Analysis of different system to sustain against the botnet attack
DOI:
https://doi.org/10.32628/CSEIT206361Keywords:
Botnet, Botnet sustenance testAbstract
Among the various forms of malware, botnets are emerging as the most serious threat against cyber-security as they provide a distributed platform for several illegal activities such as launching distributed denial of service attacks against critical targets, malware dissemination, phishing, and click fraud. The defining characteristic of botnets is the use of command and control channels through which they can be updated and directed. In this article i have used a bot created from msfvenom , which is a popular tool from a penetration operating system Kali Linux and tested it in various operating system to view the power of sustenance among them. I have used some most popular operating systems which are generally used in banks, ATMs or by individuals. I have tested all the operating system with their default anti-virus and firewalls to make it a fair comparison.
References
- https://us.norton.com/internetsecurity-malware-what-is-a-botnet.html
- E. Alomari, “Botnet-based Distributed Denial of Service ( DDoS ) Attacks on Web Servers : Classification and Art,” vol. 49, no. 7, pp. 24–32, 2012.
- https://www.kaspersky.co.in/resource-center/threats/botnet-attacks
- https://www.offensive-security.com/metasploit-unleashed/msfvenom/
- https://www.offensive-security.com/metasploit-unleashed/custom-scripting/
- M. Thapliyal, N. Garg, and A. Bijalwan, “Botnet Forensics : Survey and Research Challenges,” no. April, 2013.
- https://www.cisco.com/c/en/us/about/security-center/infiltrating-botnet.html
- R. A. Rodr, I. Omez, G. M. A-fern, and P. Garc, “Survey and Taxonomy of Botnet Research through Life-Cycle,” vol. 45, no. 4, 2013.
- https://www.f-secure.com/v-descs/articles/botnet.shtml
- I. Ullah, N. Khan, and H. a. Aboalsamh, “Survey on botnet: Its architecture, detection, prevention and mitigation,” 2013 10th IEEE Int. Conf. NETWORKING, Sens. Control, pp. 660–665, Apr. 2013.
- S. S. C. Silva, R. M. P. Silva, R. C. G. Pinto, and R. M. Salles, “Botnets: A survey,” Comput. Networks, vol. 57, no. 2, pp. 378– 403, Feb. 2013.
- M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and A. Arbor, “A Survey of Botnet Technology and Defenses,” 2006.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.