Computer Network Operations Command and Control: A New Perspective

2009 ◽  
Author(s):  
Shane M. Connary
Author(s):  
S.Nagendra Prabhu ◽  
D.Shanthi

Among the various forms of malware, Botnet is the serious threat which occurs commonly in today’s cyber attacks and cyber crimes. Botnet are designed to perform predefined functions in an automated fashion, where these malicious activities ranges from online searching of data, accessing lists, moving files sharing channel information to DDoS attacks against critical targets, phishing, click fraud etc. Existence of command and control(C&C) infrastructure makes the functioning of Botnet unique; in turn throws challenges in the mitigation of Botnet attacks. Hence Botnet detection has been an interesting research topic related to cyber-threat and cyber-crime prevention in network security. Various types of techniques and approaches have been proposed for detection, mitigation and preventation to Botnet attack. Here I discusses in detail about Botnet and related research including Botnet evolution, life-cycle, command and control models, communication protocols, Botnet detection, and Botnet mitigation mechanism etc. Also an overview of research on Botnets which describe the possible attacks performed by various types of Botnet communication technologies in future. KEYWORDS— Bot; Botnet; C&C mechanism; communication protocols; honeynet; passive traffic; attacks; defense; preventaation; mitigation


Author(s):  
James W. Gualtieri ◽  
William C. Elm

There has been a growing need for military decision-makers to maintain the integrity of the information contained within their computer network. Tools to support Information Assurance and Computer Network Defense (IA-CND) are needed to defend their information infrastructure and conduct Computer Network Operations with a new level of insight and understanding. This paper describes one effort to develop visualizations to aid these decision-makers in the highly abstract, complex and dynamic mission of IA-CND. This paper describes the development of a IA-CND Communications Display. Using a Cognitive Systems Engineering methodology, this project transitioned from a broad description of a work domain, to the development of decision aiding concepts for a particular portion of that domain. This methodology also provided a means to develop breakthrough support for a decision difficult domain.


2007 ◽  
Vol 30 (13) ◽  
pp. 2649-2660 ◽  
Author(s):  
Azzedine Boukerche ◽  
Renato B. Machado ◽  
Kathia R.L. Jucá ◽  
João Bosco M. Sobral ◽  
Mirela S.M.A. Notare

Sign in / Sign up

Export Citation Format

Share Document