scholarly journals Survey of Botnet Technology and Defenses

Author(s):  
Mrs. Jaishma Kumari B ◽  
Manisha ◽  
Ravish Acharya ◽  
R Yajnesh

Among the diverse forms of malware, Botnet is the serious threat which occurs commonly in today’s cyber attacks and cyber crimes. Botnets are designed to perform predefined functions in an automated fashion, where these malicious activities range from online searching of data, moving files sharing channel information to DDoS attacks against critical targets, click fraud etc. Botnet detection has been an interesting research topic related to cyber-threat and cyber-crime prevention. In this survey paper we provide a brief look at how existing botnet research, the evolution and future of botnets, as well as the goals and visibility of today’s network intersect to inform the field of botnet technology and defense.

Author(s):  
S.Nagendra Prabhu ◽  
D.Shanthi

Among the various forms of malware, Botnet is the serious threat which occurs commonly in today’s cyber attacks and cyber crimes. Botnet are designed to perform predefined functions in an automated fashion, where these malicious activities ranges from online searching of data, accessing lists, moving files sharing channel information to DDoS attacks against critical targets, phishing, click fraud etc. Existence of command and control(C&C) infrastructure makes the functioning of Botnet unique; in turn throws challenges in the mitigation of Botnet attacks. Hence Botnet detection has been an interesting research topic related to cyber-threat and cyber-crime prevention in network security. Various types of techniques and approaches have been proposed for detection, mitigation and preventation to Botnet attack. Here I discusses in detail about Botnet and related research including Botnet evolution, life-cycle, command and control models, communication protocols, Botnet detection, and Botnet mitigation mechanism etc. Also an overview of research on Botnets which describe the possible attacks performed by various types of Botnet communication technologies in future. KEYWORDS— Bot; Botnet; C&C mechanism; communication protocols; honeynet; passive traffic; attacks; defense; preventaation; mitigation


Author(s):  
Kamal Alieyan ◽  
Ammar Almomani ◽  
Rosni Abdullah ◽  
Badr Almutairi ◽  
Mohammad Alauthman

In today's internet world the internet of things (IoT) is becoming the most significant and developing technology. The primary goal behind the IoT is enabling more secure existence along with the improvement of risks at various life levels. With the arrival of IoT botnets, the perspective towards IoT products has transformed from enhanced living enabler into the internet of vulnerabilities for cybercriminals. Of all the several types of malware, botnet is considered as really a serious risk that often happens in cybercrimes and cyber-attacks. Botnet performs some predefined jobs and that too in some automated fashion. These attacks mostly occur in situations like phishing against any critical targets. Files sharing channel information are moved to DDoS attacks. IoT botnets have subjected two distinct problems, firstly, on the public internet. Most of the IoT devices are easily accessible. Secondly, in the architecture of most of the IoT units, security is usually a reconsideration. This particular chapter discusses IoT, botnet in IoT, and various botnet detection techniques available in IoT.


Author(s):  
Kamal Alieyan ◽  
Ammar Almomani ◽  
Rosni Abdullah ◽  
Badr Almutairi ◽  
Mohammad Alauthman

In today's internet world the internet of things (IoT) is becoming the most significant and developing technology. The primary goal behind the IoT is enabling more secure existence along with the improvement of risks at various life levels. With the arrival of IoT botnets, the perspective towards IoT products has transformed from enhanced living enabler into the internet of vulnerabilities for cybercriminals. Of all the several types of malware, botnet is considered as really a serious risk that often happens in cybercrimes and cyber-attacks. Botnet performs some predefined jobs and that too in some automated fashion. These attacks mostly occur in situations like phishing against any critical targets. Files sharing channel information are moved to DDoS attacks. IoT botnets have subjected two distinct problems, firstly, on the public internet. Most of the IoT devices are easily accessible. Secondly, in the architecture of most of the IoT units, security is usually a reconsideration. This particular chapter discusses IoT, botnet in IoT, and various botnet detection techniques available in IoT.


2016 ◽  
Vol 11 (02) ◽  
Author(s):  
Parul Kundra ◽  
Pooja Juneja Kundra

Internet is the most used medium for communication these days and its usage is increasing day by day because it’s easy to access any information within few seconds. But it’s not safe as with the increasing use of internet cyber crime is also increasing tremendously. Basic cause of cyber crime is cyber attack. Cyber attacks either have intention or can be done unintentionally. Attacks processed with intention are considered as cyber crimes and they can impact our society badly. This paper is focused on cyber crime, categories of cyber crime, its prevention and issues related the massive increasing ratio of cyber crime year by year.


LAW REVIEW ◽  
2018 ◽  
Vol 38 (1) ◽  
Author(s):  
Dr. Syed Sadiq Husain Abidi

The incredible evolution of information society and its dependence on Internet usage in world and particularly in India is laterally accompanied by vulnerability of societies to cybercrime. Cybercriminals are not constrained by geographical limitations as cyberspace is a free-flowing, borderless and a global problem. India has a dream to convert its society into information society by applying "Digital India" Paradigm, where government sector, the private sector and individuals completely depend on the Internet to conduct sensitive transactions and store important data on the cloud. This makes India Vulnerable to cybercrimes. Internet, worldwide connection of loosely held networks, has made the flow of data and information between different networks simple. With data and information being transferred between networks at distant locations, security related issues have become a major concern for the administrators. The advancement in the field of cyber crime has made administrators take serious steps to protect the system from unauthorized access or virus attacks. The growth of cyber crime in India since 1998 has shown an exponential curve. Though India has managed to control the cyber attacks and registered itself in the Fully Updated Countries still there is lot more work to be done to reduce the increasing cyber crime and protect the machine under threat. Data mining techniques are being used to save the machine and the network under threat. There has been some litigation or judicial decisions on cyber crimes across the world. Cyber litigation, in India, is still in its beginning and it is expected to raise high as the commission of cyber crimes and its reporting is increasing alarmingly. There has not been much litigation on cyber crimes so far, in India and this will be a challenge for judicial decisions on cybercrime in near future. Present Article point out the judicial view about Cyber Crime in India.


2021 ◽  
Vol 7 ◽  
pp. e475
Author(s):  
Abdulkadir Bilen ◽  
Ahmet Bedri Özer

Cyber-attacks have become one of the biggest problems of the world. They cause serious financial damages to countries and people every day. The increase in cyber-attacks also brings along cyber-crime. The key factors in the fight against crime and criminals are identifying the perpetrators of cyber-crime and understanding the methods of attack. Detecting and avoiding cyber-attacks are difficult tasks. However, researchers have recently been solving these problems by developing security models and making predictions through artificial intelligence methods. A high number of methods of crime prediction are available in the literature. On the other hand, they suffer from a deficiency in predicting cyber-crime and cyber-attack methods. This problem can be tackled by identifying an attack and the perpetrator of such attack, using actual data. The data include the type of crime, gender of perpetrator, damage and methods of attack. The data can be acquired from the applications of the persons who were exposed to cyber-attacks to the forensic units. In this paper, we analyze cyber-crimes in two different models with machine-learning methods and predict the effect of the defined features on the detection of the cyber-attack method and the perpetrator. We used eight machine-learning methods in our approach and concluded that their accuracy ratios were close. The Support Vector Machine Linear was found out to be the most successful in the cyber-attack method, with an accuracy rate of 95.02%. In the first model, we could predict the types of attacks that the victims were likely to be exposed to with a high accuracy. The Logistic Regression was the leading method in detecting attackers with an accuracy rate of 65.42%. In the second model, we predicted whether the perpetrators could be identified by comparing their characteristics. Our results have revealed that the probability of cyber-attack decreases as the education and income level of victim increases. We believe that cyber-crime units will use the proposed model. It will also facilitate the detection of cyber-attacks and make the fight against these attacks easier and more effective.


2020 ◽  
Author(s):  
Swati Sharma ◽  
Vikash Kumar Sharma

Cyber Crime is a crime which is difficult to detect and stop once occurred leave a long term effect on victims. Cyber Crime is increasing day by day due to over use of social media, online shopping, and internet banking which need sensitive financial and personal data.The development in emerging internet technology and its wide spread knowledge leads to security issues, cyber crime, internet hackers and intruders. The charm of internet enhances the network structure that construct vast online theft, fraud are called as cyber attacks or cyber crime. In order to keep ourselves free from cyber crime we need to know how to protect ourselves from cyber crime. In this paper we propose different mode of cybercrime and the types of its illegal activities over the internet. Either national or international cybercrime is creating huge negative impacts over society. By focusing on various techniques we examine the cybercrime web data due to social media. Social networking websites are used as a medium of interaction and communication among all the people across the world. Due to over use and lack of awareness leads to increase the cyber crimes by several aspects.


2020 ◽  
Vol 21 (2) ◽  
pp. 85-93
Author(s):  
M Syukri Akub

Cyber crime is a crime by using computers and internet access that knows no national borders. Losses that can arise from cyber crime also surpass the harm caused by conventional crime. Cyber crime prevention encountered many difficulties, one of them in the legal arrangement because the form of cyber crime always experience the development along with the progress of information technology. AbstrakKejahatan dunia maya adalah kejahatan dengan menggunakan komputer dan akses internet yang tidak mengenal batas negara. Kerugian yang dapat timbul dari kejahatan dunia maya juga melampaui kerugian yang disebabkan oleh kejahatan konvensional. Pencegahan kejahatan dunia maya menemui banyak kesulitan, salah satunya dalam pengaturan hukum karena bentuk kejahatan dunia maya selalu mengalami perkembangan seiring dengan kemajuan teknologi informasi.


Author(s):  
T. Venkat Narayana Rao, Sreeja Reddy

Advancement of technology have both positive and negative impacts. Some of the negative impacts are cyber crimes. Cyber crimes have become more dangerous. Phishing is one of the cyber crime which results in exploitation of data. There are many phishing attacks which are identified every day. There are different techniques in phishing attacks. We have to reduce those attacks by employing suitable anti-phishing techniques. Some of the anti-phishing techniques and algorithms are discussed in this paper. History of phishing and the lifecycle are also discussed in this paper. People should be aware of all such phishing and the anti-phishing techniques. They have to be careful while checking their mails and should not click on any links or downloadable malware files.


Sign in / Sign up

Export Citation Format

Share Document