The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Successful Computer Forensics Analysis on the Cyber Attack Botnet
Abstract
The success of computer forensics lies in the complete analysis of the evidence that is available. This is done by not only analyzing the evidence which is available but also searching for new concrete evidence. The evidence is obtained through the logs of the data during the cyberattack. When performing analysis of the cyberattack especially the botnet attacks, there are many challenges. First and the foremost is that it hides the identity of the mastermind, the botmaster. It issues the command to be executed using its subordinate, the command and control (C&C). The traceback of C&C itself is a complex task. Secondly, it victimizes the innocent compromised device zombies. This chapter discusses the analysis done in both proactive and reactive ways to resolve these challenges. The chapter ends by discussing the analysis to find the real mastermind to protect the innocent compromised system and to protect the victim system/organization affected by the botnet cyberattack.
Related Content
Siva Raja Sindiramutty, Noor Zaman Jhanjhi, Chong Eng Tan, Navid Ali Khan, Bhavin Shah, Amaranadha Reddy Manchuri.
© 2024.
58 pages.
|
Imdad Ali Shah, Raja Kumar Murugesan, Samina Rajper.
© 2024.
31 pages.
|
Rana Muhammad Amir Latif, Muhammad Farhan, Navid Ali Khan, R. Sujatha.
© 2024.
33 pages.
|
Imdad Ali Shah, Areesha Sial, Sarfraz Nawaz Brohi.
© 2024.
25 pages.
|
Kassim Kalinaki, Wasswa Shafik, Sarah Namuwaya, Sumaya Namuwaya.
© 2024.
24 pages.
|
Imdad Ali Shah, N. Z. Jhanjhi, Humaira Ashraf.
© 2024.
24 pages.
|
Rida Zehra.
© 2024.
18 pages.
|
|
|