DEFENDING STEALTHY MODE ATTACKS BY LIVE DETECTION AND ADOPTABLE LEARNING TECHNIQUE?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 4)Publication Date: 2014-04-30
Authors : G.Suganya; K.E Narayana;
Page : 1061-1068
Keywords : Network security; DNS security; botnet detection; and command and control;
Abstract
Aggressors, particularly botnet controllers, use stealthy briefing systems to set up sweeping scale summon and control. To proficiently appreciate the potential limit of aggressors, they have investigated the likelihood of using territory name organization (DNS) as a stealthy botnet charge and-control channel. They have depicted and quantitatively research a few systems that could be used to enough conceal pernicious DNS practices at the framework level. Their trial evaluation makes usage of two-month-long 4.6-GB grounds framework data set and 1 million domain names got from alexa.com. They have contemplated that the DNSbased stealthy request and-control redirect particularly, the code word mode could be very skilled for assaulters, exhibiting the prerequisite for further research by shields in this course. The true dismemberment of DNS payload as a countermeasure has sensible hindrances limiting its gigantic scale sending. They have could recognize it right after the strike has been made. In the proposed model instead of uncovering the malicious DNS after attack has happened, we are situated to propose a Botnet accompanying gadget which screens the DNS activities while making bot chain itself. Stealthy message correspondence will be accompanied and finally when the bot expert tries to ambush any secured database the BTT will isolate the Bot structure orchestrate and shields the secured database. It encounters live distinguishment and adoptable taking in framework for further strike.
Other Latest Articles
- AN EFFICIENT APPROACH TO AN IMAGE RETRIEVAL USING PARTICLE SWARM OPTIMIZATION
- A Dynamic Approach to Extract Texts and Captions from Videos?
- Investigation of New Approach to the Design and Development for Clumping Algorithm in MANET?
- A NOVEL STEGANOGRAPHIC APPROACH FOR IMAGE ENHANCEMENT USING LEAST SIGNIFICANT BIT
- Finding Correlated CCC-Biclusters from Gene Expression Data?
Last modified: 2014-04-29 12:33:16