Finding Relations between Botnet C&cs for Forensic Purposes
نویسندگان
چکیده
Botnets, large international networks of infected computers (so-called bots), play a central part in the digital underground economy, providing the infrastructure required for a multitude of malicious activities. To ensure a botnet keeps running, the botnet owner utilizes specialized technologies to send control messages to his bots, while keeping resilience against take down and stealth against detection from law enforcement agencies and rivals. Parties such as these are developing detection and take down methodologies. However, botnet owners are in the advantage: even a er detection and take down, it is hard to trace the owner, who remains unpunished and can continue his criminal career. ¿is proves to be a signi cant problem for law enforcement, as a con scated machine may not provide direct leads. O en, it is not known which machine was managed by which miscreant or was part of which speci c botnet infrastructure. In this research, we propose a novel approach in identifying the infrastructure and miscreant belonging to con scated machines. We de ne a set of characteristics that can be applied to con scated hard disks. ¿ese will then be used to extract clusters of machines with commonalities from large datasets.We will validate our approach by applying it to a test dataset of 104 di erent disk images, showing how experts would use this to gain insight in large datasets.
منابع مشابه
NMBaaS (Non-Malicious Botnet as a service): Achieving Digital forensic Readiness in a private cloud using NMBaaS
The pervasiveness of the Internet, increased number of devices and the dissemination of ICT have played a big role in the increase in number of security incidents and adversaries in the cloud. However, there are limited proactive strategies that can enable mitigation of these incidents given the distributed nature of cloud resources. Therefore, the primary aim of the work described in this prop...
متن کاملBREDOLAB: Shopping in the Cybercrime Underworld
A recent emerging trend in the underground economy is malware dissemination as a service. Complex botnet infrastructures are developed to spread and install malware for third-party customers. In this research work, a botnet forensic investigation model is proposed to investigate and analyze large-scale botnets. The proposed investigation model is applied to a real-world law-enforcement investig...
متن کاملBotOnus: an online unsupervised method for Botnet detection
Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...
متن کاملTowards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques
The IoT is a network of interconnected everyday objects called “things” that have been augmented with a small measure of computing capabilities. Lately, the IoT has been affected by a variety of different botnet activities. As botnets have been the cause of serious security risks and financial damage over the years, existing Network forensic techniques cannot identify and track current sophisti...
متن کاملA unified data mining solution for authorship analysis in anonymous textual communications
The cyber world provides an anonymous environment for criminals to conduct malicious activities such as spamming, sending ransom e-mails, and spreading botnet malware. Often, these activities involve textual communication between a criminal and a victim, or between criminals themselves. The forensic analysis of online textual documents for addressing the anonymity problem called authorship anal...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014