期刊名称:International Journal of Computer Science and Information Technologies
电子版ISSN:0975-9646
出版年度:2014
卷号:5
期号:2
页码:1418-1422
出版社:TechScience Publications
摘要:Aggressors, specifically botnet controllers, use stealthy informing frameworks to set up expansive scale summon and control. To efficiently comprehend the potential capacity of assailants, they have explored the possibility of utilizing dominion name administration (DNS) as a stealthy botnet charge and-control channel. They have portrayed and quantitatively investigate some strategies that might be utilized to adequately cover up malevolent DNS exercises at the system level. Their trial assessment makes utilization of two-month-long 4.6-GB grounds system information set and 1 million dominion names got from alexa.com. They have reasoned that the DNS-based stealthy order and-control divert (specifically, the code word mode) could be quite capable for assailants, demonstrating the requirement for further research by shields in this course. The factual dissection of DNS payload as a countermeasure has down to earth impediments restraining its huge scale sending. They have had the ability to distinguish it just after the strike has been made. In the proposed model as opposed to discovering the malevolent DNS after assault has occurred, we are set to propose a Botnet following device which screens the DNS exercises while making bot chain itself. Stealthy message correspondence will be followed and at last when the bot master tries to assault any secured database the BTT will segregate the Bot framework arrange and safeguards the secured database. It experiences live recognition and adoptable taking in system for further strike
关键词:Network security; DNS security; botnet detection;and command and control