Android Malware And Botnet Analysis

Great Essays
Android Malware and Botnets
Malware in differing forms has been present since computers were first invented. One of the most interesting kinds of malware is that which takes control of a computer and reports back to the malicious actor that infected the computer. The malware allows an attacker to use the infected computer, effectively making the computer a bot. Normally, these bots are part of a network of infected computers known as a botnet. The attacker in control of a botnet can use it for a variety of purposes. One of the most common uses for a botnet is to perform distributed denial of service attacks (DDoS), where the bots send massive amounts of web traffic to a single website and attempt to bring it down. Botnets can also be used to
…show more content…
Specifically, I used the Jet Brains PyCharm IDE for development (PyCharm: Download Latest, 2016). I chose this due to its error checking of code and debugging capabilities. As already explained, initially the command and control server was to use sockets to communicate with clients. This did not pan out. Instead, I utilized the “http.server” library in python (http.server--HTTP Servers, 2016). The class to handle HTTP requests was only a few lines of code which could easily be expanded to fit my needs. I focused mainly on the “do_post” function, as all requests were done via POST in HTTP. In addition to the communications, the command and control server would also need to keep track of clients and take command input from the user running the server. To handle commands, I created a simple while loop that prompts for input until the “exit” command is given. Behind this, I also created a list of valid commands to check for. To keep track of clients I utilized a dictionary of key value pairs (Data Structures, 2016). The key would need to be unique to each individual device. UUIDs fit the bill here, so each device was identified by a UUID (Leach, Mealling, & Salz, 2005). The value in the dictionary had to be customized to store data for a client. Therefore, I created a class that could hold a variety of information regarding the client. The next step was to create the handlers for each command. I created a “connect” URL that clients visited the first time they connected to the botnet, a “checkin” URL that they check in to every 30 seconds, and a “fileupload” URL where the client sends a file and metadata to the server. After figuring out the communication methods, I determined simple commands that could be run. These will be listed in the results section. The next step was to implement timers to see when the client last checked in. On the

Related Documents

  • Decent Essays

    SYSTEM IMPLEMENTATION: At some fixed interval the PC Master sends request to the Wireless sensor node through the sub master for Data collection. The request send by the PC Master is in the form of frames. The frame which is transmitted by PC master will contain both the sub master id & the wireless sensor node id from where the data should be retrieved. The sub master receives the frame is then check for the wireless sensor node id…

    • 358 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    2) Network traffic shows that hundreds of hosts are constantly sending only SYN packets to a single Web server on campus. a. This type of traffic suggests a SYN flood attack, which according to Techtarget (http://searchsecurity.techtarget.com/definition/SYN-flooding) is when half-open connections are attempted by the user only sending SYN packets. The server will respond with SYN/ACK packets (on open ports), but the client ignores them and re-sends SYN packets. This means the server cannot handle legitimate traffic when needed. Similar to #1 above, IDS and IPS devices can detect all of this traffic and an IPS can drop the packets before they get to the target server after the pattern is recognized as an attack.…

    • 1074 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In 2014 hosts downloaded malware every 6 minutes In 2014 hosts accessed a malicious site every 24 seconds Corporate Data at Risk When mobile security is weak, it can provide attackers with personal information, passwords, business and personal email, corporate documents, and access to company networks and applications. In the business setting, that concern becomes magnified. In fact, 87 percent of IT professionals say careless employees are a greater threat to security than cybercriminals. And, 92 percent say employee behaviors could have made a difference in preventing high-profile security…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The DPM uses packet redirection to send the malware to the Bot Trap, where several techniques will be used to attempt near real-time remediation of the compromised host. If the Bot Trap cannot remediate the threat, security application will activate its countermeasure manager to remove the malicious software from the infected device. 2. Resource Abuse If a bot is able to establish…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    We live in the modern time where new technology got develop every day to make life become easier for people. Hundreds of years ago, no one would ever imagine that a thing like “the internet” would be invented. Without a doubt, the internet was one of the best intervention that has ever got invented. Not only that the internet has the life of more than most other creations; but it is also the fundamental part in every aspect of life especially in business, education and entertainment. In the article “Is Google Making Us Stupid?”…

    • 673 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    • Malicious process monitoring: We could make use of a tool like a windows registry accesses which helps tracks all the malicious programs trying to access the system. Such a tool on the dashboard greatly benefits the user since they can try keep the system safe without any external threats entering the system without notifying the user. The real time updating of the tool in this case will be easier because the user needs to only notified of programs that require them to look at the program as fast as they can. o Requires attention: The sub-point inside this metric could be a metric that can be called Requires Immediate attention. Not all the malicious software trying to access the system are of level 10 danger.…

    • 1042 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    A good way to build a loosely coupled system is as a decentralized system. That is, each computing node is by default independent of all the others. Each computing node contains the whole application and work s even if there is no communication whatsoever between nodes. The system is then extended so that each node can use information from other nodes when it is available. Two important parts of such a design are the split protocol a nd the merge protocol.…

    • 134 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Denial-Of-Service Attack

    • 756 Words
    • 4 Pages

    “Denial-of-Service attacks are the cyber equivalent of vandalism. Rather than seek to break into the target system, the perpetrator simply wishes to render the target system unusable” (Easttom, Taylor, 2011). This type of cybercrime prevents the end users from attaining the resource accessibility. Denial-of-Service is also known as a DOS. An attack was launched in Santa Cruz County website in California that caused “county’s government entities and programs, including Emergency Services, Law Enforcement, the Courts, Social Services, Agricultural Extension, Employment, Surplus Sales, Vendor Registration, and Construction Projects and Proposals”( U.S. Attorney’s Office,2011).…

    • 756 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Numerous virus contain a load designed to damage the system’s data, while others only spread without causing direct damage to their hosts. Computer viruses are similar to natural viruses in the way they multiply in number and in the way they need a host to survive.…

    • 1458 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    For my senior project, I decided to challenge myself by creating a computer program with the coding language Python. The main challenge presented in this project was that I had no previous coding experience and would have to essentially learn Python from scratch. After a period of research and with the help and guidance of several real-life engineers and Mr. Logsdon (the ECP advisor). I made my ultimate goal to create a digital home assistant using a Raspberry Pi. Following the steps of the engineering process, my problem was again that I still only had a very basic knowledge of computer programming.…

    • 581 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Honeypots At Bervard Case

    • 294 Words
    • 2 Pages

    A real-life example of how a honeypot can be used to a network administrator's advantage is as follows: one of the first ever honeypots was spawned in 1991 to defend against a group of Dutch hackers who attempted to break into a system at Bell Labs. The incident spanned over five months and was documented by Bell Labs employee Bill Cheswick. The intruder referred to as Berferd was monitored by Cheswick; Cheswick noted “I could buy them some time to lock down machines, build tools, and trace him. I decided that my goal was to make Berferd spend more time on the problem than I did … We wanted to watch the cracker's keystrokes, to trace him, learn his techniques, and warn his victims.…

    • 294 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Ransomware Essay

    • 1262 Words
    • 6 Pages

    Information systems permeate the fabric of everyday life. Families use them to remain in touch, organize their lives, and store memories. Multibillion dollar businesses use them to store critical data, increase efficiency, and maximize profits. They exist on cell phones, laptops, ATMs, televisions, servers, and more. A vast amount of data is gathered, stored, and processed from millions of devices worldwide to influence commerce and advise governments.…

    • 1262 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    I took the fundamentals in operating systems at CUNY and during my military IT training in Cisco network fundamentals, Cisco routing protocols, and network administration I became familiar and comfortable in taking the course.…

    • 279 Words
    • 2 Pages
    Decent Essays