The Analysis of a Botnet Based on HTTP Protocol

Article Preview

Abstract:

Botnet is a kind of computer clusters which hackers have controlled by one to many command channels for malicious purposes. Using a botnet, hacker can conduct the denial of service attacks, send massive spam and steal confidential personal easily. A Botnet's control channel by the initial based on IRC protocol has become complicated channel based on HTTP. This paper introduces the control mechanism of HTTP-based botnet. In addition, this paper also analyzes a kind of botnet based on http protocol--Zeus. By setting up experimental environment, configuring Zeus tool and analyzing network traffic, we are able to understand the working mechanism of Zeus and the working principle of botnet based on HTTP protocol.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 179-180)

Pages:

575-579

Citation:

Online since:

January 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Information on http: /www. symantec. com/norton/theme. jsp?themeid=botnet.

Google Scholar

[2] CAI Hui-mei : Research and detection of the Botnet . Jiangnan Institute of Computing Technology , Wuxi 214083.

Google Scholar

[3] LI Xiao-zhen, Xia Qun-feng : Analysis on the Command Control Mechanism and Detection Techniques of the Botnet . Jiangnan Institute of Computing Technology , Wuxi 214083.

Google Scholar

[4] ZOU Benna : A Discussion of the Botnet Network Attack . Party School of CPC Huludao Municipal Committee, Anshan 125000.

Google Scholar

[5] SUN Yan-dong , LI Dong : Overview of Botnet . Research Center of Computer Network and Information Content Security Technology, Harbin Institute of Technology, Harbin Heilongjiang 150001, China.

DOI: 10.25103/jestr.063.20

Google Scholar

[6] Simon Heron : Botnet command and control techniques Network Box (UK) , April (2007).

Google Scholar

[7] ZHUGE Jian-Wei : Introduction of the Botnet. http: /www. iest. pku. edu. en/honeynetweb/honeyneten/TeehnicalReports. htm , 2005—05.

Google Scholar

[8] Alexander K. Seewald, Wilfried N. Gansterer : On the detection and identification of Botnets . University of Vienna, Research Lab Computational Technologies and Applications, Vienna, Austria.

Google Scholar

[9] Simon Heron : Working the botnet: how dynamic DNS is revitalising the zombie army Network Box (UK).

DOI: 10.1016/s1353-4858(07)70005-3

Google Scholar