The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Background/Objectives: Botnet is used to increase congestion over DNS. The botmasters can establish a network between client and server to generate more queries to increase traffic via HTTP1. Thus, this paper used DPI approach to control botnet activities. Methods/Statistical Analysis: Deep Packet Inspection (DPI) is implemented to spot the bots behaviour and it reduced by assist of DNS packet load. DPI method cleans illegitimate entry towards DNS before bots try to enter. So, DPI method can able to suggest previous information about the Command and Control (CC) activities to reduce its performance. Findings: Monitoring the traffic over DNS and reducing the illegal connection from compromised host (botnet) using DPI were obtained in this study. Applications: Data secure can be created in Defence area, government sectors and private concerns.

Keywords

Botnet Avoidance, Botnet Communication, Botnet Propagation, Deep Packet Inspection (DPI), Tracking Botnet
User