Special Issue Article
Preventing DNS Queries Against DDOS Attack
|P.Soniya1 and Mrs.S.Rajeswari2
|Related article at Pubmed, Scholar Google|
The botnet controllers prevented to the block malicious from the attacking the network. The stealthy messaging system using botnet controllers protect the privacy which allows multiple entities to pass messages stored secure DNA records. The botmaster to communicate bots of receive new attack commands and updates from the botmaster. The DNS factors of preventing the development of effective large-scale, stealthy botnet command and control, wide-area botnet detection systems are seemingly contradictory. The DNS monitoring the perfect stealth of communication channel, performing comprehensive statistical Analysis, signs that indicate that a certain name is used as part of a malicious operation.IRC bots usually have a way to remotely upgrade victims with new payloads to stay ahead of security efforts. Quantitatively analyze several techniques describe that can be used to hide malicious DNS activities both at the host and network levels. We also present and experimentally evaluate statistical content-analysis Techniques as a countermeasure, which require deep packet inspection. Finally, we provide an extensive evaluation real-world networks, can be secure powerful botnet attacks. Future work defenders of direction complementary to host-based malware detection and prevention solutions, such as the cryptographic provenance verification technique.