ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 4)

Publication Date:

Authors : ; ;

Page : 1061-1068

Keywords : Network security; DNS security; botnet detection; and command and control;

Source : Downloadexternal Find it from : Google Scholarexternal


Aggressors, particularly botnet controllers, use stealthy briefing systems to set up sweeping scale summon and control. To proficiently appreciate the potential limit of aggressors, they have investigated the likelihood of using territory name organization (DNS) as a stealthy botnet charge and-control channel. They have depicted and quantitatively research a few systems that could be used to enough conceal pernicious DNS practices at the framework level. Their trial evaluation makes usage of two-month-long 4.6-GB grounds framework data set and 1 million domain names got from They have contemplated that the DNSbased stealthy request and-control redirect particularly, the code word mode could be very skilled for assaulters, exhibiting the prerequisite for further research by shields in this course. The true dismemberment of DNS payload as a countermeasure has sensible hindrances limiting its gigantic scale sending. They have could recognize it right after the strike has been made. In the proposed model instead of uncovering the malicious DNS after attack has happened, we are situated to propose a Botnet accompanying gadget which screens the DNS activities while making bot chain itself. Stealthy message correspondence will be accompanied and finally when the bot expert tries to ambush any secured database the BTT will isolate the Bot structure orchestrate and shields the secured database. It encounters live distinguishment and adoptable taking in framework for further strike.

Last modified: 2014-04-29 12:33:16