Botnet is one of the numerous attacks ravaging the networking environment. Its approach is said to be brutal and dangerous to network infrastructures as well as client systems. Since the introduction of botnet, different design methods have been employed to solve the divergent approach but the method of taking over servers and client systems is unabated. To solve this, we first identify Mpack, ICEpack and Fiesta as enhanced IRC tool. The analysis of its role in data exchange using OSI model was carried out. This further gave the needed proposal to the development of a High level architecture representing the structural mechanism and the defensive mechanism within network server so as to control the botnet trend. Finally, the architecture was designed to respond in a proactive state when scanning and synergizing the double data verification modules in an encapsulation manner within server system.
Hacking as it is popularly called is an official phrase for unauthorised access to a network/data. However, there are different methods used in gaining access to a designated network; hence, this paper explained a few hacker’s intent using classified commercially available tools and techniques to expose the vulnerability of data and applications within networks. It also explained few simple ways of gaining access to a network without really having the key technical ability.
Botnet as it is popularly called became fashionable in recent times owing to it embedded force on network servers. Botnet has an exponential growth of about 170, 000 within network server and client infrastructures per day. The networking environment on monthly basis battle over 5 million bots. Nigeria as a country loses above one hundred and twenty five (N125) billion naira to network fraud annually, end users such as Banks and other financial institutions battle daily the botnet threats. The most worrisome part of the botmaster’s botnet is it propagation as an entity even when it is known to be large pool of malicious threats. The attacks leave end users (clients) to the risk of losing valuable credentials when connected to the affected infrastructure. It is on the above premise that this paper sort to expose the botnet method of propagation through proactive mechanism called Encapsulated Detection Mechanism (EDM) for botnet on Server Systems with further operations on conceptual framework, structural modules, usability and application of botnet. The mechanism uses one dimensional data stream evolutionary window approach of Distance Base Model (DBM) as an Outlier Analysis (OA). The Captcha, Username password and EDM Analyzer act as the front end of the data stream checker using Bot-Stream OutlieR Miner (B-STORM) algorithm and B-Exact Algorithm. The research work showed high level of data entering compliance efficiency on the server end network by neutralizing and mitigating botnet attack that falls short of the predefined data order within the networking signature.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.