Detecting A Botnet By Reverse Engineering
 https://doi.org/10.22146/ijccs.2008
  https://doi.org/10.22146/ijccs.2008        Oesman Hendra Kelana(1*), Khabib Mustofa(2)
(1) 
(2) 
(*) Corresponding Author
Abstract
Abstract— Botnet malware is a malicious program. Botnet that infects computers, called bots, will be controlled by a botmaster to do various things such as: spamming, phishing, keylogging Distributed Denial of Service (DDoS) and other activities that are generally profitable to the owner of the bot (botmaster) or those who use botnet services. The problem is that many computers have been controlled by botnets without the knowledge of the computer owner. There are many ways to examine botnets, for example by studying the traffic from the botnet network, studying how botnets communicate to each, studying how each robot receives orders to do something, and so forth. Of the many methods, the most frequently and commonly used is the reverse engineering, where researchers study how a botnet works by botnet debugging.
In this study the author tries to understand or research botnets by taking a type of botnet, namely Agobot, using reverse engineering. One of the result of the research is that malware program files in general and in particular botnet has a technique to obscure the way that research using reverse engineering.
Another result also shows that the botnet Agobot runs on computers by using the Windows service, and by changing the Windows registry so that every time the computer starts, Agobot always actively works in the computer memory.
Full Text:
PDF DOI: https://doi.org/10.22146/ijccs.2008
  DOI: https://doi.org/10.22146/ijccs.2008																				
Article Metrics
 Abstract views : 3229
                         |
 Abstract views : 3229
                         |  views : 3344
 views : 3344
        Refbacks
- There are currently no refbacks.
Copyright (c) 2013 IJCCS - Indonesian Journal of Computing and Cybernetics Systems

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
View My Stats1
 





 * Corresponding Author
* Corresponding Author
											 
  
  
  
  
  
 


 
				 Hide
 
							Hide
						 Show all
							Show all
						