|Project Description: ||Many machines are being infected by botnets. A network of compromised hosts is called a botnet. Botmaster establishes control on the bots using a command and control server. The botmaster sends commands to the bots using the server, and the bots perform certain malicious activities in response to the command. They send the results of the activities performed back to the botmaster, closing the loop of the botnet. Attackers have complete control over the machines using botnets and can send spam emails and leak the personal information of individuals.
In this project, a bot detection system to identify bot-infected hosts is implemented. The proposed system makes use of two facts: one is that all bots receive the same command from the botmaster and two is that all bots respond at the same time when the botmaster gives a command. The proposed system will be implemented using Botcatch application that will capture the bot traffic for the purpose of identifying if the system is compromised by a bot or not.