Bot Detection using Traffic Monitoring and Traffic Analysis
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 9
Abstract
Botnet is peak extensive spread and occurs normally in today’s cyber attacks, resulting in severe intimidations to our network possessions and group’s properties. Botnets are congregation of negotiated computer (Bots) which are distantly precise by its creator(BotMaster) below a mutual Command-and-Control(C&C) infrastructure. They are used to dispense commands to the Bots for malicious actions such as distributed denial-of-service (DDoS) occurrences, junk and phishing. Maximum of the prevailing Botnet detection methods focus only on specific Botnet command and control (C&C) practices (e.g., IRC, HTTP) and structures (e.g., centralized), and can become vain as Botnets change their construction and C&C techniques.
Authors and Affiliations
R. Kannan, A. V. Ramani
Comparative Thermal Analysis of Piston Crown Using Ansys
In engines pistons are very important parts to produce power. Piston fail mainly due to mechanical stresses and thermal stresses. An analysis of thermal stress and damages due to application of temperature is presented...
A Load Balancing Model for Job Scheduling using Graph Theory and Allocation of Time
The limited number of resource and unlimited number of user in cloud environment creates the issue of load balancing. The overload number of job in cloud creates the situation of cloud resource overloading. In cloud res...
Synthesis of Tio2 Photocatalyst for Rhodamine B-Dye Degradation Under Solar Light
Photocatalysis is one of the advanced oxidation process used widely for the degradation of waste water.In the current study synthesis of TiO2. Titanium Dioxide photocatalyst has been synthesized using Titanium tetrachlo...
Automated Load Shedding and Notification to the Consumer Using GSM (Smart Power Grid)
Our aim of this project is to automate the load shedding and notifying the customer about the load shedding using GSM, according to the timings which is set in the PC. And also for reading electrical energy consumed by...
Vehicle Automation using Voice Recognizer
our project is about vehicle automation, as we can see the world is been digitized or automated and our vehicles should also be automated and henceforth we are working on an project on voice recognition, so that the veh...