Subscribe free to our newsletters via your
. Nuclear Energy News .




CYBER WARS
Spot a bot to stop a botnet
by Staff Writers
London, UK (SPX) May 03, 2012


Bots might be illicitly installed on computers in the home, schools, businesses, government buildings and other installations.

Computer scientists in India have developed a two-pronged algorithm that can detect the presence of a botnet on a computer network and block its malicious activities before it causes too much harm. The team describes details of the system in a forthcoming issue of the International Journal of Wireless and Mobile Computing.

One of the most significant threats faced by computer networks is from "bots". A bot is simply a program that runs on a computer without the owner's knowledge and carries out any of a number of tasks over the network and the wider internet.

It can run the same tasks, such as sending emails or accessing a specific page on the internet, at a much higher rate than would be possible if a person were to carry out the task. A collection of bots in a network, used for malicious purposes, is a botnet and while they are often organized and run by a so-called botmaster there are bots that are available for hire for malicious and criminal activity.

Bots might be illicitly installed on computers in the home, schools, businesses, government buildings and other installations.

They are usually carried into a particular computer through a malicious link on the internet, in an email or when a contaminated external storage device, such as a USB drive is attached to a computer that has no malware protection software installed.

Botnets are known to have been used to send mass emails, spam, numbering in the hundreds of millions, if not billions of deliveries. They have also been used in corporate spying, international surveillance and for carrying out attacks known as Distributed Denial of Service (DDoS) attacks, which can decommission whole computer networks by accessing their servers repeatedly and so blocking legitimate users.

Manoj Thakur of the Veermata Jijabai Technological Institute (VJTI), in Mumbai, India, and colleagues have developed a novel approach to detecting and combating bots. Their technique uses a two-pronged strategy involving a standalone and a network algorithm.

The standalone algorithm runs independently on each node of the network and monitors active processes on the node. If it detects suspicious activity, it triggers the network algorithm. The network algorithm then analyzes the information being transferred to and from the hosts on the network to deduce whether or not the activity is due to a bot or a legitimate program on the system.

The standalone algorithm is heuristic in nature, the team says, which means it can spot previously unseen bot activity, whereas the network algorithm relies on network traffic analysis to carry out its detection.

The two techniques working together can thus spot activity from known and unknown bots. This approach also has the advantage of reducing the number of false positives.

"Detection and prevention of botnets and malware in an enterprise network" in Int. J. Wireless and Mobile Computing, 2012, 5, 144-153

.


Related Links
Inderscience Publishers
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Thwarting the cleverest attackers
Boston MA (SPX) May 03, 2012
In the last 10 years, cryptography researchers have demonstrated that even the most secure-seeming computer is shockingly vulnerable to attack. The time it takes a computer to store data in memory, fluctuations in its power consumption and even the noises it emits can betray information to a savvy assailant. Attacks that use such indirect sources of information are called side-channel atta ... read more


CYBER WARS
The Andersons Finalizes Purchase of Iowa Ethanol Plant

USA Leads World in Exports of Ethanol

Butamax Expands Early Adopters Group

HERO BX Adopts Arisdyne's Oleochemical Cavitation System to Reduce Biodiesel Catalyst Consumption

CYBER WARS
World tour on solar-powered boat to beat climate change

Strombeck Properties Unveils New 225kW Solar Power System in Arcata

Assurant Launches First-of-its-kind Solar Project Insurance

Mount Diablo Unified School District Installs SunPower Solar Systems at 51 Schools

CYBER WARS
NASA Satellite Measurements Imply Texas Wind Farm Impact on Surface Temperature

Scientists find night-warming effect over large wind farms in Texas

DoD, Navy and Wind Farm Developer Release Historic MoA

British engineering firm creates 1,000 wind farm jobs

CYBER WARS
EU offers energy partnership with China

Poll: Gov't needed for clean, green work

Alberta carbon capture project dropped

U.N. official: Energy access for all Asia

CYBER WARS
Greenpeace activists held after they board Shell icebreaker

Venezuela spending spree clouds future

Sudans on brink of all-out war over oil

China sends more ships to disputed shoal: Philippines

CYBER WARS
Three Earthlike planets identified by Cornell astronomers

Some Stars Capture Rogue Planets

ALMA Reveals Workings of Nearby Planetary System

UF-led team uses new observatory to characterize low-mass planets orbiting nearby star

CYBER WARS
French firm eyes Brazil's naval expansion

China and Russia hold first navy exercises

Taiwan plans to buy four warships from US: report

DCNS, Brazil firm partner for submarines

CYBER WARS
Opportunity's Eighth Anniversary View From Greeley Haven

Studies of 'Amboy' Rock Continue as Solar Energy Improves

New form of Mars lava flow dicovered

100 Days and Counting to NASA's Curiosity Mars Rover Landing




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement