Botnet Communications against Private Cloud

Location

Poster Session 1 (Henderson Library)

Session Format

Poster Presentation

Your Campus

Statesboro Campus- Henderson Library, April 20th

Academic Unit

Department of Information Technology

Research Area Topic:

Computer Science - Computer Security

Abstract

As cloud computing and applications become pervasive, cloud security is a growing concern. Similarly, Botnets have increasingly become a security concern. The aim of this work is to examine cloud infrastructure as it applies to detection of Botnet applications. With a botnet comes a lot of computing power, which can be used to stage attacks on willing targets like company networks and web servers to judge and gauge how well security solutions perform. This allows for deeper digital security as flaws can be found and swiftly patched up. Another excellent example of such is the ‘Folding at Home’ project which allows people to contribute some of their computer’s resources towards helping understand SARS-CoV-2/COVID-19, and to help develop new therapies and drugs to help fight COVID-19. Unfortunately, though, botnets do have their malicious applications. A relatable example of this is currently ongoing in the conflict between Russia and Ukraine, where Russian hackers are using botnet(s) to put strain on official Ukrainian government servers to bring them to a stop, preventing many communication services on the Ukraine side. In this work, we aim to examine cloud technology and its defense from Botnets. We deploy VMware ESXi server as a private cloud infrastructure and configure the virtual machines hosted on our server in such a way that we can detect incoming malicious botnet communications and defend against them appropriately.

Program Description

As cloud computing and applications become pervasive, cloud security is a growing concern. Similarly, Botnets have increasingly become a security concern. The aim of this work is to examine cloud infrastructure as it applies to detection of Botnet applications.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

Presentation Type and Release Option

Presentation (File Not Available for Download)

Start Date

4-20-2022 10:00 AM

End Date

4-20-2022 11:30 AM

This document is currently not available here.

Share

COinS
 
Apr 20th, 10:00 AM Apr 20th, 11:30 AM

Botnet Communications against Private Cloud

Poster Session 1 (Henderson Library)

As cloud computing and applications become pervasive, cloud security is a growing concern. Similarly, Botnets have increasingly become a security concern. The aim of this work is to examine cloud infrastructure as it applies to detection of Botnet applications. With a botnet comes a lot of computing power, which can be used to stage attacks on willing targets like company networks and web servers to judge and gauge how well security solutions perform. This allows for deeper digital security as flaws can be found and swiftly patched up. Another excellent example of such is the ‘Folding at Home’ project which allows people to contribute some of their computer’s resources towards helping understand SARS-CoV-2/COVID-19, and to help develop new therapies and drugs to help fight COVID-19. Unfortunately, though, botnets do have their malicious applications. A relatable example of this is currently ongoing in the conflict between Russia and Ukraine, where Russian hackers are using botnet(s) to put strain on official Ukrainian government servers to bring them to a stop, preventing many communication services on the Ukraine side. In this work, we aim to examine cloud technology and its defense from Botnets. We deploy VMware ESXi server as a private cloud infrastructure and configure the virtual machines hosted on our server in such a way that we can detect incoming malicious botnet communications and defend against them appropriately.