0% found this document useful (0 votes)
83 views8 pages

CCC CC CCC CC: A Project Report ON

This project report describes the design and implementation of an advanced hybrid peer-to-peer botnet. It begins with an introduction that outlines the motivation and advantages of this botnet design over existing centralized botnet architectures. The report then covers system analysis, including requirements, and design aspects such as UML diagrams and data flow diagrams. Modules and implementation methodology are also discussed at a high level. In summary, the report outlines the development of an advanced p2p botnet and analyzes its design improvements over traditional botnets.

Uploaded by

Aravindrockz No
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views8 pages

CCC CC CCC CC: A Project Report ON

This project report describes the design and implementation of an advanced hybrid peer-to-peer botnet. It begins with an introduction that outlines the motivation and advantages of this botnet design over existing centralized botnet architectures. The report then covers system analysis, including requirements, and design aspects such as UML diagrams and data flow diagrams. Modules and implementation methodology are also discussed at a high level. In summary, the report outlines the development of an advanced p2p botnet and analyzes its design improvements over traditional botnets.

Uploaded by

Aravindrockz No
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

c

A
PROJECT REPORT
ON
ccc
cc
c  c c
  c c c
cccccc ccc!ccc"c
Of
MASTER OF TECHNOLOGY
In
INFORMATION SECURITY AND COMPUTER FORENSICS
By
 c
 c#$%&'($''')*c
c

Under the guidance of


+,c- - .   c+,/c
# , /ccc c0"1*c
c

c
c
01cc ""c2c0"1c
cc c0"1c

+c3 1/c
+c"/c.45)'&6'&c
.0c 0/ccc
c6'$$c
  cc7
 7  c
Certified that this thesis entitled 8 ccc
cc
c  c
c  c c 9 submitted for the degree of MASTER
OF TECHNOLOGY in Information Security and Computer Forensics is the
bonafide work of +,  c 
 c #
"c :c $%&'($''')* Faculty of
Engineering and Technology, SRM University, Kattankulathur, Chennai who carried out
the thesis under our supervision. Certified further, that to the best of our knowledge the
work reported herein does not form part of any other thesis or dissertation on the basic of
which a degree or awarded was conjured on an earlier occasion on this or any other
candidates.
c

Mr.S.RAJENDRAN Mr. VIVEKANANDAN


PROFESSOR ASST.PROFESSOR
 c c c 
+ c c 
 ;c  c
Dept of Information Technology Dept of Information Technology
SRM UNIVERSITY SRM UNIVERSITYc
c

c
c
c
c
c

 ;c < + 
c c c <
 ;c < + 
c
c
c
c
c
ccccccccccccccccccccccccccccccccccccc 7;
 c

I here by state that the thesis submitted for the degree of

+ 
c c 7;c c

c01cc7c  0 c

On

ccc
cc
c  c c  c c c

is my original work and that it has not previously formed the basis

for the award of any Degree, Diploma, Associateship, Fellowship

or any other similar title

BINEETH PRASAD

c
c
c
c
c
c
c
ccc 7.=;  + c
c
I acknowledge with great gratitude to all those who helped me to make this project a

great success. At the very outset, I express my thanks to the   


who has

blessed me with a healthy constitution and has bestowed upon me the required skill to

pursue this High Tech Course.

Our reverential regards and profound sense of gratitude to our beloved Chairmanc

Prof.P.Sathyanarayananc for his commendable support in the achievement of this project

with success. I am privileged to spell our thanks to our dynamic Director ccccccc

Dr.P.K.A.Muniswarancfor his constant support towards this project.

I also convey my immense gratitude to Prof. S. Rajendran, Head of the Department of

Information Technology, SRM UNIVERSITY, Kattankulathur for having given me

constant inspiration and suggestions throughout the project work.

I express our sincere gratitude to our Project Coordinator Mr. A. Arokiaraj Jovith for his

guidance and support throughout the project.

I am deeply indebted to my beloved Assistant ProfessorcMr. Vivekanandan,cDepartment

of Information Technology and Engineering, for his valuable guidance throughout the

course of this study.

I can hardly find words to express my deep appreciation of the help and warm

encouragement that I received from my parents, because without their sacrificial help, I

could not have dream of completing my project successfully.

I am also thankful to all the faculty members of the SRM University, Kattankulathur, for

their blessings and encouragement.


; cc " c

"cc c c c c c c c c ccccccc"c,c

3.1 Architecture Design 13

3.3.1 Sequence diagram 14

3.3.2 Collaboration diagram 15

3.3.3 Activity diagram 16

3.3.4 Class diagram 18

3.3.5 Data Flow diagram 19


; cc 3 c
c
c
c
C&C Command and Control

IRC Internet Relay Chat

ISP Internet Service Protocol

P2P Peer-to-Peer

IP Internet Protocol

DOS Denial-of-Service

JDK Java Development tool Kit

c
c
c
c
c
c
c
c
c
c
c

7c

A botnet consists of a network of compromised computers controlled by an

attacker often called botmaster. Recently, botnets have become the root cause of many

Internet attacks. To be well-prepared for future attacks, it is not only study how to detect

and defend against the botnets that have appeared in the past. More importantly, we

should study advanced botnet designs that could be developed by botmasters in the near

future. In this project, we construct an advanced hybrid peer to peer botnet. Most botnets

that have appeared until now have had a common centralized architecture. That is, bots in

the botnet connect directly to some special hosts (called command-and-control servers, or

C&C servers). These C&C servers receive commands from their botmaster and forward

them to the other bots in the network. From now on we will call a botnet with such a

control communication architecture a C&C botnet. As botnet-based attacks become

popular and dangerous, security researchers have studied how to detect, monitor, and

defend against them. Most of the current research has focused upon the C&C botnets that

have appeared in the past. It is necessary to conduct such research in order to deal with

the threat we are facing today. However, it is equally important to conduct research on

advanced botnet designs that could be developed by attackers in the near future.

Otherwise, we will remain susceptible to the next generation of internet malware attacks.

This design has more advantages than the existing botnets. This project also explains how

the honeypot are used to defend this design.


 ; c c7 c
c
c "c
c
ðc ACKNOWLEDGEMENT ............................................................................... iv

ðc LIST OF FIGURES ........................................................................................ v

ðc LIST OF ABBREVATIONS .......................................................................... vi

ðc ABSTRACT .................................................................................................... vii

CHAPTER

I.c INTRODUCTION
1.1 Introduction ..................................................................................... «1
1.2 Literature Review« ......................................................................... «3
1.3 Outline of the thesis ......................................................................... «6

II.c SYSTEM ANALYSIS


2.1 System Analysis ............................................................................... «7
2.1.1 Existing System........................................................................ «7
2.1.2 Proposed System ..................................................................... «8
2.3 System Requirement«««««««««««««««««.. ««..9
2.4 Application Development in Java ...................................................... ..10

III.c DESIGN ARCHITECTURE


3.1 System Design ................................................................................ ..12
3.2 Architectural Design ........................................................................ ..12
3.3 UML Diagrams ............................................................................... ..14
3.4. Data Flow Diagrams«««««««««««««««««««..19

IV.c IMPLEMENTATION METHODOLOGY


4.1 Modules Explanations ...................................................................... .20
4.2 Introduction to JavaFX ..................................................................... .21
4.3 Testing ............................................................................................. .23

V.c CONCLUSION
6.1 Conclusion ...................................................................................... .25
6.2 Future Enhancements ...................................................................... .25

BIBLIOGRAPHY
APPENDIX A
APPENDIX B c

You might also like