Detecting A Botnet By Reverse Engineering

Botnet malware is a malicious program. Botnet that infects computers, called bots, will be controlled by a botmaster to do various things such as: spamming, phishing, keylogging Distributed Denial of Service (DDoS) and other activities that are generally profitable to the owner of the bot (bot...

Full description

Bibliographic Details
Main Authors: Kelana, Oesman Hendra, Mustofa, Khabib
Format: Article
Language:English
Published: Indonesian Computer, Electronics and Instrument Support Society 2011
Subjects:
Online Access:https://repository.ugm.ac.id/33141/1/1812
_version_ 1797020231259914240
author Kelana, Oesman Hendra
Mustofa, Khabib
author_facet Kelana, Oesman Hendra
Mustofa, Khabib
author_sort Kelana, Oesman Hendra
collection UGM
description Botnet malware is a malicious program. Botnet that infects computers, called bots, will be controlled by a botmaster to do various things such as: spamming, phishing, keylogging Distributed Denial of Service (DDoS) and other activities that are generally profitable to the owner of the bot (botmaster) or those who use botnet services. The problem is that many computers have been controlled by botnets without the knowledge of the computer owner. There are many ways to examine botnets, for example by studying the traffic from the botnet network, studying how botnets communicate to each, studying how each robot receives orders to do something, and so forth. Of the many methods, the most frequently and commonly used is the reverse engineering, where researchers study how a botnet works by botnet debugging. In this study the author tries to understand or research botnets by taking a type of botnet, namely Agobot, using reverse engineering. One of the result of the research is that malware program files in general and in particular botnet has a technique to obscure the way that research using reverse engineering. Another result also shows that the botnet Agobot runs on computers by using the Windows service, and by changing the Windows registry so that every time the computer starts, Agobot always actively works in the computer memory.
first_indexed 2024-03-05T23:20:15Z
format Article
id oai:generic.eprints.org:33141
institution Universiti Gadjah Mada
language English
last_indexed 2024-03-13T19:12:50Z
publishDate 2011
publisher Indonesian Computer, Electronics and Instrument Support Society
record_format dspace
spelling oai:generic.eprints.org:331412014-07-04T07:41:08Z https://repository.ugm.ac.id/33141/ Detecting A Botnet By Reverse Engineering Kelana, Oesman Hendra Mustofa, Khabib Cybernetics Botnet malware is a malicious program. Botnet that infects computers, called bots, will be controlled by a botmaster to do various things such as: spamming, phishing, keylogging Distributed Denial of Service (DDoS) and other activities that are generally profitable to the owner of the bot (botmaster) or those who use botnet services. The problem is that many computers have been controlled by botnets without the knowledge of the computer owner. There are many ways to examine botnets, for example by studying the traffic from the botnet network, studying how botnets communicate to each, studying how each robot receives orders to do something, and so forth. Of the many methods, the most frequently and commonly used is the reverse engineering, where researchers study how a botnet works by botnet debugging. In this study the author tries to understand or research botnets by taking a type of botnet, namely Agobot, using reverse engineering. One of the result of the research is that malware program files in general and in particular botnet has a technique to obscure the way that research using reverse engineering. Another result also shows that the botnet Agobot runs on computers by using the Windows service, and by changing the Windows registry so that every time the computer starts, Agobot always actively works in the computer memory. Indonesian Computer, Electronics and Instrument Support Society 2011-01 Article PeerReviewed application/pdf en https://repository.ugm.ac.id/33141/1/1812 Kelana, Oesman Hendra and Mustofa, Khabib (2011) Detecting A Botnet By Reverse Engineering. IJCCS, 5 (1). pp. 63-73. ISSN 1978-1520 http://journal.ugm.ac.id/index.php/ijccs/index
spellingShingle Cybernetics
Kelana, Oesman Hendra
Mustofa, Khabib
Detecting A Botnet By Reverse Engineering
title Detecting A Botnet By Reverse Engineering
title_full Detecting A Botnet By Reverse Engineering
title_fullStr Detecting A Botnet By Reverse Engineering
title_full_unstemmed Detecting A Botnet By Reverse Engineering
title_short Detecting A Botnet By Reverse Engineering
title_sort detecting a botnet by reverse engineering
topic Cybernetics
url https://repository.ugm.ac.id/33141/1/1812
work_keys_str_mv AT kelanaoesmanhendra detectingabotnetbyreverseengineering
AT mustofakhabib detectingabotnetbyreverseengineering