Proceedings of the 17th International Conference on Electronic Commerce 2015 2015
DOI: 10.1145/2781562.2781567
|View full text |Cite
|
Sign up to set email alerts
|

The Detection of 8 Type Malware botnet using Hybrid Malware Analysis in Executable File Windows Operating Systems

Abstract: Nowadays a lot of botnet are being used for the purpose of cybercrime such as distributed denial of services (DDos) or information stealing. Botnet is a collection of computers connected through Internet that has been taken over by an attacker using malwares. These infected computer are known as bot or zombie. These bot are controllable for the attacker through an infrastructure called Command and Control (C&C) server. In general, the spread of botnets Windows operating system as its main target in the form of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…2, the fact behind this malicious software is that there will be number of computers (Botnets) get infected with a malware known as bots which will send orders through a Command and Control (C and C) to the botnets through its unique characteristic (Lee et al, 2010a). The usage of the botnet was just for the sake of mere vandalism and then it has been switched to financial revenue goals by criminals (Satrya et al, 2015). According to a survey done by Vinod P. and others they have clearly pointed out that the botnet is a remotely-controlled software-collection of autonomous software robots.…”
Section: Botnetmentioning
confidence: 99%
See 3 more Smart Citations
“…2, the fact behind this malicious software is that there will be number of computers (Botnets) get infected with a malware known as bots which will send orders through a Command and Control (C and C) to the botnets through its unique characteristic (Lee et al, 2010a). The usage of the botnet was just for the sake of mere vandalism and then it has been switched to financial revenue goals by criminals (Satrya et al, 2015). According to a survey done by Vinod P. and others they have clearly pointed out that the botnet is a remotely-controlled software-collection of autonomous software robots.…”
Section: Botnetmentioning
confidence: 99%
“…It has been also defined as a malicious code that is designed to hide the presence of other malware. They are usually combined with other malware such as a backdoor, so that remote access could be performed by the attacker so that the detection of it becomes very difficult (Satrya et al, 2015). …”
Section: Rootkitmentioning
confidence: 99%
See 2 more Smart Citations
“…Some effective solutions are vulnerability scanning and penetration testing (Oriyano, 2014) (G. Satrya & Shin, 2015) (G. B. Satrya, Cahyani, & Andreta, 2015). DPI is a software that is able to perform vulnerability scanning up to layer 7 of the OSI layer (Scarfone & Hoffman, 2009).…”
Section: Introductionmentioning
confidence: 99%