By Topic

Using Network Forensics and Artificial Intelligence Techniques to Detect Bot-nets on an Organizational Network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Vural, I. ; Univ. of Pretoria, Pretoria, South Africa ; Venter, H.S.

Malicious software often infects a corporate network by exploiting security holes in web browsers to infiltrate a PC when its user visits a dodgy website. Compromised machines can then be linked up to form “Bot-nets” under external control, which are used to send spam e-mails or disable websites with a flood of bogus requests. This Paper looks at identity concealment techniques and Bot-net characteristics followed by an introduction to the concept of network forensics. The paper then proposes the use of computational intelligence techniques to detect Bot-nets. We then simulate anomaly detection in the next section followed by an interpretation of the simulated results in the following section. Followed by a section describing future work, the paper then concludes by discussing how the system would be tested on an organizational network.

Published in:

Information Technology: New Generations (ITNG), 2010 Seventh International Conference on

Date of Conference:

12-14 April 2010