2018
DOI: 10.5296/npa.v10i2.13144
|View full text |Cite
|
Sign up to set email alerts
|

Botnet Forensic: Issues, Challenges and Good Practices

Abstract: Unethical hacking of sites, probing, click frauds, phishing, denial of services attack and many such malicious practices affects the organizational integrity and sovereignty. Such activities are direct attacks on the safety, security and confidentiality of the organization. These activities put organizational privacy at stake. Botnet forensic is utilized to strengthen the security issues by understanding the modus operandi of the attacks. The available observations can be utilized in future also to prevent a p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 56 publications
0
3
0
Order By: Relevance
“…The database systems involved also can't maintain and preserve the integrity, originality and confidentiality of the collected evidence as well as the related chain of custody of various events that occurred in a specific sequence while collecting, transferring, storing, analyzing and interpreting the evidence to solve a cybercrime incident [11,12]. While on the other hand cybercriminals instigate malicious activities through multimedia and network devices such as business credential leakages, information theft and unauthorized access [13]. This allows hackers and other intruders to forge and tamper with the collected evidence.…”
Section: Introductionmentioning
confidence: 99%
“…The database systems involved also can't maintain and preserve the integrity, originality and confidentiality of the collected evidence as well as the related chain of custody of various events that occurred in a specific sequence while collecting, transferring, storing, analyzing and interpreting the evidence to solve a cybercrime incident [11,12]. While on the other hand cybercriminals instigate malicious activities through multimedia and network devices such as business credential leakages, information theft and unauthorized access [13]. This allows hackers and other intruders to forge and tamper with the collected evidence.…”
Section: Introductionmentioning
confidence: 99%
“…A bot is a malicious program that acts upon botherder's command. Botherder executes this bot illegally further for the selfinterest, which is called bot attack [1]. Bot attack is difficult to handle as botnet rapidly germinates in order to get off the detection process.…”
Section: Introductionmentioning
confidence: 99%
“…Traffic analyzers can use different approaches: the first ones were based on recognizing known patterns inside the payloads of traffic 8,9 , but their main downside is that there exist obfuscation techniques to bypass these tools' analyses 10 . Recent proposals that use Machine Learning (ML) techniques 11 assume that botnet traffic reflects behavior of its related malware.…”
mentioning
confidence: 99%