首页    期刊浏览 2025年05月07日 星期三
登录注册

文章基本信息

  • 标题:Defensive Surreptitious Method Attacks by Live Detection and Adoptable Learning System
  • 本地全文:下载
  • 作者:Keerthi P.S ; S.Venkatesan ; C.Kanimozhi
  • 期刊名称:International Journal of Computer Science and Information Technologies
  • 电子版ISSN:0975-9646
  • 出版年度:2014
  • 卷号:5
  • 期号:2
  • 页码:1418-1422
  • 出版社:TechScience Publications
  • 摘要:Aggressors, specifically botnet controllers, use stealthy informing frameworks to set up expansive scale summon and control. To efficiently comprehend the potential capacity of assailants, they have explored the possibility of utilizing dominion name administration (DNS) as a stealthy botnet charge and-control channel. They have portrayed and quantitatively investigate some strategies that might be utilized to adequately cover up malevolent DNS exercises at the system level. Their trial assessment makes utilization of two-month-long 4.6-GB grounds system information set and 1 million dominion names got from alexa.com. They have reasoned that the DNS-based stealthy order and-control divert (specifically, the code word mode) could be quite capable for assailants, demonstrating the requirement for further research by shields in this course. The factual dissection of DNS payload as a countermeasure has down to earth impediments restraining its huge scale sending. They have had the ability to distinguish it just after the strike has been made. In the proposed model as opposed to discovering the malevolent DNS after assault has occurred, we are set to propose a Botnet following device which screens the DNS exercises while making bot chain itself. Stealthy message correspondence will be followed and at last when the bot master tries to assault any secured database the BTT will segregate the Bot framework arrange and safeguards the secured database. It experiences live recognition and adoptable taking in system for further strike
  • 关键词:Network security; DNS security; botnet detection;and command and control
国家哲学社会科学文献中心版权所有