analysis of byte-level file content. In: Proceedings of the ACM SIGKDD Workshop on Cybersecurity and Intelligence Informatics. ACM (2009)
23.
Zurück zum Zitat Wang, P., Sparks, S., Zou, C.C.: An advanced hybrid peer-to-peer botnet. IEEE Trans. Dependable Secure Comput. 7(2), 113–127 (2010)CrossRef Wang, P., Sparks, S., Zou, C.C.: An advanced hybrid peer-to-peer botnet. IEEE Trans. Dependable Secure Comput. 7(2), 113–127 (2010)CrossRef
24.
Zurück zum Zitat Wang, L., Zhang, R., Zhang, S.: A model of computer live forensics based on physical memory analysis. In: 2009 1st International Conference on Information Science and Engineering (ICISE). IEEE (2009) Wang, L., Zhang, R., Zhang, S.: A model of computer live forensics based on physical memory analysis. In: 2009 1st International Conference on Information Science and Engineering (ICISE). IEEE (2009)
25.
Zurück zum Zitat Zeidanloo, H.R., Manaf, A.A.: Botnet command and control mechanisms. In: Second International Conference on Computer and Electrical Engineering, 2009. ICCEE’09. IEEE (2009) Zeidanloo, H.R., Manaf, A.A.: Botnet command and control mechanisms. In: Second International Conference on Computer and Electrical Engineering, 2009. ICCEE’09. IEEE (2009)
26.
27.
Zurück zum Zitat Zeidanloo, H.R., et al.: A proposed framework for P2P Botnet detection. IACSIT Int. J. Eng. Technol. 2, 161–168 (2010) Zeidanloo, H.R., et al.: A proposed framework for P2P Botnet detection. IACSIT Int. J. Eng. Technol. 2, 161–168 (2010)
28.
Zurück zum Zitat Zeidanloo, H.R., et al.: A taxonomy of Botnet detection techniques. In: 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT). IEEE (2010) Zeidanloo, H.R., et al.: A taxonomy of Botnet detection techniques. In: 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT). IEEE (2010)
29.
Zurück zum Zitat Ibrahim, L.M., Thanoon, K.H.: Detection of Zeus Botnet in Computers Networks and Internet (2012) Ibrahim, L.M., Thanoon, K.H.: Detection of Zeus Botnet in Computers Networks and Internet (2012)
30.
Zurück zum Zitat Ieong, R.: Freeware Live Forensics Tools Evaluation and Operation Tips (2006) Ieong, R.: Freeware Live Forensics Tools Evaluation and Operation Tips (2006)
Metadaten
Titel
A Practical Procedure for Collecting More Volatile Information in Live Investigation of Botnet Attack
verfasst von
Yashar Javadianasl
Azizah Abd Manaf
Mazdak Zamani
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-44270-9_17