Skip to main content
Top

2018 | Supplement | Chapter

Network Forensics Investigation for Botnet Attack

Authors : Irwan Sembiring, Yonathan Satrio Nugroho

Published in: IT Convergence and Security 2017

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Nowadays the internet users manipulated by several web applications which instruct them to download and install programs in order to interfere the computer system stabilities or other aims. Most users didn’t realize that the applications might have been added with some malicious software such as Worms, and Trojan horse. After the malware infected the victim’s computer, they made the machine to conduct for to the master’s purposes. This process known as botnet. Botnet is categorized as difficult detected malware even with up-to-date antivirus software and causing lot of problems. Network security researcher has developed various methods to detect Botnet invasion. One of the method is forensics method. Network forensics is a branch of Digital forensics which the main task is to analyze the problem (e.g. Botnet’s attack) by identify, classify the networks traffic and also recognize the attacker’s behavior in the network. The output of this system will produce the pattern recognition of Botnet’s attack and payload identification according to Network Forensics Analysis.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Shaikh, A.: Botnet Analysis And Detection System. School of Computing, Napier University (2010) Shaikh, A.: Botnet Analysis And Detection System. School of Computing, Napier University (2010)
2.
go back to reference Trend Micro Inc.: Zeus: A Persistent Criminal Enterprise. Trend Micro, Incorporated Threat Research Team (2010) Trend Micro Inc.: Zeus: A Persistent Criminal Enterprise. Trend Micro, Incorporated Threat Research Team (2010)
3.
go back to reference Laheeb Mohammed Ibrahim: Analysis and Detection of the Zeus Botnet Crimeware. Mosul University, Mosul (2015) Laheeb Mohammed Ibrahim: Analysis and Detection of the Zeus Botnet Crimeware. Mosul University, Mosul (2015)
4.
go back to reference Grizzard, J., Sharma, V.: Peer-to-peer botnets: overview and case study. In: HotBots 07 Conference, pp. 1. USENIX Association, Berkeley, CA (2007) Grizzard, J., Sharma, V.: Peer-to-peer botnets: overview and case study. In: HotBots 07 Conference, pp. 1. USENIX Association, Berkeley, CA (2007)
5.
go back to reference Huang, S.-Y., Huang, Y.: Network Forensics Analysis Using Growing Hierarchical SOM. Research Center for Information Technology Information, Taipei (2013) Huang, S.-Y., Huang, Y.: Network Forensics Analysis Using Growing Hierarchical SOM. Research Center for Information Technology Information, Taipei (2013)
6.
go back to reference Geges, S.: Identifikasi Botnet Melalui Pemantauan Group Activity Pada DNS Traffic. Institut Teknologi Sepuluh Nopember (ITS), Surabaya (2013) Geges, S.: Identifikasi Botnet Melalui Pemantauan Group Activity Pada DNS Traffic. Institut Teknologi Sepuluh Nopember (ITS), Surabaya (2013)
7.
go back to reference Chnadran, R.: Network forensics. In: Know Your Enemy Learning about Security Threats, 2nd edn., pp. 281–325. Addison Wesley Professional, Boston (2004) Chnadran, R.: Network forensics. In: Know Your Enemy Learning about Security Threats, 2nd edn., pp. 281–325. Addison Wesley Professional, Boston (2004)
8.
go back to reference Kaushik, A.K., Pilli, E.S., Josh, R.C.: Network Forensics System for Port Scanning Attack, Department of Electronics and Computer Engineering, Indian Institute of Technology Roorkee, Roorkee, India (2010) Kaushik, A.K., Pilli, E.S., Josh, R.C.: Network Forensics System for Port Scanning Attack, Department of Electronics and Computer Engineering, Indian Institute of Technology Roorkee, Roorkee, India (2010)
Metadata
Title
Network Forensics Investigation for Botnet Attack
Authors
Irwan Sembiring
Yonathan Satrio Nugroho
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-6454-8_29

Premium Partner