Wednesday, May 1, 2019

Forensics Based On Evidence Gathered With Peep Attacks Essay

Forensics Based On Evidence gather With Peep Attacks - Essay ExampleCybercrime has been cited as one of the most prevalent problems in society. The vast bulk of investigators perceive this crime to be on the rise and of bonny an ever increasingly complex and multi-faceted problem. This account attempts to clarify the complex investigation effort following a Peep set on. We describe evidence ingathering and problem-solving techniques in the application of computer forensic analyses. A Peep attack is one of the most notorious hacking tools, based on the Robot Network (Botnet) Structure. A Botnet is a term for a collection of zombi spirit systems and autonomous software robots. The threat from Botnets is growing at an alarming rate and the attack techniques are becoming increasingly sophisticated. The majority of the literature describing Botnet attacks is focused on a varied level of IRC-based malware, the activity of email mail and the structure of Distributed Denial of Servic e (DDOS). However, some Botnets are used primarily for data collection, out-of-door control or various other purposes (Microsoft Corporation, 2005). Botnets have gained a significant presence on the net income as a remote control means for malicious purposes. A Botnet can run programs under the control of a managed network infrastructure. In practice, Botnet communities usually have one or several owners and desire on individual friend-to-friend relationships for their operation (Desmond, 2005). Because new attacks originating from a Botnet are difficult to identify by failure fingerprinting., there is rarely a geographically identifiable pattern to the distribution of the infected computers. Firewalls cannot readily be configured to react to a Botnet attack by using information obtained from previous attacks. The Peep attack is still a developing technique. In this paper we introduce a digital forensic synopsis applied to the investigation of a Peep attack, and discuss some o f the resulting problems and concerns. Although differing somewhat from the original definition of IRC Botnets, a huge network of zombie computers is

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.