logo

MIT141559 Botnet Analysis and Detection System Literature Review

5 Pages1190 Words91 Views
   

Melbourne Institute of Technology

   

RESEARCH METHODS & PROJECT DESIGN (MIT141559)

   

Added on  2020-05-28

MIT141559 Botnet Analysis and Detection System Literature Review

   

Melbourne Institute of Technology

   

RESEARCH METHODS & PROJECT DESIGN (MIT141559)

   Added on 2020-05-28

ShareRelated Documents
Running head: LITERATURE REVIEW: BOTNETLITERATURE REVIEW: BOTNETName of the studentName of the UniversityAuthor Note
MIT141559 Botnet Analysis and Detection System Literature Review_1
LITERATURE REVIEW: BOTNET1Botnet refers to an interconnected group of computers that have been trespassed byunauthorised users for personal malicious purposes. Some of the research work done on theBotnet has been reviewed in the following sections. Review of each article have beenconcluded with their most prominent strength and limitations. Tor’s abusive use by Botnet:Hopper (2014) has defined Tor network as “The Tor network provides a mechanismfor clients to anonymously provide services (e.g., websites) that can be accessed by otherusers through Tor” [5]. The paper discusses the threat that botnet proposes to the subject ofthe considered article. The author has suggested that the rate of consumption of relay’scollective computing resources by botnet nodes can be controlled by throttling the cost. Theauthor has recommended the use of CAPTCHAs for verifying human effort while accessingthe website and implementation of guard nodes (rate-limitations) for an individual client. Thepaper offers a deep insight into the protective methods for prevention of Tor network fromBotnet abuse though it lacks in providing a detailed and more reliable approach.Citadel Botnet evaluation:Rahimian et al. (2014) in the paper have attempted reverse engineering of the CitadelBotnet to gain an insight of its functionality and structure [6]. The authors have divided theirobjectives into three different categories. The first objective is to do a comparative analysis ofthe subject and Zeus malware followed by an evaluation of components (open source)adopted by the subject and finally accelerating the reverse engineering. They have adapted thedynamic and static analysis method of the malware codes along with a clone-based methodfor their objectives as their methodology. The authors have concluded their paper by statingthat adaptation of their method can help in underlining the most suitable scenario foranalysing the malware existing in real-world. The paper has done good work at evaluating the
MIT141559 Botnet Analysis and Detection System Literature Review_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Network Intrusion Detection System
|2
|364
|30

(Solved) Information Security: Assignment
|28
|7728
|183

Cyber Attacker of the Future
|12
|3220
|39

Changing the Job Market and Business Strategy under Cyber Security Guidance
|65
|15173
|37