BOTNET FRAMEWORK
A Thesis Submitted
In Partial Fulfillment of the Requirements
For the Degree Of
MASTER OF TECHNOLOGY
In
Computer Science & Engineering
By
CHANCHAL AHLAWAT
(Enrollment no: 21341314013)
Under the Supervision of
Mr. ANCHIT BIJALWAN
Uttaranchal University, Dehradun, Uttarakhand)
To the
Faculty of Computer Science & Engineering
UTTARANCHAL UNIVERSITY
DEHRADUN
May, 2015
CERTIFICATE
Certified that Chanachal Ahlawat (21341314001), has carried out the research work presented in this thesis entitled "BOTNET FRAMEWORK" for the award of Master of Technology from Uttaranchal University, Dehradun under my supervision. The thesis embodies results of original work, and studies are carried out by the student herself and the contents of the thesis do not form the basis for the award of any other degree to the candidate or to anybody else from this or any other University/Institution.
(Mr. AnchitBijalwan) Associate Professor Uttaranchal University Dehradun, (Uttarakhand)
Date:
ABSTRACT
Botnets are emerging as the most significant threat facing online ecosystems and computing assets. They also pose a significant and growing threat against cyber security as they provide distributed platform for many
As mentioned by Kim Zetter (2015), Botnets have been around for more than a decade and have become one of the most popular methods attackers use to hijack machines and make quick money. The security industry estimates that botnets, over time, have resulted in more than $110 billion in losses to victims globally. An estimated 500 million computers fall prey to botnet attackers annually, which comes down to about 18 victims infected per second.
From iPhones to Lamborghinis to the orion spacecraft; all of them required computer engineers. Computer engineering is the bridge between computer science and electrical engineering, it is where the heart of most modern technology is created and developed. With the emergence of personal computing and the every day growing demand for more in our technology, computer engineers rise to the challenge. “Computer hardware engineers research, design, develop, and test computer systems and components such as processors, circuit boards, memory devices, networks, and routers. By creating new directions in computer hardware, these engineers create rapid advances in computer technology” (“Computer Hardware Engineers”). Although very demanding path in college and stressful at times, the advantages and outlook of computer engineering far outweigh the toils of many years of rigorous study, and is going to be one of the most prominent disciplines of engineering in the future.
Lately active defense in cyber security has been a very popular approach in protecting assets in cyberspace as well as mitigating the increase of cyber threats. Current defenses such as firewalls, antivirus, strong security policies and security patch updates aren’t sufficient enough to protect against the rapidly changing threat landscape. Many hackers can easily bypass traditional
Botnets and their zombie armies are a real problem in the IT community as stated by Zetter. (2015) The problems that they cause are becoming more widespread and keeping computers safe is becoming more and more problematic. Additionally, the library’s ISP has put the library in a position where they must provide their cyber security, or the ISP will have no alternative to discontinuing to provide internet access to the library’s public access computers. Therefore, the solution that I have proposed to correct the problem the Wayward Pines Public Library is experiencing is not only the best option but is also considered best practice as mentioned in the prior section.
Explains what a botnet is, how it is created, used and the amount or types of data that can be collected over time. The ability to track or monitor many of these botnets by antivirus software is reported to be a very low percentage of known botnets. One of the basic principles is almost a “throw everything at it and see what sticks” mentality in that developers will employ a botnet through embedding it in a quasi-convincing spam message and hoping the reader is dumb enough to click on the link (Mittleman 67.)
I have many goals in mind for my life. I want to graduate university, possibly go to graduate school, and obtain a career in which I am happy and satisfied. Yes, I know this sounds very cliché as many people want to obtain this kind of life. I don’t mind obtaining a “normal” happy life as long as I am happy with it. I am familiar with Maslow’s Hierarchy of Needs and I want to make sure I fulfill my lower needs before I start trying to achieve my goals. I have never actually applied the GIOADA process to my decision making in the past. After reading the document that describes the GIOADA process, I will start applying this process to future decisions I make in life. Also, as I look back at some of the big decisions I made
We are facing a new threat from the cyber world which allows our enemies to attack from various parts of the world by pushing a button to inflict damage to our nation’s information technology systems. This threat is one which political figures have warned the U.S. government about for years
Imagine being a computer engineer, constantly fixing, improving, and creating the one thing that keeps the world going. Computer Engineers work on(“About Computer Engineering”). Without computer engineers, technology wouldn’t be able to improve as rapidly as it is today. This is true because computer engineers are the people who works on the hardware and software of electrical devices. They work on hardware and software to prevent electrical devices from getting viruses or crashing .In order to be a computer engineer one must obtain a bachelor’s or master's degree in computer engineering, electrical engineering, or computer science. A future computer engineer must also have volunteer hour in the computer engineering workforce
Bots are programs that take over and use the resources of a computer system over a network without consent, and communicate those results to others who may control the Bots.
By the year of 2016, investments in online security are expected to reach $86bn (Contu et al, 2012). Although this might seem a large sum of money, it is considered necessary since there is an increase in online risks from all over the world. Professional hackers develop malware on a global scale and on a 24/7 basis. Hackers have five objectives when spreading malware over the Internet: to infect/distribute, to steal, to persist, to control and for intelligence (Morris, 2010).
Just like a biological virus, a computer virus is able to infect and ruin lives. This malicious software constitutes more than just simple viruses but also includes other types of software including worms, Trojan horses, and ransomware. Malware has been around since the late 1980’s. Originally, people became hackers to gain notoriety online, but today, it has become more of a business. Cyber attacks originate from all around the world, and it is not just individual people that benefit from it. In two decades, numerous cyber crime syndicates have been created, and states all over the world sponsor hacker groups. Over the past twenty-five years, malware has become less about checking the integrity of computer security and gaining notoriety in the underground cyber society, and it has become more of a chaos creating, money making business that many people and institutions take part in.
The fight against hackers and cyber crime is a global problem and nationally and internationally, the threats they caused have been recognized and acknowledged.
Aim of this report is to build Zeus botnet in a test lab to understand its workings, applications and risks.
Cybercrime has become a fast growing concern for the 21st century as businesses, institutions and individuals grow into an interconnected web of computer networks. Online business transactions, along with the sharing of personal information, are vulnerable to a host of disasters that can reap economic and social havoc. Some sources say that today, cybercrime costs more than $1.0 trillion to society--Global Industry Analysts, Inc. forecasted the world cyber security market to reach $80 billion by 2017 (Gale, 2011).
I feel great pleasure in submitting the project work entitled JAVA AND ITS APPLICATIONS to the department of computer science and engineering, Amity University, Noida.