Detecting A Botnet By Reverse Engineering
Botnet malware is a malicious program. Botnet that infects computers, called bots, will be controlled by a botmaster to do various things such as: spamming, phishing, keylogging Distributed Denial of Service (DDoS) and other activities that are generally profitable to the owner of the bot (bot...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Indonesian Computer, Electronics and Instrument Support Society
2011
|
Subjects: | |
Online Access: | https://repository.ugm.ac.id/33141/1/1812 |
_version_ | 1797020231259914240 |
---|---|
author | Kelana, Oesman Hendra Mustofa, Khabib |
author_facet | Kelana, Oesman Hendra Mustofa, Khabib |
author_sort | Kelana, Oesman Hendra |
collection | UGM |
description | Botnet malware is a malicious
program. Botnet that infects computers, called bots,
will be controlled by a botmaster to do various things
such as: spamming, phishing, keylogging Distributed
Denial of Service (DDoS) and other activities that are
generally profitable to the owner of the bot
(botmaster) or those who use botnet services. The
problem is that many computers have been controlled
by botnets without the knowledge of the computer
owner. There are many ways to examine botnets, for
example by studying the traffic from the botnet
network, studying how botnets communicate to each,
studying how each robot receives orders to do
something, and so forth. Of the many methods, the
most frequently and commonly used is the reverse
engineering, where researchers study how a botnet
works by botnet debugging.
In this study the author tries to understand or
research botnets by taking a type of botnet, namely
Agobot, using reverse engineering. One of the result
of the research is that malware program files in
general and in particular botnet has a technique to
obscure the way that research using reverse
engineering.
Another result also shows that the botnet Agobot
runs on computers by using the Windows service, and
by changing the Windows registry so that every time
the computer starts, Agobot always actively works in
the computer memory.
|
first_indexed | 2024-03-05T23:20:15Z |
format | Article |
id | oai:generic.eprints.org:33141 |
institution | Universiti Gadjah Mada |
language | English |
last_indexed | 2024-03-13T19:12:50Z |
publishDate | 2011 |
publisher | Indonesian Computer, Electronics and Instrument Support Society |
record_format | dspace |
spelling | oai:generic.eprints.org:331412014-07-04T07:41:08Z https://repository.ugm.ac.id/33141/ Detecting A Botnet By Reverse Engineering Kelana, Oesman Hendra Mustofa, Khabib Cybernetics Botnet malware is a malicious program. Botnet that infects computers, called bots, will be controlled by a botmaster to do various things such as: spamming, phishing, keylogging Distributed Denial of Service (DDoS) and other activities that are generally profitable to the owner of the bot (botmaster) or those who use botnet services. The problem is that many computers have been controlled by botnets without the knowledge of the computer owner. There are many ways to examine botnets, for example by studying the traffic from the botnet network, studying how botnets communicate to each, studying how each robot receives orders to do something, and so forth. Of the many methods, the most frequently and commonly used is the reverse engineering, where researchers study how a botnet works by botnet debugging. In this study the author tries to understand or research botnets by taking a type of botnet, namely Agobot, using reverse engineering. One of the result of the research is that malware program files in general and in particular botnet has a technique to obscure the way that research using reverse engineering. Another result also shows that the botnet Agobot runs on computers by using the Windows service, and by changing the Windows registry so that every time the computer starts, Agobot always actively works in the computer memory. Indonesian Computer, Electronics and Instrument Support Society 2011-01 Article PeerReviewed application/pdf en https://repository.ugm.ac.id/33141/1/1812 Kelana, Oesman Hendra and Mustofa, Khabib (2011) Detecting A Botnet By Reverse Engineering. IJCCS, 5 (1). pp. 63-73. ISSN 1978-1520 http://journal.ugm.ac.id/index.php/ijccs/index |
spellingShingle | Cybernetics Kelana, Oesman Hendra Mustofa, Khabib Detecting A Botnet By Reverse Engineering |
title | Detecting A Botnet By Reverse Engineering |
title_full | Detecting A Botnet By Reverse Engineering |
title_fullStr | Detecting A Botnet By Reverse Engineering |
title_full_unstemmed | Detecting A Botnet By Reverse Engineering |
title_short | Detecting A Botnet By Reverse Engineering |
title_sort | detecting a botnet by reverse engineering |
topic | Cybernetics |
url | https://repository.ugm.ac.id/33141/1/1812 |
work_keys_str_mv | AT kelanaoesmanhendra detectingabotnetbyreverseengineering AT mustofakhabib detectingabotnetbyreverseengineering |