Reference Hub1
Successful Computer Forensics Analysis on the Cyber Attack Botnet

Successful Computer Forensics Analysis on the Cyber Attack Botnet

Kavisankar Leelasankar, Chellappan C., Sivasankar P.
ISBN13: 9781522541004|ISBN10: 1522541004|EISBN13: 9781522541011
DOI: 10.4018/978-1-5225-4100-4.ch014
Cite Chapter Cite Chapter

MLA

Leelasankar, Kavisankar, et al. "Successful Computer Forensics Analysis on the Cyber Attack Botnet." Handbook of Research on Network Forensics and Analysis Techniques, edited by Gulshan Shrivastava, et al., IGI Global, 2018, pp. 266-281. https://doi.org/10.4018/978-1-5225-4100-4.ch014

APA

Leelasankar, K., C., C., & P., S. (2018). Successful Computer Forensics Analysis on the Cyber Attack Botnet. In G. Shrivastava, P. Kumar, B. Gupta, S. Bala, & N. Dey (Eds.), Handbook of Research on Network Forensics and Analysis Techniques (pp. 266-281). IGI Global. https://doi.org/10.4018/978-1-5225-4100-4.ch014

Chicago

Leelasankar, Kavisankar, Chellappan C., and Sivasankar P. "Successful Computer Forensics Analysis on the Cyber Attack Botnet." In Handbook of Research on Network Forensics and Analysis Techniques, edited by Gulshan Shrivastava, et al., 266-281. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-4100-4.ch014

Export Reference

Mendeley
Favorite

Abstract

The success of computer forensics lies in the complete analysis of the evidence that is available. This is done by not only analyzing the evidence which is available but also searching for new concrete evidence. The evidence is obtained through the logs of the data during the cyberattack. When performing analysis of the cyberattack especially the botnet attacks, there are many challenges. First and the foremost is that it hides the identity of the mastermind, the botmaster. It issues the command to be executed using its subordinate, the command and control (C&C). The traceback of C&C itself is a complex task. Secondly, it victimizes the innocent compromised device zombies. This chapter discusses the analysis done in both proactive and reactive ways to resolve these challenges. The chapter ends by discussing the analysis to find the real mastermind to protect the innocent compromised system and to protect the victim system/organization affected by the botnet cyberattack.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.