Analysis of different system to sustain against the botnet attack

Authors

  • Rishikesh  B Tech, Department of Computer Science and Engineering, Amity School of Engineering and Technology Amity University Jharkhand
  • Kanika Thakur  Department of Computer Science and Engineering, Amity School of Engineering and Technology Amity University Jharkhand

DOI:

https://doi.org/10.32628/CSEIT206361

Keywords:

Botnet, Botnet sustenance test

Abstract

Among the various forms of malware, botnets are emerging as the most serious threat against cyber-security as they provide a distributed platform for several illegal activities such as launching distributed denial of service attacks against critical targets, malware dissemination, phishing, and click fraud. The defining characteristic of botnets is the use of command and control channels through which they can be updated and directed. In this article i have used a bot created from msfvenom , which is a popular tool from a penetration operating system Kali Linux and tested it in various operating system to view the power of sustenance among them. I have used some most popular operating systems which are generally used in banks, ATMs or by individuals. I have tested all the operating system with their default anti-virus and firewalls to make it a fair comparison.

References

  1. https://us.norton.com/internetsecurity-malware-what-is-a-botnet.html
  2. E. Alomari, “Botnet-based Distributed Denial of Service ( DDoS ) Attacks on Web Servers : Classification and Art,” vol. 49, no. 7, pp. 24–32, 2012.
  3. https://www.kaspersky.co.in/resource-center/threats/botnet-attacks
  4. https://www.offensive-security.com/metasploit-unleashed/msfvenom/
  5. https://www.offensive-security.com/metasploit-unleashed/custom-scripting/
  6. M. Thapliyal, N. Garg, and A. Bijalwan, “Botnet Forensics : Survey and Research Challenges,” no. April, 2013.
  7. https://www.cisco.com/c/en/us/about/security-center/infiltrating-botnet.html
  8. R. A. Rodr, I. Omez, G. M. A-fern, and P. Garc, “Survey and Taxonomy of Botnet Research through Life-Cycle,” vol. 45, no. 4, 2013.
  9. https://www.f-secure.com/v-descs/articles/botnet.shtml
  10. I. Ullah, N. Khan, and H. a. Aboalsamh, “Survey on botnet: Its architecture, detection, prevention and mitigation,” 2013 10th IEEE Int. Conf. NETWORKING, Sens. Control, pp. 660–665, Apr. 2013.
  11. S. S. C. Silva, R. M. P. Silva, R. C. G. Pinto, and R. M. Salles, “Botnets: A survey,” Comput. Networks, vol. 57, no. 2, pp. 378– 403, Feb. 2013.
  12. M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and A. Arbor, “A Survey of Botnet Technology and Defenses,” 2006.

Downloads

Published

2020-06-30

Issue

Section

Research Articles

How to Cite

[1]
Rishikesh, Kanika Thakur, " Analysis of different system to sustain against the botnet attack" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 3, pp.262-271, May-June-2020. Available at doi : https://doi.org/10.32628/CSEIT206361