Browse > Article
http://dx.doi.org/10.7236/JIIBC.2013.13.2.199

Detection and Prevention Method by Analyzing Malignant Code of Malignant Bot  

Kim, Soeui (Dept. of Computer & Information Communications Engineering, Hongik University)
Choi, Duri (Dept. of Computer & Information Communications Engineering, Hongik University)
An, Beongku (Dept. of Computer & Information Communications Engineering, Hongik University)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.13, no.2, 2013 , pp. 199-207 More about this Journal
Abstract
Recently, hacking is seen as a criminal activity beyond an activity associated with curiosity in the beginning. The malignant bot which is used as an attack technique is one of the examples. Malignant Bot is one of IRC Bots and it leaks user's information with attacker's command by attacking specified IP range. This paper will discuss an access method and a movement process by analyzing shadowbot which is a kind of a malignant Bot and will suggest possible countermeasure. This study has two distinct features. First, we analyze malignant Bot by analyzing tools such as VM ware. Second, we formulate a hypothesis and will suggest possible countermeasure through analyzing malignant Bot's access method and movement. Performance evaluation will be conducted by applying possible countermeasure to see if it can prevent attacks from malignant bot.
Keywords
Malware; Malicious code; Malicious bot; Shadowbot;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Won Hyung Park, Kyeong Cheol Yang, Dong Hwi Lee, KuiNam J Kim, "Study on Improved Detection Rule Formation via Information Leakage Malware Analysis," Journal of Information Security, vol.8, no.4, pp.1-8, December 2008.   과학기술학회마을
2 http://edyui.blog.me/50117648095
3 http://blog.daum.net/ruhi81temotu/232
4 http://www.hanb.co.kr/network/view.html?bi_id=645
5 J. Jim, "BotNets: Detection and Mitigation," http://www.fedcirc.gov/library/documents/botNetsv32.doc, 2003.
6 http://www.krcert.or.kr (KISA)
7 R. Puri, "Bots & Botnet: An Overview," http://www.sans.org/rr/papers/36/1299.pdf, 2003.
8 R. A. Grimes, "Malicious Mobile Code," O'REILLY, ISBN 1-56592-682-X, 2001.
9 Won Gyu Lim, Jung Hyun Lee, Su Jin Lim, Won Hyung Park, Kwang Ho Kook, "A Study on Detection and Responding Technology through Window Malware Analysis," Journal of Information Security, vol.10, no.1, pp.20-24, March 2010. 2
10 Won Gyu Lim, Geon II Heo, Won Hyung Park, Kwang-Ho Kook, "Malware Analysis and Policy Counterplan Against a Transformation of HTTP Header Information," Journal of Information Security, vol.10, no.2, pp.46-49, June 2010.   과학기술학회마을