CCC CC CCC CC: A Project Report ON
CCC CC CCC CC: A Project Report ON
A
PROJECT REPORT
ON
ccc
cc
c c c
c
c c
cccccc ccc!ccc"c
Of
MASTER OF TECHNOLOGY
In
INFORMATION SECURITY AND COMPUTER FORENSICS
By
c
c#$%&'($''')*c
c
c
c
01cc ""c2c0"1c
cc
c0"1c
+c3 1/c
+c"/c.45)'&6'&c
.0c 0/ccc
c6'$$c
cc7
7 c
Certified that this thesis entitled 8 ccc
cc
c c
c c
c 9 submitted for the degree of MASTER
OF TECHNOLOGY in Information Security and Computer Forensics is the
bonafide work of +,
c
c #
"c :c $%&'($''')* Faculty of
Engineering and Technology, SRM University, Kattankulathur, Chennai who carried out
the thesis under our supervision. Certified further, that to the best of our knowledge the
work reported herein does not form part of any other thesis or dissertation on the basic of
which a degree or awarded was conjured on an earlier occasion on this or any other
candidates.
c
c
c
c
c
c
;c < +
c c c <
;c < +
c
c
c
c
c
ccccccccccccccccccccccccccccccccccccc 7;
c
+
cc 7;c
c
c01cc7c 0 c
On
ccc
cc
c c c c
c c
is my original work and that it has not previously formed the basis
BINEETH PRASAD
c
c
c
c
c
c
c
ccc 7.=; + c
c
I acknowledge with great gratitude to all those who helped me to make this project a
blessed me with a healthy constitution and has bestowed upon me the required skill to
Our reverential regards and profound sense of gratitude to our beloved Chairmanc
with success. I am privileged to spell our thanks to our dynamic Director ccccccc
I express our sincere gratitude to our Project Coordinator Mr. A. Arokiaraj Jovith for his
of Information Technology and Engineering, for his valuable guidance throughout the
I can hardly find words to express my deep appreciation of the help and warm
encouragement that I received from my parents, because without their sacrificial help, I
I am also thankful to all the faculty members of the SRM University, Kattankulathur, for
P2P Peer-to-Peer
IP Internet Protocol
DOS Denial-of-Service
c
c
c
c
c
c
c
c
c
c
c
7c
attacker often called botmaster. Recently, botnets have become the root cause of many
Internet attacks. To be well-prepared for future attacks, it is not only study how to detect
and defend against the botnets that have appeared in the past. More importantly, we
should study advanced botnet designs that could be developed by botmasters in the near
future. In this project, we construct an advanced hybrid peer to peer botnet. Most botnets
that have appeared until now have had a common centralized architecture. That is, bots in
the botnet connect directly to some special hosts (called command-and-control servers, or
C&C servers). These C&C servers receive commands from their botmaster and forward
them to the other bots in the network. From now on we will call a botnet with such a
popular and dangerous, security researchers have studied how to detect, monitor, and
defend against them. Most of the current research has focused upon the C&C botnets that
have appeared in the past. It is necessary to conduct such research in order to deal with
the threat we are facing today. However, it is equally important to conduct research on
advanced botnet designs that could be developed by attackers in the near future.
Otherwise, we will remain susceptible to the next generation of internet malware attacks.
This design has more advantages than the existing botnets. This project also explains how
CHAPTER
I.c INTRODUCTION
1.1 Introduction ..................................................................................... «1
1.2 Literature Review« ......................................................................... «3
1.3 Outline of the thesis ......................................................................... «6
V.c CONCLUSION
6.1 Conclusion ...................................................................................... .25
6.2 Future Enhancements ...................................................................... .25
BIBLIOGRAPHY
APPENDIX A
APPENDIX B c