Botnet Reverse Engineering and Call Sequence Recovery

The focus on computer security has increased due to the ubiquitous use of Internet. Criminals mistreat the anonymous and insidious traits of Internet to commit monetary online fraud, theft and extortion. Botnets are the prominent vehicle for committing online crimes. They provide platform for a botm...

Full description

Bibliographic Details
Main Author: Sinha, Prosenjit
Format: Others
Published: 2011
Online Access:http://spectrum.library.concordia.ca/7083/1/Sinha_MCompSc_S2012.pdf
Sinha, Prosenjit <http://spectrum.library.concordia.ca/view/creators/Sinha=3AProsenjit=3A=3A.html> (2011) Botnet Reverse Engineering and Call Sequence Recovery. Masters thesis, Concordia University.
id ndltd-LACETR-oai-collectionscanada.gc.ca-QMG.7083
record_format oai_dc
spelling ndltd-LACETR-oai-collectionscanada.gc.ca-QMG.70832013-10-22T03:44:36Z Botnet Reverse Engineering and Call Sequence Recovery Sinha, Prosenjit The focus on computer security has increased due to the ubiquitous use of Internet. Criminals mistreat the anonymous and insidious traits of Internet to commit monetary online fraud, theft and extortion. Botnets are the prominent vehicle for committing online crimes. They provide platform for a botmaster to control a large group of infected Internetconnected computers. Botmaster exploits this large group of connected computers to send spam, commit click fraud, install adware/spyware, flood specific network from distributed locations, host phishing sites and steal personal credentials. All these activities pose serious threat for individuals and organizations. Furthermore, the situation demands more attention since the research and the development of underground criminal industry is faster than security research industry. To cope up against the ever growing botnet threats, security researchers as well as Internet-users need cognizance on the recent trends and techniques of botnets. In this thesis, we analyze in-depth by reverse engineering two prominent botnets namely, Mariposa and Zeus. The findings of the analysis may foster the knowledge of security researchers in multiple dimensions to deal with the botnet issue.To enhance the abstraction and visualization techniques of reverse engineering, we develop a tool which is used for detailed outlook of call sequences. 2011-02-17 Thesis NonPeerReviewed application/pdf http://spectrum.library.concordia.ca/7083/1/Sinha_MCompSc_S2012.pdf Sinha, Prosenjit <http://spectrum.library.concordia.ca/view/creators/Sinha=3AProsenjit=3A=3A.html> (2011) Botnet Reverse Engineering and Call Sequence Recovery. Masters thesis, Concordia University. http://spectrum.library.concordia.ca/7083/
collection NDLTD
format Others
sources NDLTD
description The focus on computer security has increased due to the ubiquitous use of Internet. Criminals mistreat the anonymous and insidious traits of Internet to commit monetary online fraud, theft and extortion. Botnets are the prominent vehicle for committing online crimes. They provide platform for a botmaster to control a large group of infected Internetconnected computers. Botmaster exploits this large group of connected computers to send spam, commit click fraud, install adware/spyware, flood specific network from distributed locations, host phishing sites and steal personal credentials. All these activities pose serious threat for individuals and organizations. Furthermore, the situation demands more attention since the research and the development of underground criminal industry is faster than security research industry. To cope up against the ever growing botnet threats, security researchers as well as Internet-users need cognizance on the recent trends and techniques of botnets. In this thesis, we analyze in-depth by reverse engineering two prominent botnets namely, Mariposa and Zeus. The findings of the analysis may foster the knowledge of security researchers in multiple dimensions to deal with the botnet issue.To enhance the abstraction and visualization techniques of reverse engineering, we develop a tool which is used for detailed outlook of call sequences.
author Sinha, Prosenjit
spellingShingle Sinha, Prosenjit
Botnet Reverse Engineering and Call Sequence Recovery
author_facet Sinha, Prosenjit
author_sort Sinha, Prosenjit
title Botnet Reverse Engineering and Call Sequence Recovery
title_short Botnet Reverse Engineering and Call Sequence Recovery
title_full Botnet Reverse Engineering and Call Sequence Recovery
title_fullStr Botnet Reverse Engineering and Call Sequence Recovery
title_full_unstemmed Botnet Reverse Engineering and Call Sequence Recovery
title_sort botnet reverse engineering and call sequence recovery
publishDate 2011
url http://spectrum.library.concordia.ca/7083/1/Sinha_MCompSc_S2012.pdf
Sinha, Prosenjit <http://spectrum.library.concordia.ca/view/creators/Sinha=3AProsenjit=3A=3A.html> (2011) Botnet Reverse Engineering and Call Sequence Recovery. Masters thesis, Concordia University.
work_keys_str_mv AT sinhaprosenjit botnetreverseengineeringandcallsequencerecovery
_version_ 1716607062405808128