StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Command and Control Server for Forwarding Data - Research Paper Example

Cite this document
Summary
The paper describes a wide number of distinct system connections of protocols are controlled by botnets. These include HTTP, IM, IRC and P2P protocols. These procedures help in communication or avail the source of the botnet and as well as the software equipment that can be utilized in the botnet…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
The Command and Control Server for Forwarding Data
Read Text Preview

Extract of sample "The Command and Control Server for Forwarding Data"

? Presented by (Your school) Research on Botnets The expression bot is the diminutive for the word robot, which is also commonly known as a zombie. Attackers usually dispense malevolent malware; targeting various computers through the internet, this malware eventually turns the affected computers into a robot ‘bot’ as a result, they tend to perform programmed or robotic errands without the knowledge of the owners. Usually, attackers utilize bots as a means to contaminate huge numbers of personal computers, which eventually form a large network, which is known as a botnet (Craig 2007). Botnets are more often used by attackers to multiply viruses on networks, to hit servers and computers and even to commit various criminal acts. Once a computer falls into the bonet, it tends to perform in a slower manner (Leigh 2006). Protocols and Systems that Attackers use today to Control and Update Botnets Communication Protocols of Botnets. A wide number of distinct system connections of protocols are controlled by botnets. These include HTTP, IM, IRC and P2P protocols. These procedures help in communication or avail the source of the botnet and as well as the software equipments that can be utilized in the botnet. Control and Command Techniques (C and C). Immediately the malware of the bot enters to the affected machines, the bot controller or master takes the initiative of discovering the given network of affected machinery; this happens by a given method of communique to perform the desired procedure. A solitary and straightforward process of conveying messages amongst the affected networks and their controllers is kept by powering an express communication connection. On the other hand, this nonstop connection is able to position the bot controller with much ease, hence that method of sending messages is neglected so much. In their place, a number of well thought-out control words as well as systematized procedure known as C and C (Command and Control) techniques are made to make the botnets active distantly. The contact connecting the C and C machinery and bots appears to be the feeblest linkage within the bonet but without it, the prey obscure doesn’t perform like a harmonized system (Song 2010). The two various categories of C and C used by attackers to control and update bonnets today include; Control technique and Centralized Command With the C and C method, it makes use of a high and essential bandwidth horde known as the Command and Control server for forwarding data among a variety of affected computers. The given Command and Control server in the specified botnet could be a negotiated machine which manages a given set of the services of the network like HTTP and IRC, and many more, further more, it assembles the instructions given from the bot controller or master to every horde within that botnet which connect the Command and Control server canal. The Botnets make use of a variety of devices to defend their connections. This involves the utilization of protected passwords which are made by the bot controllers. The centralized Command and Control server is mainly the principal Command and Control technique. Nowadays, the majority of attackers use the centralized Command and Control, due to its capability of great productivity and it’s simply reachable (Husain 2008). Peer 2 Peer Command and Control (C and C) Technique The peer to peer Command and Control system makes use of a Peer to Peer communication without a specific mid server to frontward the packet messages in between the botnets, this is as a result making the P2P technique more tough to any breakdown within the given system. However, this classification is fairly rough to establish as well as terminate, even though one or more bots may be disengaged, it has no effect upon the functioning within a bonnet (Brian 2008). Q. 2 Secured Evidence of 3-DES and RSA 3-DES and RSA are mutually convention procedures which are applied in the encryption of data. Workstation set-ups function within such a manner that, data packets have to voyage through various nodes and message associations which as a result makes it firm from hacking or attacks, whereby a user with bad motives cannot scrutinize or may not be in position to copy the accumulated information which of course contains crucial data. There is no way of protecting the data packets contained in the data store, the only method is to encrypt it, and this is usually accomplished through coding technique. The coded information journeying through a protected canal creates dependable scheme (Husain 2008). Times gone by in the networks operations, a lot of hard work have been applied forth in order to find an encoding system that can’t be hacked or which is unconquerable in the specified system, the organism which commonly comprises of the hardware at hand. Before long capacity of this hardware increases, as a result, the coding system which was seen as overwhelming hack turns out to be unsafe. There are various Coding systems amongst which include; RSA with 3-DES. They are equally used as encryption methods for coding of data 3-DES which in full means Data Encryption Standard (DES) is a phenomenon of coding of information. When it first begun, it enclosed fifty six peck information that of course was not sufficient. But in order to keep away vigorous assaults by thugs, in recent times, 3-DES has one hundred and ninety two small pieces of storage room, together with the correspondence fragments (Brian 2008). Secured Evidence of 3-DES and RSA is as follows; Differential The very first distinguished proof that was discovered exterior of world’s brainpower organization was identified as the Differential, this cryptanalysis, was the foremost system that permitted a speedy assault on the 3-DES. Although very similar to linear, here an obsequious feature is constructed, which envelops a number of encompassing by means of manipulating various entities for an assortment of boxes, after which, it combines them. The main aim is to locate a circumstance for some simple wording, and their corresponding encryption codes, the amount produced obtains a quantity of scrupulous worth (Craig 2007). Linear Another cryptanalysis technique that allowed an attack on the 3-DES was identified as the linear. With this cryptanalysis, a quantity of selected secret codes which was required evidenced that the exploration was very practical. The lone input feature here, the information which shall be coded is formed by an arbitrary generator a moment prior to the commencing of the coding; this is done in order to account for the supposed chronological chattels information contents. The improved attack of Davies on 3-DES This assault hypothetically permits the coding determinant to establish a uniformity of sixteen fragments of its input. The improved attack of Davies has the capability to shatter all the stated fragments of 3-DES in depth. As a result, it is known to be the 3rd victorious assault on the 3-DES, more rapid than the brute vigor. (Song 2010). Reference Brian, J., N., 2008. A Study of Peer-to-peer Botnets, New York: Utah State University. Craig, A., S., 2007. Botnets: The Killer Web App, Chicago: Syngress publishing Inc. Husain, H. 2008. Models to Combat Email Spam Botnets and Unwanted Phone Calls. New York : University of North Texas: ProQuest LLC. Song, D., Shin, R., & Shin, D., 2010. Inference and Analysis of Formal Models of Botnet Command and Control Protocols. London, Macmillan Business. Top of Form Bottom of Form Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Command and Control Server for Forwarding Data Research Paper, n.d.)
The Command and Control Server for Forwarding Data Research Paper. Retrieved from https://studentshare.org/technology/1447919-week
(The Command and Control Server for Forwarding Data Research Paper)
The Command and Control Server for Forwarding Data Research Paper. https://studentshare.org/technology/1447919-week.
“The Command and Control Server for Forwarding Data Research Paper”, n.d. https://studentshare.org/technology/1447919-week.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Command and Control Server for Forwarding Data

Multimedia Networking VoIP

This allows the system to have more advanced functions like voicemail, conferencing, call forwarding etc.... Since the birth of man, he has been moving from one age to the other, climbing up the ladder of success rung by rung.... Man has started his life by hunting for everything....
8 Pages (2000 words) Essay

Network Security and the Demilitarized Zone

'IP traceability' also becomes difficult as data packets are difficult to trace....  Tunneling is also called as port forwarding.... Port forwarding is configured for a secure channel within the medium or corporate networks.... For instance, in order to access remote desktop via port forwarding, port number 3389 and RDP service is defined in the router against the IP address of the workstation on which the service needs to be executed....
4 Pages (1000 words) Coursework

Internet as the Fastest Rising Technology

They wish to provide a location for all users to store any company data Accounts and payroll data should only be available to the relevant staff.... protect the integrity of their email and VOIP systems They need to provide access to internal data to staff working off-site.... It supports both voice and data transmission.... For example, the data packet... The implementation of software technology includes the new innovative network that will support the following: Centralized Database access for sales/customer databases Email Internet access Company Website and Intranet VOIP They intend to run a local DNS server probably on their main domain server....
9 Pages (2250 words) Essay

The Most Common Software-Defined Networks

Software defined networks (SDN) The most common software defined networks (SDN) definition revolves around splitting the data plane or the Ethernet switch forwarding hardware from its control plane or the logic involved in the packet flowing to egress from ingress.... The switching fabric of conventional Layer 2/3 networks serves as a routing and switching fabric for the blade center server chassis.... Use this demonstration using a number of servers that are to listen to the same multicast address while the switch is being programmed to allow a single server to give air play to a single client in the case of video servers....
4 Pages (1000 words) Essay

Study of protocols in a VoIP network

23 is a standard for the transmission of real-time audio, video, and data information over IP-based networks.... 23 may include IP telephony (audio only), videotelephony (audio and video), audio+ data and audio+video+data.... It primarily supports audio communications but can optionally support video or data communications.... Services like call forwarding, conference calling, voicemail, contact management and directory assistance were later added and paved the way for the creation of a new revolutionary technology - Voice over Internet Protocol or VoIP....
16 Pages (4000 words) Essay

Network Administration

n order to maintain a centralised database of products, customers, orders and related data the company requires that web services and databases should be installed at the home base only and that all customer access will be directed to the home base.... Basically I need the following underneath reworded and re-styled so it looks different....
37 Pages (9250 words) Essay

Business Proposal for the Requirements of the TEEVO Corporation

(LAN/WAN Management & Media Access control Bridges) and IEEE 802.... The paper "Business Proposal for the Requirements of the TEEVO Corporation" suggests a network set up to be created that would orchestrate the various departments and structures in the corporate settings.... Implementation of the proposed network design would accomplish a stable and secure communications system....
12 Pages (3000 words) Case Study

Network Risk Assessment

The connectivity from the router to the two data switches i.... switch connecting to the data center and the second switch connecting the access points also have no protection.... , there are no physical controls on the data center and everyone can enter without verification and authentication.... However, MacAfee EPO is installed on the server and on the workstations as well.... In this scenario, if any threat enters the network from the Internet and penetrates in the server hosting Mcafee EPO server, it will certainly corrupt the operating system and consequently, infect the EPO server as well....
5 Pages (1250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us