Abstract: Methods and systems for recognizing scrambled bot order and control correspondence channels are given. In the model method, the nearness of a correspondence channel between a first system gadget and a second system gadget is checked. Dynamic and inert times of the system gadget are distinguished, and a turnaround channel is resolved dependent on the discovery. The main system gadget may then be hailed as possibly tainted or suspected dependent on the invert channel assurance
Claims:We Claim:
1. A Method for identifying scrambled order and control correspondence channels comprising of:
a. A channel observing module arranged to screen a channel between a first system gadget and a second system gadget
b. A dynamic/inert indicator module designed to distinguish a functioning period and a dormant time of the principal arrange gadget
c. An invert channel recognition module including directions put away on a PC lucid medium, the turnaround channel discovery module being arranged to distinguish a foundation of correspondence by the principal organize gadget
2. The method of claim 1, wherein the channel checking module is additionally arranged to decide whether an IRC channel is set up by the principal organize gadget.
3. The method of claim 1, wherein deciding whether the turnaround channel is related with a white rundown.
, Description:Technical Field of the Invention:
The present invention relates for the most part to organize security and all the more specially to distinguishing scrambled bot order and control (C&C) correspondence channels.
Background of the Invention:
Directly, malignant programming (i.e., malware) can assault different gadgets by means of a system. For instance, malware may incorporate any program or document that is hurtful to a PC client, for example, bots, PC infections, worms, trojan ponies, spyware, or any programming that assembles data about a PC client or in any case works without consent. Different procedures and gadgets have been utilized to forestall the issues that malware can cause.
A bot is a product robot arranged to remotely control all or a segment of a PC without approval by the PC's client. Bot related exercises incorporate bot spread and assaulting different PCs on a system. Bots normally spread by filtering hubs (e.g., PCs) accessible on a system to look for a defenceless objective. At the point when a helpless PC is examined, the bot may introduce a duplicate of itself. Once introduced, the new bot may keep on looking for different PCs on a system to taint. It is additionally normal for a PC to be intentionally designed to look for defenceless PCs on a system and introduce the bots. At times, a bot opens up an indirect access the tainted host PC permitting access and, sometimes, control of the host PC.
A bot may likewise, without the authority of the tainted PC client, build up an order and control correspondence channel to get guidelines. Bots may get order and control correspondence with an incorporated bot server or another tainted PC (e.g., by means of a shared (P2P) arrange built up by bots on the contaminated system).
In certain embodiments, the bot gets guidelines to perform bot related exercises. At the point when most bots (i.e., a botnet) demonstration together, the tainted PCs (i.e., zombies) can perform sorted out assaults against at least one PCs on a system. In one model, bot contaminated PCs might be coordinated to ping another PC on a system is a refusal of-administration assault. In another model, after getting guidelines, at least one bot may guide the contaminated PC to transmit spam over a system.
A bot may likewise get directions to transmit data with respect to the contaminated host PC. In one model, the bot might be told to go about as a keylogger and record keystrokes on the tainted host PC. The bot may likewise be told to scan for individual data and email locations of different clients contained in email or contacts document. This data might be transmitted to at least one other contaminated PCs or a client in order of the bot or botnet
Bots regularly exploit Internet Relay Chat (IRC) channels as order and control interchanges channels to get guidelines. Ordinarily, the bot on the undermined gadget will open an Internet Relay Chat (IRC) channel and hang tight for orders from another bot, a bot server, or an individual in charge of the bot.
Correspondence (e.g., directions) to or from bots is frequently scrambled. Albeit current antivirus projects can check decoded information, the encoded information (e.g., by means of Secure Sockets Layer (SSL)) commonly can't be inspected to break down the correspondence. Thus, bots regularly go undetected.
Object of the Invention:
The object of the present method is to recognizes for distinguishing scrambled bot order and control correspondence channels are given. In the excellent method, the nearness of a correspondence channel between a first system gadget and a second system gadget is checked.
Summary of the Invention:
Methods and systems for identifying encoded bot order and control correspondence channels are given. In the commendable method, the nearness of a correspondence channel between a first system gadget and a second system gadget is checked. Dynamic and dormant times of the system gadget are recognized, and a turnaround channel is resolved dependent on the recognition. The primary system gadget may then be hailed as possibly tainted or suspected dependent on the turnaround channel assurance.
In certain embodiments, the method further contains deciding whether the invert channel is related with a white rundown. The method may likewise contain deciding whether an IRC channel is set up by the principal arrange gadget. The method may likewise additionally contain deciding whether the principal organize gadget checks a system.
In different embodiments, the method further contains mimicking an information stream between the main system gadget and the second system gadget. Mimicking the information stream may include transmitting the information stream to a virtual machine. The reaction from the virtual machine may affirm the bot. A mark might be produced and given to a bot indicator or controller.
A commendable system can contain a channel checking module, an action/dormancy identifier module, and an invert channel identification module. The channel checking module might be designed to screen a channel between a first system gadget and a second system gadget. The movement/idleness locator module might be designed to identify a functioning period and an inert time of the principal organize gadget. The invert channel location module might be designed to decide. The hailing module might be arranged to signal the primary system gadget as possibly contaminated dependent on the switch channel assurance.
An excellent PC clear medium may have epitomized consequently executable guidelines, the directions being executable by a processor for identifying encoded bot order and control correspondence channels, the method including checking a channel between a first system gadget and a second system gadget, recognizing a functioning period and a dormant time of the main system gadget, deciding an invert channel dependent on the dynamic and the idle times of the principal arrange gadget and hailing the primary system gadget as possibly tainted.
Brief Description of Diagrams:
Fig.1 is the stream outline in the present embodiment of an invention
Detailed Description of Invention:
Model systems and methods for location of an order and control correspondence channel of a bot are given. The bot running on an undermined gadget might be a piece of many programming robots (e.g., a botnet) which run self-governing on an assortment of traded off gadgets under a typical order and control (C&C) framework. In one model, a bot on the undermined gadget may open an Internet Relay Chat (IRC) channel with another gadget to get orders. This IRC channel might be alluded to as a C&C correspondence channel for the bot.
The bot includes at least one traded off gadgets which may make and send spam and malware, for example, infections, worms, or trojan ponies, for instance. An infection is a nosy program that taints a PC record by embeddings a duplicate of itself in the document. The duplicate is normally executed when the record is stacked into memory, permitting the infection to taint different documents. A worm is a program that engenders itself over various PCs, generally by making duplicates of itself in every PC's memory. A worm may copy itself in a PC so often that it makes the PC crash. A trojan pony is a damaging system camouflaged as a game, utility, or application. At the point when run by a client or PC program, a trojan pony can hurt the PC system while seeming to accomplish something valuable.
Malware may likewise incorporate adware and spyware. Adware is a program arranged to guide notices to a PC or a specific client. In one model, adware distinguishes the PC or potentially the client to different websites visited by a program on the PC.
The website may then utilize the adware to either produce spring up commercials or in any case direct explicit promotions to the client's program. Spyware is a program designed to gather data in regard to the client, the PC, and additionally a client's system propensities. In a model, spyware may gather data with respect to the names and sorts of websites that the client peruses and afterward transmit the data to another PC.
Adware and spyware are frequently added to the client's PC after the client peruses to a website that has the adware or potentially spyware. The client is frequently uninformed that these projects have been included and are comparatively unconscious of the adware as well as spyware's capacity.
FIG. 1 is a chart of a divert recognition condition in which embodiments of the present invention might be drilled. The channel location condition may involve a bot server in correspondence by means of a correspondence coordinate with a system gadget. Furthermore, a tap might be coupled to the correspondence organize.
The tap might be additionally coupled to a controller. Alternatively, a switch (not appeared) might be accommodated re-steering information from the correspondence organize.
The bot server and the system gadget involve computerized gadgets. A computerized gadget includes any gadget with a processor Fig. 1. A few instances of computerized gadgets incorporate PCs, servers, workstations, individual advanced associates, and cell phones.
The bot server is arranged to transmit organize information over the correspondence system to the system gadget, which is designed to get the system information. In certain embodiments, the bot server may build up a C&C correspondence channel with the system gadget by means of the correspondence organize. The C&C correspondence channel might be used by the bot server to control a bot on the hub or the hub itself on the system gadget.
| # | Name | Date |
|---|---|---|
| 1 | 202021012712-STATEMENT OF UNDERTAKING (FORM 3) [24-03-2020(online)].pdf | 2020-03-24 |
| 2 | 202021012712-POWER OF AUTHORITY [24-03-2020(online)].pdf | 2020-03-24 |
| 3 | 202021012712-FORM FOR STARTUP [24-03-2020(online)].pdf | 2020-03-24 |
| 4 | 202021012712-FORM FOR SMALL ENTITY(FORM-28) [24-03-2020(online)].pdf | 2020-03-24 |
| 5 | 202021012712-FORM 1 [24-03-2020(online)].pdf | 2020-03-24 |
| 6 | 202021012712-FIGURE OF ABSTRACT [24-03-2020(online)].jpg | 2020-03-24 |
| 7 | 202021012712-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [24-03-2020(online)].pdf | 2020-03-24 |
| 8 | 202021012712-EVIDENCE FOR REGISTRATION UNDER SSI [24-03-2020(online)].pdf | 2020-03-24 |
| 9 | 202021012712-DRAWINGS [24-03-2020(online)].pdf | 2020-03-24 |
| 10 | 202021012712-COMPLETE SPECIFICATION [24-03-2020(online)].pdf | 2020-03-24 |
| 11 | Abstract1.jpg | 2020-06-11 |
| 12 | 202021012712- ORIGINAL UR 6(1A) FORM 26-300620.pdf | 2020-07-02 |
| 13 | 202021012712-Proof of Right [29-11-2020(online)].pdf | 2020-11-29 |