Ontological Engineering Approach Towards Botnet Detection in Network Forensics
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 10, Issue 9
Abstract
The abundance in the usage of Internet, in every arena of life from social to personal, commercial to domestic and other aspects of life as well, leads the rise in cybercrime at an upsetting speed. More illegal activities as a result of cyber crime, reason to tempts many network attacks and threats. Network forensics is the branch of fornesics that deals in the detection of network attacks. Botnet is one of the most common attacks, but hazardos. It  is a network of hacked computers It  involves the capturing, storing and then analysis of the network packets, in order to identify the source of the attack.  Various methods based on this approach for botnet detection are suggested in literature but there is no generalized method to represent the basic methodology used by any of the botnet detection method. With such guidelines, the comparison among the various implementations, a roadmap for the new implementation, development of reusable implementations can be addressed. Accordingly, there is a requirement of a generic framework that can characterize the general methodology followed by any of the botnet detection methods. This paper, review various prevalent methods of botnet detection to extract commonalities among them. A global model for the detection of botnets is represented as ontology. Ontology is used as a means of knowledge representation. The botnet ontology is represented using Web Ontology Language (OWL). OWL is used because it is a language with layered architecture and high expressive power.Â
Authors and Affiliations
Sukhdilpreet Kaur, Amandeep Verma
Robust Estimators in Fuzzy Logic Cellular-Automata Salt and Pepper Noise Filtering
In order to increase the performance of computational algorithms in terms of efficiency of estimators, we tested new nonparametric estimators in fuzzy and cellular automata models. In particular, image de-noising algor...
Authentication Based Cloud Storage and Secure Data Forwarding
cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party’s cloud system causes serious concern over data confidentialit...
Optimization of Constituents of (Ni, MO, Cu)/Kieselguhr Catalyst by Response Surface Methodology for Glycerol Production by Hydrogenolysis of Sucrose
Sucrose hydrogenolysis is industrially important forthe production of polyols. To provide high glycerol yieldunder milder reaction conditions, a nickel catalyst promotedby Molybdenum and copper supported on kieselguhr wa...
Performance Of Modified Cosh Window Function
In this paper, we have analyzed the performance of modified Cosh window function.A new parameter has been proposed to the previous 2-parameter Cosh window to improve its spectral characteristics in terms of ripple-ratio...
A Spatial Domain Approach of Fingerprinting for Colored Digital Images
In this paper, a spatial domain approach of fingerprinting is presented for colored digital images. A semi-blind fingerprinting conveys a secure arrangement for trading of digital images. The operational significance of...