Analysis of a “/0” Stealth Scan From a Botnet


Botnets are the foremost common vehicle of cyber-criminal activity. They're used for spamming, phishing, denial-of-service attacks, brute-force cracking, stealing non-public data, and cyber warfare. Botnets do network scans for several reasons, including searching for vulnerable machines to infect and recruit into the botnet, probing networks for enumeration or penetration, etc. We tend to present the measurement and analysis of a horizontal scan of the complete IPv4 address area conducted by the Sality botnet in February 201one. This 12-day scan originated from approximately 3 million distinct IP addresses and used a heavily coordinated and unusually covert scanning strategy to attempt to get and compromise VoIP-related (SIP server) infrastructure. We tend to observed this event through the UCSD Network Telescope, a /8 darknet continuously receiving massive amounts of unsolicited traffic, and we tend to correlate this traffic data with other public sources of information to validate our inferences. Sality is one in every of the biggest botnets ever identified by researchers. Its behavior represents ominous advances within the evolution of modern malware: the employment of additional subtle stealth scanning strategies by several coordinated bots, targeting essential voice Communications infrastructure. This paper offers a detailed dissection of the botnet's scanning behavior, as well as general methods to correlate, visualize, and extrapolate botnet behavior across the world Internet.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Performance Analysis and Optimization of Cache-Assisted CoMP for Clustered D2D Networks ABSTRACT: Two promising strategies for supporting massive content delivery over wireless networks while mitigating the effects
PROJECT TITLE : Measurement Errors in Range-Based Localization Algorithms for UAVs: Analysis and Experimentation ABSTRACT: The ability to precisely locate ground devices (GDs) is essential for a wide range of different applications,
PROJECT TITLE : Tensor Canonical Correlation Analysis Networks for Multi-view Remote Sensing Scene Recognition ABSTRACT: It has been demonstrated that using a convolutional neural network, also known as CNN, is an efficient method
PROJECT TITLE : Traffic Anomaly Detection in Wireless Sensor Networks Based on Principal Component Analysis and Deep Convolution Neural Network ABSTRACT: Because of the proliferation of wireless networks, wireless sensor networks
PROJECT TITLE : STAR-RIS Integrated Nonorthogonal Multiple Access and Over-the-Air Federated Learning Framework, Analysis, and Optimization ABSTRACT: In this paper, nonorthogonal multiple access (NOMA) and over-the-air federated

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry