Analyzing botnet activities and nefarious attempt in corporate & home user network / Muhammad Saufi Baharudin

Botnet is a collection of compromised computer usually handled by bot herder which controlled it remotely. Internet security has become the most crucial issue in communication. The rashness of internet towards our daily life has turn into a threat that can easily obtain our information with just one...

Full description

Saved in:
Bibliographic Details
Main Author: Baharudin, Muhammad Saufi
Format: Thesis
Language:English
Published: 2009
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/63059/1/63059.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Botnet is a collection of compromised computer usually handled by bot herder which controlled it remotely. Internet security has become the most crucial issue in communication. The rashness of internet towards our daily life has turn into a threat that can easily obtain our information with just one click. By using massive attack of zombie, the attackers launch a distribution denial of services (ddos) against home users or corporate networks which is one of the common dangerous attacks. To create this army of zombie internet hosts, attackers typically infect machines of home users that having broadband access to internet, corporate networks maintained by universities & small enterprises, with remotely controlled Trojans. Usually, for whom who get infected by bot are typically had a low internet security awareness and limited resources to defend their internet infrastructure. This study will focus in Faculty of Computer and Mathematics Sciences, MARA University of Technology, Shah Alam for corporate network while home user network cover using WiMAX service provider. The purpose of this study is to increase understanding of the capabilities present in bot malware and analyzing activities of botnets. This analysis is done to find out the possibility of botnet attacks in every single internet access in FSKM and home users network. . The objective is to capture data in both FSKM and home user network and simulate it by using Snort. FSKM network are monitored by capturing all the inbound and outbound data traffic and those data will be analyze in different standalone platform. The result of this study will show the type of botnet activity and how it propagates the pattern of the activity in which will be use further for prevention development as well as build solid foundation of knowledge regarding botnet.