Botnet Communications against Private Cloud
Location
Poster Session 1 (Henderson Library)
Session Format
Poster Presentation
Your Campus
Statesboro Campus- Henderson Library, April 20th
Academic Unit
Department of Information Technology
Research Area Topic:
Computer Science - Computer Security
Abstract
As cloud computing and applications become pervasive, cloud security is a growing concern. Similarly, Botnets have increasingly become a security concern. The aim of this work is to examine cloud infrastructure as it applies to detection of Botnet applications. With a botnet comes a lot of computing power, which can be used to stage attacks on willing targets like company networks and web servers to judge and gauge how well security solutions perform. This allows for deeper digital security as flaws can be found and swiftly patched up. Another excellent example of such is the ‘Folding at Home’ project which allows people to contribute some of their computer’s resources towards helping understand SARS-CoV-2/COVID-19, and to help develop new therapies and drugs to help fight COVID-19. Unfortunately, though, botnets do have their malicious applications. A relatable example of this is currently ongoing in the conflict between Russia and Ukraine, where Russian hackers are using botnet(s) to put strain on official Ukrainian government servers to bring them to a stop, preventing many communication services on the Ukraine side. In this work, we aim to examine cloud technology and its defense from Botnets. We deploy VMware ESXi server as a private cloud infrastructure and configure the virtual machines hosted on our server in such a way that we can detect incoming malicious botnet communications and defend against them appropriately.
Program Description
As cloud computing and applications become pervasive, cloud security is a growing concern. Similarly, Botnets have increasingly become a security concern. The aim of this work is to examine cloud infrastructure as it applies to detection of Botnet applications.
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.
Presentation Type and Release Option
Presentation (File Not Available for Download)
Start Date
4-20-2022 10:00 AM
End Date
4-20-2022 11:30 AM
Recommended Citation
Van Deventer, Gijs and Wimmer, Hayden, "Botnet Communications against Private Cloud" (2022). GS4 Georgia Southern Student Scholars Symposium. 1.
https://digitalcommons.georgiasouthern.edu/research_symposium/2022/2022/1
Botnet Communications against Private Cloud
Poster Session 1 (Henderson Library)
As cloud computing and applications become pervasive, cloud security is a growing concern. Similarly, Botnets have increasingly become a security concern. The aim of this work is to examine cloud infrastructure as it applies to detection of Botnet applications. With a botnet comes a lot of computing power, which can be used to stage attacks on willing targets like company networks and web servers to judge and gauge how well security solutions perform. This allows for deeper digital security as flaws can be found and swiftly patched up. Another excellent example of such is the ‘Folding at Home’ project which allows people to contribute some of their computer’s resources towards helping understand SARS-CoV-2/COVID-19, and to help develop new therapies and drugs to help fight COVID-19. Unfortunately, though, botnets do have their malicious applications. A relatable example of this is currently ongoing in the conflict between Russia and Ukraine, where Russian hackers are using botnet(s) to put strain on official Ukrainian government servers to bring them to a stop, preventing many communication services on the Ukraine side. In this work, we aim to examine cloud technology and its defense from Botnets. We deploy VMware ESXi server as a private cloud infrastructure and configure the virtual machines hosted on our server in such a way that we can detect incoming malicious botnet communications and defend against them appropriately.