An Empirical Study of HTTP-based Financial Botnets


Cyber criminals are covertly attacking essential infrastructures, and botnets are a typical part of these attacks. In recent years, botnets are shifting their focus from broad-based mostly attacks to more targeted ones such as attacking monetary institutions, particularly banks. The first reason for this shift towards money institutions is that, where the money is. We tend to present an empirical study of the components, features and operations of a number of the most widely deployed HTTP-primarily based financial botnets (such as Zeus, SpyEye, ICE 1X, Citadel, Carberp, Tinba, Bugat and Shylock). Our study provides important insights into the planning of those botnets and should facilitate the safety community to get intelligence and develop a lot of robust security solutions to defend against cyber attacks by these botnets. Additionally, our comparative analysis of insidious techniques per Command and Control (C&C) communication, system exploitation and knowledge exfiltration additionally provides a good and a holistic read of the capabilities of HTTP-based mostly financial botnets. This study additionally highlights the evolution of varied HTTP-based mostly monetary botnets over a period of your time. Finally, we tend to discuss security solutions which will facilitate mitigate a number of the techniques employed by HTTP-based mostly financial botnets.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :Beyond Empirical Models: Pattern Formation Driven Placement of UAV Base Stations - 2018ABSTRACT:This Project considers the location of unmanned aerial vehicle base stations (UAV-BSs) with criterion of minimum UAV-recall-frequency
PROJECT TITLE :Empirical Study of Face Authentication Systems Under OSNFD Attacks - 2018ABSTRACT:Face authentication has been widely available on smartphones, tablets, and laptops. As various personal pictures are published in
PROJECT TITLE :Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis - 2018ABSTRACT:With the proliferation of internet sites, the protection level of password-protected accounts is now not purely determined
PROJECT TITLE :Implementation of Empirical Mode Decomposition Based Algorithm for Shunt Active Filter - 2017ABSTRACT:In this paper, an on-line empirical mode decomposition (EMD) based mostly algorithm is proposed for the management
PROJECT TITLE : Empirical Analysis and Validation of Security Alerts Filtering Techniques - 2017 ABSTRACT: System directors address security incidents through a variety of monitors, like intrusion detection systems, event logs,

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry