SlideShare a Scribd company logo
1 of 7
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1638
HashXplorer-A Distributed System for Hash Matching
Md.Amdadul Bari1, Rabeya Sultana2, Silvy Rahman Urmi3, AKM Bahalul Haque4
1,2,3Student, Department of Electrical and Computer Science, North South University, Dhaka, Bangladesh
4Dhaka, Bangladesh
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract —Passwords make our lives easier and secure. It
protects our valuable private information. So, this acts as a
blessing in our life. But every coin has two sides. This blessing
can turn into a threat because passwords are being hacked by
unauthorized people. This kind of situations can lead
industrial managers to face difficulties tooperatetheirofficial
devices because passwords can be changed by illegal users. It
is important to measure the strengthofthepasswordsthatthe
managers are using because this will let the managers know
about the condition of their password so that they can change
it into a stronger password. Before measuring the strength,
the password needs to be cracked. There are many methodsto
crack password. Brute force attack is used for cracking
passwords when other procedures fail. By using a powerful
botnet, the control over any device can be successful for
estimating the intensity of the password. This paper specifies
an easy and new technique of measuring the strength of a
password called HashXplorer. It will help official managers to
know about the condition of their passwords. It will observe
whether their passwords need to be changed or not.
Ultimately, HashXplorer will play a vital role in daily life.
Keywords- botnets, security, hash,crack,distributedsystem,
Trojan, TOR, MQTT Broker
1.Introduction
In this era of the 21st century, the most viral procedure of
user authentication used is passwords. People are always
under surveillance. Industrial workers and managers are at
higher danger. Their activities are being recorded [1]. If
unauthorized users can crack the password of the managers
by tracking their activities, they can get access to emails,
social media accounts as well as their whole computer
system. Since passwords are related to security issues ofthe
managers, the first target is to find out the strength of the
password that is being used by the managers so that they
can be alert about their intensity of the password. Before
that, the password needs to be crack so that its strength can
be measured. In this paper, botnets are used for cracking
passwords. Botnets are networks of billions of computers
infected by malware. They are the main problem of security
problems on the Internet [2]. In this paper, a new technique
to crack passwords with brute force method is used. It
involves centralized distribution. This technique is named
HashXplorer. Firstly, this paper manifests whethertheuse of
botnets is good enough for password cracking so that the
strength of the password can be measured. Secondly, it
shows the involvement of ethical hackers who play the role
of the workers. Those workers stimulated the HashXplorer.
To get access to those official devices, ethical hackers
penetrate the system [3]. So basically this paper also
presents ethical hackers who will at first get control over
those official devices and will crack the password of those
devices to prevent and alert managers from using weak
passwords. The cracker must use tools or algorithm tocrack
any password. When all possible procedures of cracking the
passwords fail then the only option left is the brute force
attack. Brute-force is one types ofattack inwhichanattacker
tries to log in to a user’s account by systematically checking
every detail and then attempting all possible passwords
match. It keeps on matching unless and until the correct
match of that specific password is found [4]. Due to the
arrival of secure cryptography hash function like MD5 and
SHA1 passwords continue to become increasingly harder to
crack. This paper specifies an easy and new technique of
hash cracking called HashXplorer.
2.BOTNET STRUCTURE
Botnets or Bot Networks consists of billions of computers
that are interconnected and infected with malicious code.
Botnets have different architectures, but it has its own
structure as well. Botnet structures have been divided into
three parts. Those parts include Botsandbotnets,Botmaster
and Command and Control infrastructure(C&C).
2.1 BOTS and BOTNETS – Bots are neutral entities which
are nonmalicious. When formed into groupings of bots or
botnets, the resources are more dominantwhenformedinto
groups of bots. A Botnet, therefore, is an appropriate
definition where bots are highly adaptable worker bees that
do their master’s building over a broad net. There are both
“good bots” and “wicked bots.” So it simply depends on how
the bots are used [5].
2.2 BOTMASTER - The controller of botnets is knownasthe
Botmaster. It also manages remote Bots and Botnet. [6]
2.3 COMMAND AND CONTROL INFRASTRUCTURE - This
paper presents whether the use of botnets is worthy for
password cracking anditsmethodologyusedforcracking.So
C&C infrastructure is one of the essential features for this
research. A Botnet is controlled by thisserverwhichiscalled
the command and control server. The botnet architectures
consist of the Bots, Botmaster and a control entity [6]. C&C
servers carry out different malicious attacks. So it can be
used to form strong networks of infected devices [7].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1639
3.TYPES OF ATTACKS
1. Distributed Denial-of-Service Attacks (DDoS): A
DDoS attack causes a loss of valuable services. The
bandwidth of the victim network is undertaken by
the attacker in his control [8].
2. Spamming: By using thousands of bots, an illegal
user can send large amounts of spam email and
phishing emails [8].
3. Sniffing Traffic: The sniffers are used to get
sensitive as well as private information [8].
4. Keylogging: It is faster for an attacker to extract
sensitive information by using the keylogging [8].
5. Spreading: Botnets caused the spreading of new
botnets[8].
6. Installing Advertisement: Financial advantages can
get by setting up a fake website with some fake
advertisements [8].
7. Google AdSense abuse: This program offers
companies the liability to display Google
advertisements [8].
4.RECENT ATTACKS ON BOTNETS
Some examples of botnet-based attacks are discussed above
on types of attacks part. The most common one is the DDoS.
DDoS stands for a distributed form of denial of service. This
attack is achieved by sending a largenumberofUDPpackets,
ICMP requests, HTTP or TCP syn floods [6, 9]. The following
figure shows that the distribution of DDoS attacks bytypes
due to botnets increases drastically in 2018:
Fig 1: Distribution of BOTNET assisted DDoS attacks by
type, Q1 2018 [10]
The distribution of BOTNET assisted attacks is increasing at
a faster rate. The following figure below shows that the
number of botnets assisted DDoS attacks increases
dramatically from 2017 to 2018, Series 2 - Q4 2017 and
Series 1 - Q4 2018:
Fig 2: Distribution of BOTNET assisted DDoS attacks by
hours, Q4 2017 and 2018 [10]
Moreover, the number of Linux-based botnets declined
slightly compared to the end of 2017 from 71% to 66%. On
the other hand, the number of Windows-based botnets
jumped from 29% to 34%. The figure elaborating the
correlation between Windows-based and Linux-based
botnet attacks is given below:
Fig 3: Correlation between Windows- and Linux-based
botnet attacks, Q1 2018 [10]
5.RELATED WORK
There are recognized research in different areas of botnets
as well as hash cracking. Any given hash value can be break
using several different methods. Cracking a hash value
regardless of the algorithmusedinvolvestwomethods.They
are either straight forward Brute Force [11] or dictionary
attack [12]. Some related work of this field is shown.
5.1Sonification of Network Traffic for Detecting and
Learning About Botnet Behavior[13]
Botnet's activities are quite similartonormalnetworktraffic.
Their presence is quite impossible to detect. Intrusion
detection systems cannot detect botnets. Usually, Bots scan
the network to collect information which may help the
botmaster to prepare forfuture attacks.Duetothesefeatures
and in the research topic of “Sonification of Network Traffic
for Detecting and Learning About Botnet Behavior” [13]
shows that botnets are much for reliable and save to use for
hashcracking.IDStechnologiesdependonseveraltechniques
to detect botnets. It includes identifying repetitions of
requests as well as statistical methods [14,15].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1640
5.2 Botnet- Botnet-based Distributed Denial of Service
(DDoS) Attacks on Web Servers: Classification and Art [16]
The architectures of DDoS tools are very similar so as
HashXplorer. The classificationoftheseattacktoolshasthree
sections. The first one is the agent-based attack. Tools made
on an agent-based attack are manufacture by solely focusing
on the agent handler DDoS attack model. One example ofthis
tool is Trinoo [18]. The second one is IRC based attack. For
example Trinity. The third one is web-based DDoS attack
which harms the web server by slowing it down [16].
5.3 Usage of botnets for high-speed MD5 hash cracking
[19]
A brute force attack can be used to crack hash values. It
involves a search of all possible keystobreakinga hashcode.
The length of the key determines the capacity of a brute
force attack. The longer key length takes more time to
decode [11]. Among 144,250 records, breaking the old
default model took around 20 seconds whereas the revised
model took 10 hours and 20 minutes [20]. There are many
open source MD5 hash cracker like BarsWF[19] which uses
the CPU along with the GPU. The technique used in this
research paper is quite similar to BarsWF[19].
oclHashCatPlus[21] is a closed source program for
performing the brute force attack. It supports variousattack
modes [21].
5.4 A Cognitive Approach for Botnet Detection Using
Artificial Immune System in the Cloud [22]
Botnets can create a malicious network. Bots infect devices
by creating a destructive pattern. This pattern is a chain of
infected devices correlated with each other. As this pattern
can be explained as a directed graph so ultimately they can
form a group of connected computers which is controlled by
the botmaster. So Botnets are useful for penetratinga device
for hash cracking [22].
5.5 An Advanced Hybrid Peer-to-Peer Botnet[23]
In 2010 a research overviewedadvancedhybridpeertopeer
botnet design. This proposed botnet is tougher to get shut
down, to get monitored or to get hijacked. This botnet
doesn't show in which way botmasterdeal withthebotnetto
issue commands. The botmaster sets their service ports
beforehand and thus knows their service ports. After the
botnet is released, the botmaster could inject commands
through these initial servant bots.Afterthebotmastermakes
a report command and gets the first report with the
information of service ports of all current servant bots, the
botmaster can inject commands through an arbitrarily
chosen servant bots [23].
5.6 Concerns about Hash Cracking Aftereffect on
Authentication Procedures inApplicationofCyberspace
[24]
The most shocking big news that broke out in crypto 2004
conference that one md5 hash got cracked. And after this
event, one more news broke out that SHA1 also been
cracked. This became a great concern to all researchers of
the cryptography field. As SHA1 got cracked, the percentage
of increased risk is limited. So, the impact of the hash
cracking is not extensive. Cases that are influenced by the
event of hash cracking are password authentication,
Forensic Tool Utilizations. When it comes about the
password, that can be leaked or stolen. But the chances of
this gets decreased if the user renews it frequently or if the
storage of the password gets relocated. People used to
consider SHA1 most secure. But later research team from
China and the USA have got out that it was a thousand times
weaker than it was thought to be. The point is that cracking
of SHA1 is not to tell us about the weakness of SHA1 but to
remind that the development and strengthening of our
existing security mechanism should get speed up [24].
5.7 Cracking More Password Hashes with Patterns [25]
It is one of the common mistakes that is done by application
developer that they storeuserpasswordsindatabaseseither
as plaintext or as unsalted hash values. Many hacking
attempts get successful because of this reason. To seize
hashes password attackers follow brute force, dictionary or
rainbow table attacks to disclose the plain text passwords
from their hashes. Dictionary attacks are the fastest way for
cracking hash among this three-way. But it has an
insufficient success rate. However, this success rate can get
increased by applying new methods. There are ten patterns
of password that can get cracked easily. These are called the
identified pattern. These ten patterns are Appending,
Prefixing, Inserting, Repeating, Sequencing, Replacing,
Reversing, Capitalizing, Special-format, and Mixed Patterns.
The password that is delicate are the threats for the
authentication system. Attackers can use different attack
method to crack hashes password, notably unsalted hashes.
Security experts increased security awareness for strong
passwords. Authentication system rules force the user to
generate a strong password. But the same pattern password
is used by most of the user. These same pattern password
can be identified as well as it can get cracked easily. A
pattern-based attack has been designed which upgrade
dictionary attacks. This upgraded dictionary attacks can be
considered as the new creation of dictionary attacks [25].
5.8 Choosing Best Hashing Strategies and Hash
Functions [26]
Most used hash functions are Cryptographic hash functions
and Dynamic hash functions. There are more hash functions
like String hash functions, Geometric hash functions and so
on. It is quite impossible to alter the result of the hash in a
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1641
powerful Cryptographic hash function. Due to this property,
it can re-originate the authentic piece of data [26].
6.Technology Used for HashXplorer
For making HashXplorer, six main technologies are used.
1. Protocols: MQTT, HTTPS
2. Encryptions: Asymmetric (RSA 2048 bit)
3. Frameworks: Spring Boot
4. Database: MongoDB
5. Proxies: Tor
6. Servers and Load balancers: Apache, HAProxy
To transfer all the data collected by a specific node to a
server, the former requires a protocol that is bandwidth-
efficient, energy-efficient and capable of working with
limited hardware resources that are main memory and
power supply. So for this reasons protocols such as Message
Queue Telemetry Transport (MQTT) have been used for
HashXplorer. Message Queue Telemetry Transport (MQTT)
protocol is an application layer protocol designed for
resource-constrained devices [3]. It is a
published/subscribed protocol. It not only allows clients to
connect as a publisher but also as a subscriber, or both. To
make the HashXplorer undetectable by antiviruses, weneed
a protocol that consumes low bandwidth and works in a
pub/sub model. Since MQTT has these featurestofulfill both
of this requirement, that’s why we have chosen it [27]. It
uses a topic-based publish-subscribe architecture.
HashXplorer uses Hypertext Transfer Protocol (HTTP). The
HTTP protocol is used to post the commandsonspecificweb
servers. They do not remain in connected mode. HTTP
protocol can easily avoid current detection methods like
firewalls. Since HTTP has these features, that’s why we have
chosen it [28].
When an infected device is online, a message is issued from
the device using the MQTT broker. The worker gets the
message and sends a reply with a hash directory. The hash
directory contains hash values. Those values are encrypted
(RSA 2048 Bit). RSA stands for Rivest-Shamir-Adleman. It
has the feature of secure data transmission. In HashXplorer,
the encryption key is public, and it is different from the
decryption key which is kept private [29].
The framework “Spring Boot” is used for backend
implementation.
HashXplorer uses "Java language”. MongoDB is the database
used for HashXplorer. It is a database with not only the
scalability but also with the flexibility that allows the users
with the proper querying and indexing. We used MongoDB
for our software because it can store and saves data in an
amenable manner. It means that the data model can be
changed from one field to another over time [30]. Tor is a
network of routers which is called relays. It allows users
with the facility to communicate anonymously.Thenetwork
provides anonymity by giving traffic from clients called
proxies. Tor hides the identities of the communicants. To
conceal the identities, Tor encrypts messages in such a way
that each relay can detect only the identities of the previous
and next hops along the anonymous circuit. So Tor plays a
vital role in security purpose [31].
In this paper, Apache is the server. Firstly, Apache is the
most popular Web server which is running at a faster rate in
today’s generation [32]. Secondly, Apache is a fully featured
and high-performance Web server which means that its
functionality, efficiency, and speed is better than any other
server. Thirdly, the source code of Apache is available. Load
balancing is a process for distributing traffic loads on
connection lines in a balanced way for optimum traffic,
maximizing throughput and minimizing response time. In
this research, using HAProxy[34] as load balancerbecauseit
is more simple to do configuration and available complete
documentation [35].
Fig 4: System Architecture of HashXplorer
When a device gets infectedbyHashXplorerBotnet,itopensa
port of that device and subscribes to an MQTT broker on a
particular topic and listens for an incoming message. The
MQTT broker is connected to a load balancer through TOR.
The load balancers are connected with workers.
When an infected device comes online, a message is
published from the devices using the MQTT broker and the
worker get the message and send a replywiththehash/word
list. After getting the hash/word list the device start brute
force attack to crack the hash. If any of the devices get the
plain text of the hash, the device sends the plain text to the
worker using MQTT.
7. FEATURES OF HASHXPLORER
7.1 MD5 Hash Crack
MD5 is a commonly used hash function. It generates 128 bit
of hash value. MD5takesanarbitrarylengthmessageasinput
and gives 128 bit of hash code as output. Although it was
manufactured to use it as a cryptographic hash function, it
suffers from large Infirmity[36]. The most common way of
hash cracking is that user can try to hypothesize the
password, hashing each estimation and it gets checked
whether the hypothesized hash matches the hash is getting
cracked. Whenever they get matched, that is the password.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1642
The two mostcommonformsofhypothesizingpasswordsare
dictionary attack as well as another one is brute force attack.
User can crack MD5 in this two way. There is no prevention
of this two way. These can only be improved to less effective.
7.2 Sha1 Crack
SHA1 is a cryptographic hash function which is used to
procreate hashes for verifying the authenticity of digital
content as well as it is similar to md5 or md4 algorithms. It
forms almost unique 160 bit of hash value. It is typically
represented as a 40 character string. SHA1 also can be
cracked by brute force attack and dictionary attack.
7.3 Password List Generate
In recent timepasswordsare used in nearly everymulti-user
computer application. They are the most used legitimate
method. In someoperations,auserispermittedtomaketheir
secret password whereas, in some other system, a password
is created for each user randomly. A random password
generator is a software program or it can be a hardware
device that generatesapasswordbytakingarandomnumber
as an input [37].
7.4 Brute Force attack to any target
This is one of the procedures which is used to obtain private
user's information such as username, passwords, PIN. It
applies repetitive action for usernamesand passworduntilit
becomes successful to get desired information. It can be
executed by attackers to attempt to get access to encrypted
data. It is a useful way for IT specialist to test the security of
their networks [38].
8 BENEFITS OF USING HASHXPLORER
8.1 Reliability
HashXplorer is reliable because it gives a more accurate
outcome compare to the methodology used. If one of the
machine crashes, the whole system still can survive. It has
higher availability and improved reliability.
8.2 Scalability
As HashXplorer use distributed system so resources such as
processing or storage capacity will get increased
incrementally. More nodes can be connected, and that can
scale up the method with increasing load.
8.3 Faster
HashXplorer follows a distributed system. The distributed
system is asystem that contains independentcomputersthat
are connected using a distribution middleware. So
distributed system divides a problem into many tasks. Each
of which is solved by one or more devices. For this reason, it
takes less time moreover it has more speed. For example, if
there are 10000 CPU chips and each of that running at 60
MIPS. It is not possible to build a 600000 MIPS single
processor since it would require 0.003nsecinstructioncycle.
It upgrades performance through load distributing.
8.4 Security
HashXplorer is more secure because of TOR and Encryption.
Tor hides the identities of the communicants to conceal the
identities. Tor encrypts messages in such a way that each
relay can observe only the integrity of the previous and next
hops along the anonymous circuit. So Tor plays a vital role in
securitypurpose.AndEncryptionisaprocessthattransforms
information referred as plain text by using an algorithm in a
way so that it becomes incomprehensible to anyone except
those people who has the understandingaboutthealgorithm
and decryption process. Encryption allows protecting data
securely that the user doesn't want any outsider to have
access. So Tor and Encryption plays a vital role to increase
the security of HashXplorer.
8.5 Reduces IT Costs
When one device cannot take the workload, then the user
needs to rely on multiple devices to make the work done.
Relying on many devices is costly because the user has to
spend money on many devices. As HashXplorer follows a
distributed system, they help in sharing different resources
and capabilities to provide the user with a single and
integrated relevant network. For this reason, HashXplorer is
cost-efficient
9 Why HashXplorer is undetectable
HashXplorer is undetectable. Itcannotbedetectedevenwith
the help of antivirus that helps the user todetect suchthings.
If anyone installs it in the user’s device then the user will not
be able to know that the user’s device is getting tracked by it
and also recorded through a botnet. The botnet uses very
light weighted protocol MQTT to communicate through it. It
only runs one service at a time in the background. It also
encrypts data and sends it to the server. All of these things
make it undetectable. Even when we tried to test it with an
antivirus whether it can detect this or not. None of the
antiviruses could have detected this [27].
10 Conclusion
Nowadays, privacyhasbecomea significantconcern because
the information is leaked almost like every single second.
Each of the footprints of the industrial managers can be
traced using the proper tracking mechanism while surfing
the internet. They can be traced by interpreting their data.
Unauthorized users destroy the device [39]. Weak
passwords can be broken undoubtedly whereas stronger
password takes more time[40]. However, to measure the
strength of the password so that theindustrial managerscan
be alert from using weaker passwords, HashXplorer can
easily insert into that device and break the password by
measuring its strength. It can prevent unauthorizedhackers
from causing harm to the device. So HashXplorerisa reliable
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1643
software for law enforcement agencies for measuring the
strength of the password.
REFERENCES
1. Haque, A K M Bahalul.(2019).Big-Brother-In-1984-The-
Modern-Era-Surveillance. International Journal of
Scientific & Technology Research. 8. 186-190.
2. B. Stone-Gross et al., “Your botnet is my botnet: analysis
of a botnet takeover,” in Proceedings of the 16th ACM
conference on Computer and communicationssecurity -
CCS ’09, Chicago, Illinois, USA, 2009, p. 635.
3. D. Thangavel, X. Ma, A. Valera, H.-X. Tan, and C. K.-Y.Tan,
“Performance evaluation of MQTT and CoAP via a
common middleware,” in 2014 IEEENinthInternational
Conference on Intelligent Sensors,SensorNetworksand
Information Processing (ISSNIP), Singapore, 2014, pp.
1–6.
4. “Brute-force & Dictionary Attacks: Prevention &
Detection Techniques,” Rapid7. [Online]. Available:
https://www.rapid7.com/fundamentals/brute-force-
and-dictionary-attacks/. [Accessed: 20-Feb-2019].
5. Yin, C., Zou, M., Iko, D., & Wang, J. (2013). Botnet
detection based on correlation of malicious behaviors.
International Journal ofHybridInformationTechnology,
6(6), 291-300
6. M. Rahimipour and D. S. Jamali, “A Survey on Botnets
and Web-based Botnet Characteristics”. International
Journal of Computer Science Engineering and
Technology,vol. 4, no. 11, p. 5, 2014.
7. “What is command-and-control server (C&C server)? -
Definition from WhatIs.com,” WhatIs.com. [Online].
Available:
https://whatis.techtarget.com/definition/command-
and-control-server-CC-server.[Accessed:20-Feb-2019].
8. Sadeghian and M. Zamani, "Detecting and preventing
DDoS attacks in botnets by the help of self triggered
black holes," 2014 Asia-Pacific ConferenceonComputer
Aided System Engineering (APCASE), South Kuta, 2014,
pp. 38-42.
9. Eslahi, M., Salleh, R., & Anuar, N. B. (2012). Bots and
botnets: An overview of characteristics, detection and
challenges. 2012 IEEE International Conference on
Control System, Computing and Engineering.
10. “DDoS attacks in Q1 2018.” [Online]. Available:
https://securelist.com/ddos-report-in-q1-
2018/85373/. [Accessed: 20-Feb-2019].
11. Vu, J. Han, H. Nguyen, Y. Kim and E. Im, "A homogeneous
parallel brute force cracking algorithm on the GPU,"
ICTC 2011, Seoul, 2011, pp. 561-564.
12. M. M. Albashear and H. A. Ali, "The Effect of the Initial
Retransmission Timeout upon the Dictionary Attack
Delay," 2018 International Conference on Computer,
Control, Electrical, and Electronics Engineering
(ICCCEEE), Khartoum, 2018, pp. 1-6.
13. M. Debashi and P. Vickers, “Sonification of Network
Traffic for Detecting and Learning About Botnet
Behavior,” IEEE Access, vol. 6, pp. 33826–33839, 2018.
14. Stalmans and B. Irwin, A Framework for DNS Based
Detection and Mitigation of Malware Infections on a
Network. .
“A framework for DNS based detectionandmitigationof
malware infections on a network,’’ in Proc. IEEE
15. J. Zhang, R. Perdisci, W. Lee, U. Sarfraz, and X. Luo,
“Detecting Stealthy P2P Botnets Using Statistical Traffic
Fingerprints,” in Proceedingsofthe2011IEEE/IFIP41st
International Conference on Dependable
Systems&Networks, Washington, DC, USA, 2011, pp.
121–132.
16. E. Alomari, S. Manickam, B. B. Gupta, S. Karuppayah,and
R. Alfaris, “Botnet-based Distributed Denial of Service
(DDoS) Attacks on Web Servers: Classification and Art,”
International Journal of Computer Applications, vol. 49,
no. 7, pp. 24–32, Jul. 2012.
17. B. Gupta, R. C. Joshi, M. Misra, ―Dynamic and Auto
Responsive Solution for Distributed Denial-of-Service
Attacks DetectioninISPNetwork,‖International Journal
of Computer Theory and Engineering (IJCTE) 1 (1), pp.
71-80, 2009.
18. P. J. Criscuolo, "Distributed Denial of Service: Trin00,
Tribe Flood Network, Tribe Flood Network 2000, and
Stacheldraht CIAC-2319," DTIC Document, 2000.
19. J. Anish Dev, "Usage of botnets for high speed MD5 hash
cracking," Third International ConferenceonInnovative
Computing Technology (INTECH 2013), London, 2013,
pp. 314-320.
20. L. Bošnjak, J. Sreš and B. Brumen, "Brute-force and
dictionary attack on hashed real-world passwords,"
2018 41st International Convention on Informationand
Communication Technology, Electronics and
Microelectronics(MIPRO),Opatija,2018,pp.1161-1166.
21. “hashcat - advanced password recovery.” [Online].
Available: https://hashcat.net/hashcat/.[Accessed:20-
Feb-2019].
22. V. R. Kebande and H. S. Venter, "A cognitiveapproachfor
botnet detection using Artificial Immune System in the
cloud," 2014 Third International Conference on Cyber
Security, Cyber Warfareand Digital Forensic(CyberSec),
Beirut, 2014, pp. 52-57.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1644
23. P. Wang, S. Sparks and C. C. Zou, "An Advanced Hybrid
Peer-to-Peer Botnet," in IEEE Transactions on
Dependable and Secure Computing,vol.7,no.2,pp.113-
127, April-June 2010.
24. S. Wang, H. Ke, J. Huang and C. Chan, "Concerns about
Hash Cracking Aftereffect on AuthenticationProcedures
in Applications of Cyberspace," in IEEE Aerospace and
Electronic Systems Magazine, vol. 22, no. 1, pp. 3-7, Jan.
2007.
25. E. İ. Tatlı, "Cracking More Password Hashes With
Patterns," in IEEE Transactions on Information
Forensics and Security, vol. 10, no. 8, pp. 1656-1665,
Aug. 2015.
26. M. Singh and D. Garg, "Choosing Best Hashing Strategies
and Hash Functions," 2009 IEEE International Advance
Computing Conference, Patiala, 2009, pp. 50-55.
27. Bari, S. T. Nisa, and A. B. Haque, “Osploit - A Privacy
Invader RATforCyber ThreatIntelligence”.International
Journal of Computer Science and Network, vol. 7, no. 6,
p. 5, 2018.
28. “HTTP-Botnets: The Dark Side of a Standard Protocol!,”
Security Affairs, 22-Apr-2013. [Online]. Available:
https://securityaffairs.co/wordpress/13747/cyber-
crime/http-botnets.html. [Accessed: 20-Feb-2019].
29. M. Singh and D. Garg, "Choosing Best Hashing Strategies
and Hash Functions," 2009 IEEE International Advance
Computing Conference, Patiala, 2009, pp. 50-55.
30. “What Is MongoDB? | MongoDB.” [Online]. Available:
https://www.mongodb.com/what-is-mongodb.
[Accessed: 20-Feb-2019].
31. W. B. Moore, C. Wacek, and M. Sherr, “Exploring the
Potential Benefits of Expanded Rate Limiting in Tor:
Slow and Steady Wins the Race with Tortoise,” in
Proceedings of the 27th Annual Computer Security
Applications Conference, New York, NY, USA, 2011, pp.
207–216.
32. “Welcome to The Apache Software Foundation!”
[Online].Available:http://www.apache.org/.[Accessed:
20-Feb-2019].
33. Yiming Hu, A. Nanda and Qing Yang, "Measurement,
analysis and performance improvement of the Apache
Web server," 1999 IEEE International Performance,
Computing and Communications Conference (Cat.
No.99CH36305), Scottsdale,AZ,USA,1999,pp.261-267.
34. “HAProxy - The Reliable, High Performance TCP/HTTP
Load Balancer.” [Online]. Available:
http://www.haproxy.org/. [Accessed: 19-Feb-2019].
35. H. Handoko, S. M. Isa, S. Si and M. Kom, "HighAvailability
Analysis with Database Cluster, Load Balancer and
Virtual Router Redudancy Protocol," 2018 3rd
International Conference on Computer and
Communication Systems (ICCCS), Nagoya, 2018, pp.
482-486.
36. K. Kasgar and M. K. Dhariwal, “A Review Paper of
Message Digest 5 (MD5),” Management Research, vol.1,
no. 4, p. 7, 2013.
37. M. D. Leonhard and V. N. Venkatakrishnan, "A
comparative study of three random password
generators," 2007 IEEE International Conference on
Electro/Information Technology, Chicago, IL, 2007, pp.
227-232.
38. “What a brute force attack is (with examples) How to
protect against them,”Available:
https://www.comparitech.com/blog/information-
security/brute-force-attack/. [Accessed: 19-Feb-2019].
39. Haque, AKM Bahalul, Farhat Tasnim Progga, and Md
Amdadul Bari. "An Analytical Study of Web Tracking: In
a Nutshell."International Journal of Scientific &
Engineering ResearchVolume9,Issue11,P-1742-1746,
November-2018
40. “Lab: Password cracking and social engineering8.”
[Online]. Available:
http://ver.miun.se/courses/security/dasak/pwdguess.
pdf. [Accessed: 20-Feb-2019].

More Related Content

What's hot

Fitsum R. Lakew Wireless Network Security Threat
Fitsum  R.  Lakew  Wireless  Network  Security  ThreatFitsum  R.  Lakew  Wireless  Network  Security  Threat
Fitsum R. Lakew Wireless Network Security ThreatFITSUM RISTU LAKEW
 
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...Editor IJCATR
 
International Journal of Computational Science and Information Technology (I...
 International Journal of Computational Science and Information Technology (I... International Journal of Computational Science and Information Technology (I...
International Journal of Computational Science and Information Technology (I...ijcsity
 
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba   an innovative rule ...Phishing detection in ims using domain ontology and cba   an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...ijistjournal
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
IRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS AttacksIRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS AttacksIRJET Journal
 
IRJET - Site to Site Open VPN
IRJET -  	  Site to Site Open VPNIRJET -  	  Site to Site Open VPN
IRJET - Site to Site Open VPNIRJET Journal
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis MPhil/MRes/BSc
 
Cybersecurity Goes Mainstream
Cybersecurity Goes MainstreamCybersecurity Goes Mainstream
Cybersecurity Goes MainstreamRob Marson
 
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSLATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSIJCNCJournal
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsIRJET Journal
 
Bot net detection by using ssl encryption
Bot net detection by using ssl encryptionBot net detection by using ssl encryption
Bot net detection by using ssl encryptionAcad
 
Detection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P BotnetsDetection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P BotnetsCSCJournals
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
 
Botnet detection using ensemble classifiers of network flow
Botnet detection using ensemble classifiers of network flow  Botnet detection using ensemble classifiers of network flow
Botnet detection using ensemble classifiers of network flow IJECEIAES
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET Journal
 

What's hot (20)

Fitsum R. Lakew Wireless Network Security Threat
Fitsum  R.  Lakew  Wireless  Network  Security  ThreatFitsum  R.  Lakew  Wireless  Network  Security  Threat
Fitsum R. Lakew Wireless Network Security Threat
 
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
 
International Journal of Computational Science and Information Technology (I...
 International Journal of Computational Science and Information Technology (I... International Journal of Computational Science and Information Technology (I...
International Journal of Computational Science and Information Technology (I...
 
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba   an innovative rule ...Phishing detection in ims using domain ontology and cba   an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
IRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS AttacksIRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS Attacks
 
IRJET - Site to Site Open VPN
IRJET -  	  Site to Site Open VPNIRJET -  	  Site to Site Open VPN
IRJET - Site to Site Open VPN
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 
65 113-121
65 113-12165 113-121
65 113-121
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
 
Cybersecurity Goes Mainstream
Cybersecurity Goes MainstreamCybersecurity Goes Mainstream
Cybersecurity Goes Mainstream
 
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSLATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
 
Ijmet 10 02_045
Ijmet 10 02_045Ijmet 10 02_045
Ijmet 10 02_045
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
 
Bot net detection by using ssl encryption
Bot net detection by using ssl encryptionBot net detection by using ssl encryption
Bot net detection by using ssl encryption
 
Detection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P BotnetsDetection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P Botnets
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
 
Botnet detection using ensemble classifiers of network flow
Botnet detection using ensemble classifiers of network flow  Botnet detection using ensemble classifiers of network flow
Botnet detection using ensemble classifiers of network flow
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
 

Similar to IRJET- Hashxplorer-A Distributed System for Hash Matching

A Survey of Botnet Detection Techniques
A Survey of Botnet Detection TechniquesA Survey of Botnet Detection Techniques
A Survey of Botnet Detection Techniquesijsrd.com
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkEditor IJCATR
 
Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)sadique_ghitm
 
A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackA Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackCSCJournals
 
IRJET- A Review on Honeypots
IRJET-  	  A Review on HoneypotsIRJET-  	  A Review on Honeypots
IRJET- A Review on HoneypotsIRJET Journal
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat appIRJET Journal
 
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptxAn Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptxSandeep Maurya
 
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...IRJET Journal
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The BotmasterIJERA Editor
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYIRJET Journal
 
lab3cdga.ziplab3code.c#include stdio.h#include std.docx
lab3cdga.ziplab3code.c#include stdio.h#include std.docxlab3cdga.ziplab3code.c#include stdio.h#include std.docx
lab3cdga.ziplab3code.c#include stdio.h#include std.docxsmile790243
 
IRJET-Detecting Hacker Activities using Honeypot
IRJET-Detecting Hacker Activities using HoneypotIRJET-Detecting Hacker Activities using Honeypot
IRJET-Detecting Hacker Activities using HoneypotIRJET Journal
 
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and BlockingIRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and BlockingIRJET Journal
 
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET Journal
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing SuiteIRJET Journal
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsIRJET Journal
 
A Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior AnalysisA Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior Analysisidescitation
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.IRJET Journal
 
Literature survey on peer to peer botnets
Literature survey on peer to peer botnetsLiterature survey on peer to peer botnets
Literature survey on peer to peer botnetsAcad
 

Similar to IRJET- Hashxplorer-A Distributed System for Hash Matching (20)

A Survey of Botnet Detection Techniques
A Survey of Botnet Detection TechniquesA Survey of Botnet Detection Techniques
A Survey of Botnet Detection Techniques
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social Network
 
Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)
 
A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackA Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits Attack
 
IRJET- A Review on Honeypots
IRJET-  	  A Review on HoneypotsIRJET-  	  A Review on Honeypots
IRJET- A Review on Honeypots
 
Paper(edited)
Paper(edited)Paper(edited)
Paper(edited)
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
 
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptxAn Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
 
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The Botmaster
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
 
lab3cdga.ziplab3code.c#include stdio.h#include std.docx
lab3cdga.ziplab3code.c#include stdio.h#include std.docxlab3cdga.ziplab3code.c#include stdio.h#include std.docx
lab3cdga.ziplab3code.c#include stdio.h#include std.docx
 
IRJET-Detecting Hacker Activities using Honeypot
IRJET-Detecting Hacker Activities using HoneypotIRJET-Detecting Hacker Activities using Honeypot
IRJET-Detecting Hacker Activities using Honeypot
 
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and BlockingIRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
 
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
 
A Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior AnalysisA Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior Analysis
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
 
Literature survey on peer to peer botnets
Literature survey on peer to peer botnetsLiterature survey on peer to peer botnets
Literature survey on peer to peer botnets
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 

Recently uploaded (20)

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 

IRJET- Hashxplorer-A Distributed System for Hash Matching

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1638 HashXplorer-A Distributed System for Hash Matching Md.Amdadul Bari1, Rabeya Sultana2, Silvy Rahman Urmi3, AKM Bahalul Haque4 1,2,3Student, Department of Electrical and Computer Science, North South University, Dhaka, Bangladesh 4Dhaka, Bangladesh ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract —Passwords make our lives easier and secure. It protects our valuable private information. So, this acts as a blessing in our life. But every coin has two sides. This blessing can turn into a threat because passwords are being hacked by unauthorized people. This kind of situations can lead industrial managers to face difficulties tooperatetheirofficial devices because passwords can be changed by illegal users. It is important to measure the strengthofthepasswordsthatthe managers are using because this will let the managers know about the condition of their password so that they can change it into a stronger password. Before measuring the strength, the password needs to be cracked. There are many methodsto crack password. Brute force attack is used for cracking passwords when other procedures fail. By using a powerful botnet, the control over any device can be successful for estimating the intensity of the password. This paper specifies an easy and new technique of measuring the strength of a password called HashXplorer. It will help official managers to know about the condition of their passwords. It will observe whether their passwords need to be changed or not. Ultimately, HashXplorer will play a vital role in daily life. Keywords- botnets, security, hash,crack,distributedsystem, Trojan, TOR, MQTT Broker 1.Introduction In this era of the 21st century, the most viral procedure of user authentication used is passwords. People are always under surveillance. Industrial workers and managers are at higher danger. Their activities are being recorded [1]. If unauthorized users can crack the password of the managers by tracking their activities, they can get access to emails, social media accounts as well as their whole computer system. Since passwords are related to security issues ofthe managers, the first target is to find out the strength of the password that is being used by the managers so that they can be alert about their intensity of the password. Before that, the password needs to be crack so that its strength can be measured. In this paper, botnets are used for cracking passwords. Botnets are networks of billions of computers infected by malware. They are the main problem of security problems on the Internet [2]. In this paper, a new technique to crack passwords with brute force method is used. It involves centralized distribution. This technique is named HashXplorer. Firstly, this paper manifests whethertheuse of botnets is good enough for password cracking so that the strength of the password can be measured. Secondly, it shows the involvement of ethical hackers who play the role of the workers. Those workers stimulated the HashXplorer. To get access to those official devices, ethical hackers penetrate the system [3]. So basically this paper also presents ethical hackers who will at first get control over those official devices and will crack the password of those devices to prevent and alert managers from using weak passwords. The cracker must use tools or algorithm tocrack any password. When all possible procedures of cracking the passwords fail then the only option left is the brute force attack. Brute-force is one types ofattack inwhichanattacker tries to log in to a user’s account by systematically checking every detail and then attempting all possible passwords match. It keeps on matching unless and until the correct match of that specific password is found [4]. Due to the arrival of secure cryptography hash function like MD5 and SHA1 passwords continue to become increasingly harder to crack. This paper specifies an easy and new technique of hash cracking called HashXplorer. 2.BOTNET STRUCTURE Botnets or Bot Networks consists of billions of computers that are interconnected and infected with malicious code. Botnets have different architectures, but it has its own structure as well. Botnet structures have been divided into three parts. Those parts include Botsandbotnets,Botmaster and Command and Control infrastructure(C&C). 2.1 BOTS and BOTNETS – Bots are neutral entities which are nonmalicious. When formed into groupings of bots or botnets, the resources are more dominantwhenformedinto groups of bots. A Botnet, therefore, is an appropriate definition where bots are highly adaptable worker bees that do their master’s building over a broad net. There are both “good bots” and “wicked bots.” So it simply depends on how the bots are used [5]. 2.2 BOTMASTER - The controller of botnets is knownasthe Botmaster. It also manages remote Bots and Botnet. [6] 2.3 COMMAND AND CONTROL INFRASTRUCTURE - This paper presents whether the use of botnets is worthy for password cracking anditsmethodologyusedforcracking.So C&C infrastructure is one of the essential features for this research. A Botnet is controlled by thisserverwhichiscalled the command and control server. The botnet architectures consist of the Bots, Botmaster and a control entity [6]. C&C servers carry out different malicious attacks. So it can be used to form strong networks of infected devices [7].
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1639 3.TYPES OF ATTACKS 1. Distributed Denial-of-Service Attacks (DDoS): A DDoS attack causes a loss of valuable services. The bandwidth of the victim network is undertaken by the attacker in his control [8]. 2. Spamming: By using thousands of bots, an illegal user can send large amounts of spam email and phishing emails [8]. 3. Sniffing Traffic: The sniffers are used to get sensitive as well as private information [8]. 4. Keylogging: It is faster for an attacker to extract sensitive information by using the keylogging [8]. 5. Spreading: Botnets caused the spreading of new botnets[8]. 6. Installing Advertisement: Financial advantages can get by setting up a fake website with some fake advertisements [8]. 7. Google AdSense abuse: This program offers companies the liability to display Google advertisements [8]. 4.RECENT ATTACKS ON BOTNETS Some examples of botnet-based attacks are discussed above on types of attacks part. The most common one is the DDoS. DDoS stands for a distributed form of denial of service. This attack is achieved by sending a largenumberofUDPpackets, ICMP requests, HTTP or TCP syn floods [6, 9]. The following figure shows that the distribution of DDoS attacks bytypes due to botnets increases drastically in 2018: Fig 1: Distribution of BOTNET assisted DDoS attacks by type, Q1 2018 [10] The distribution of BOTNET assisted attacks is increasing at a faster rate. The following figure below shows that the number of botnets assisted DDoS attacks increases dramatically from 2017 to 2018, Series 2 - Q4 2017 and Series 1 - Q4 2018: Fig 2: Distribution of BOTNET assisted DDoS attacks by hours, Q4 2017 and 2018 [10] Moreover, the number of Linux-based botnets declined slightly compared to the end of 2017 from 71% to 66%. On the other hand, the number of Windows-based botnets jumped from 29% to 34%. The figure elaborating the correlation between Windows-based and Linux-based botnet attacks is given below: Fig 3: Correlation between Windows- and Linux-based botnet attacks, Q1 2018 [10] 5.RELATED WORK There are recognized research in different areas of botnets as well as hash cracking. Any given hash value can be break using several different methods. Cracking a hash value regardless of the algorithmusedinvolvestwomethods.They are either straight forward Brute Force [11] or dictionary attack [12]. Some related work of this field is shown. 5.1Sonification of Network Traffic for Detecting and Learning About Botnet Behavior[13] Botnet's activities are quite similartonormalnetworktraffic. Their presence is quite impossible to detect. Intrusion detection systems cannot detect botnets. Usually, Bots scan the network to collect information which may help the botmaster to prepare forfuture attacks.Duetothesefeatures and in the research topic of “Sonification of Network Traffic for Detecting and Learning About Botnet Behavior” [13] shows that botnets are much for reliable and save to use for hashcracking.IDStechnologiesdependonseveraltechniques to detect botnets. It includes identifying repetitions of requests as well as statistical methods [14,15].
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1640 5.2 Botnet- Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art [16] The architectures of DDoS tools are very similar so as HashXplorer. The classificationoftheseattacktoolshasthree sections. The first one is the agent-based attack. Tools made on an agent-based attack are manufacture by solely focusing on the agent handler DDoS attack model. One example ofthis tool is Trinoo [18]. The second one is IRC based attack. For example Trinity. The third one is web-based DDoS attack which harms the web server by slowing it down [16]. 5.3 Usage of botnets for high-speed MD5 hash cracking [19] A brute force attack can be used to crack hash values. It involves a search of all possible keystobreakinga hashcode. The length of the key determines the capacity of a brute force attack. The longer key length takes more time to decode [11]. Among 144,250 records, breaking the old default model took around 20 seconds whereas the revised model took 10 hours and 20 minutes [20]. There are many open source MD5 hash cracker like BarsWF[19] which uses the CPU along with the GPU. The technique used in this research paper is quite similar to BarsWF[19]. oclHashCatPlus[21] is a closed source program for performing the brute force attack. It supports variousattack modes [21]. 5.4 A Cognitive Approach for Botnet Detection Using Artificial Immune System in the Cloud [22] Botnets can create a malicious network. Bots infect devices by creating a destructive pattern. This pattern is a chain of infected devices correlated with each other. As this pattern can be explained as a directed graph so ultimately they can form a group of connected computers which is controlled by the botmaster. So Botnets are useful for penetratinga device for hash cracking [22]. 5.5 An Advanced Hybrid Peer-to-Peer Botnet[23] In 2010 a research overviewedadvancedhybridpeertopeer botnet design. This proposed botnet is tougher to get shut down, to get monitored or to get hijacked. This botnet doesn't show in which way botmasterdeal withthebotnetto issue commands. The botmaster sets their service ports beforehand and thus knows their service ports. After the botnet is released, the botmaster could inject commands through these initial servant bots.Afterthebotmastermakes a report command and gets the first report with the information of service ports of all current servant bots, the botmaster can inject commands through an arbitrarily chosen servant bots [23]. 5.6 Concerns about Hash Cracking Aftereffect on Authentication Procedures inApplicationofCyberspace [24] The most shocking big news that broke out in crypto 2004 conference that one md5 hash got cracked. And after this event, one more news broke out that SHA1 also been cracked. This became a great concern to all researchers of the cryptography field. As SHA1 got cracked, the percentage of increased risk is limited. So, the impact of the hash cracking is not extensive. Cases that are influenced by the event of hash cracking are password authentication, Forensic Tool Utilizations. When it comes about the password, that can be leaked or stolen. But the chances of this gets decreased if the user renews it frequently or if the storage of the password gets relocated. People used to consider SHA1 most secure. But later research team from China and the USA have got out that it was a thousand times weaker than it was thought to be. The point is that cracking of SHA1 is not to tell us about the weakness of SHA1 but to remind that the development and strengthening of our existing security mechanism should get speed up [24]. 5.7 Cracking More Password Hashes with Patterns [25] It is one of the common mistakes that is done by application developer that they storeuserpasswordsindatabaseseither as plaintext or as unsalted hash values. Many hacking attempts get successful because of this reason. To seize hashes password attackers follow brute force, dictionary or rainbow table attacks to disclose the plain text passwords from their hashes. Dictionary attacks are the fastest way for cracking hash among this three-way. But it has an insufficient success rate. However, this success rate can get increased by applying new methods. There are ten patterns of password that can get cracked easily. These are called the identified pattern. These ten patterns are Appending, Prefixing, Inserting, Repeating, Sequencing, Replacing, Reversing, Capitalizing, Special-format, and Mixed Patterns. The password that is delicate are the threats for the authentication system. Attackers can use different attack method to crack hashes password, notably unsalted hashes. Security experts increased security awareness for strong passwords. Authentication system rules force the user to generate a strong password. But the same pattern password is used by most of the user. These same pattern password can be identified as well as it can get cracked easily. A pattern-based attack has been designed which upgrade dictionary attacks. This upgraded dictionary attacks can be considered as the new creation of dictionary attacks [25]. 5.8 Choosing Best Hashing Strategies and Hash Functions [26] Most used hash functions are Cryptographic hash functions and Dynamic hash functions. There are more hash functions like String hash functions, Geometric hash functions and so on. It is quite impossible to alter the result of the hash in a
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1641 powerful Cryptographic hash function. Due to this property, it can re-originate the authentic piece of data [26]. 6.Technology Used for HashXplorer For making HashXplorer, six main technologies are used. 1. Protocols: MQTT, HTTPS 2. Encryptions: Asymmetric (RSA 2048 bit) 3. Frameworks: Spring Boot 4. Database: MongoDB 5. Proxies: Tor 6. Servers and Load balancers: Apache, HAProxy To transfer all the data collected by a specific node to a server, the former requires a protocol that is bandwidth- efficient, energy-efficient and capable of working with limited hardware resources that are main memory and power supply. So for this reasons protocols such as Message Queue Telemetry Transport (MQTT) have been used for HashXplorer. Message Queue Telemetry Transport (MQTT) protocol is an application layer protocol designed for resource-constrained devices [3]. It is a published/subscribed protocol. It not only allows clients to connect as a publisher but also as a subscriber, or both. To make the HashXplorer undetectable by antiviruses, weneed a protocol that consumes low bandwidth and works in a pub/sub model. Since MQTT has these featurestofulfill both of this requirement, that’s why we have chosen it [27]. It uses a topic-based publish-subscribe architecture. HashXplorer uses Hypertext Transfer Protocol (HTTP). The HTTP protocol is used to post the commandsonspecificweb servers. They do not remain in connected mode. HTTP protocol can easily avoid current detection methods like firewalls. Since HTTP has these features, that’s why we have chosen it [28]. When an infected device is online, a message is issued from the device using the MQTT broker. The worker gets the message and sends a reply with a hash directory. The hash directory contains hash values. Those values are encrypted (RSA 2048 Bit). RSA stands for Rivest-Shamir-Adleman. It has the feature of secure data transmission. In HashXplorer, the encryption key is public, and it is different from the decryption key which is kept private [29]. The framework “Spring Boot” is used for backend implementation. HashXplorer uses "Java language”. MongoDB is the database used for HashXplorer. It is a database with not only the scalability but also with the flexibility that allows the users with the proper querying and indexing. We used MongoDB for our software because it can store and saves data in an amenable manner. It means that the data model can be changed from one field to another over time [30]. Tor is a network of routers which is called relays. It allows users with the facility to communicate anonymously.Thenetwork provides anonymity by giving traffic from clients called proxies. Tor hides the identities of the communicants. To conceal the identities, Tor encrypts messages in such a way that each relay can detect only the identities of the previous and next hops along the anonymous circuit. So Tor plays a vital role in security purpose [31]. In this paper, Apache is the server. Firstly, Apache is the most popular Web server which is running at a faster rate in today’s generation [32]. Secondly, Apache is a fully featured and high-performance Web server which means that its functionality, efficiency, and speed is better than any other server. Thirdly, the source code of Apache is available. Load balancing is a process for distributing traffic loads on connection lines in a balanced way for optimum traffic, maximizing throughput and minimizing response time. In this research, using HAProxy[34] as load balancerbecauseit is more simple to do configuration and available complete documentation [35]. Fig 4: System Architecture of HashXplorer When a device gets infectedbyHashXplorerBotnet,itopensa port of that device and subscribes to an MQTT broker on a particular topic and listens for an incoming message. The MQTT broker is connected to a load balancer through TOR. The load balancers are connected with workers. When an infected device comes online, a message is published from the devices using the MQTT broker and the worker get the message and send a replywiththehash/word list. After getting the hash/word list the device start brute force attack to crack the hash. If any of the devices get the plain text of the hash, the device sends the plain text to the worker using MQTT. 7. FEATURES OF HASHXPLORER 7.1 MD5 Hash Crack MD5 is a commonly used hash function. It generates 128 bit of hash value. MD5takesanarbitrarylengthmessageasinput and gives 128 bit of hash code as output. Although it was manufactured to use it as a cryptographic hash function, it suffers from large Infirmity[36]. The most common way of hash cracking is that user can try to hypothesize the password, hashing each estimation and it gets checked whether the hypothesized hash matches the hash is getting cracked. Whenever they get matched, that is the password.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1642 The two mostcommonformsofhypothesizingpasswordsare dictionary attack as well as another one is brute force attack. User can crack MD5 in this two way. There is no prevention of this two way. These can only be improved to less effective. 7.2 Sha1 Crack SHA1 is a cryptographic hash function which is used to procreate hashes for verifying the authenticity of digital content as well as it is similar to md5 or md4 algorithms. It forms almost unique 160 bit of hash value. It is typically represented as a 40 character string. SHA1 also can be cracked by brute force attack and dictionary attack. 7.3 Password List Generate In recent timepasswordsare used in nearly everymulti-user computer application. They are the most used legitimate method. In someoperations,auserispermittedtomaketheir secret password whereas, in some other system, a password is created for each user randomly. A random password generator is a software program or it can be a hardware device that generatesapasswordbytakingarandomnumber as an input [37]. 7.4 Brute Force attack to any target This is one of the procedures which is used to obtain private user's information such as username, passwords, PIN. It applies repetitive action for usernamesand passworduntilit becomes successful to get desired information. It can be executed by attackers to attempt to get access to encrypted data. It is a useful way for IT specialist to test the security of their networks [38]. 8 BENEFITS OF USING HASHXPLORER 8.1 Reliability HashXplorer is reliable because it gives a more accurate outcome compare to the methodology used. If one of the machine crashes, the whole system still can survive. It has higher availability and improved reliability. 8.2 Scalability As HashXplorer use distributed system so resources such as processing or storage capacity will get increased incrementally. More nodes can be connected, and that can scale up the method with increasing load. 8.3 Faster HashXplorer follows a distributed system. The distributed system is asystem that contains independentcomputersthat are connected using a distribution middleware. So distributed system divides a problem into many tasks. Each of which is solved by one or more devices. For this reason, it takes less time moreover it has more speed. For example, if there are 10000 CPU chips and each of that running at 60 MIPS. It is not possible to build a 600000 MIPS single processor since it would require 0.003nsecinstructioncycle. It upgrades performance through load distributing. 8.4 Security HashXplorer is more secure because of TOR and Encryption. Tor hides the identities of the communicants to conceal the identities. Tor encrypts messages in such a way that each relay can observe only the integrity of the previous and next hops along the anonymous circuit. So Tor plays a vital role in securitypurpose.AndEncryptionisaprocessthattransforms information referred as plain text by using an algorithm in a way so that it becomes incomprehensible to anyone except those people who has the understandingaboutthealgorithm and decryption process. Encryption allows protecting data securely that the user doesn't want any outsider to have access. So Tor and Encryption plays a vital role to increase the security of HashXplorer. 8.5 Reduces IT Costs When one device cannot take the workload, then the user needs to rely on multiple devices to make the work done. Relying on many devices is costly because the user has to spend money on many devices. As HashXplorer follows a distributed system, they help in sharing different resources and capabilities to provide the user with a single and integrated relevant network. For this reason, HashXplorer is cost-efficient 9 Why HashXplorer is undetectable HashXplorer is undetectable. Itcannotbedetectedevenwith the help of antivirus that helps the user todetect suchthings. If anyone installs it in the user’s device then the user will not be able to know that the user’s device is getting tracked by it and also recorded through a botnet. The botnet uses very light weighted protocol MQTT to communicate through it. It only runs one service at a time in the background. It also encrypts data and sends it to the server. All of these things make it undetectable. Even when we tried to test it with an antivirus whether it can detect this or not. None of the antiviruses could have detected this [27]. 10 Conclusion Nowadays, privacyhasbecomea significantconcern because the information is leaked almost like every single second. Each of the footprints of the industrial managers can be traced using the proper tracking mechanism while surfing the internet. They can be traced by interpreting their data. Unauthorized users destroy the device [39]. Weak passwords can be broken undoubtedly whereas stronger password takes more time[40]. However, to measure the strength of the password so that theindustrial managerscan be alert from using weaker passwords, HashXplorer can easily insert into that device and break the password by measuring its strength. It can prevent unauthorizedhackers from causing harm to the device. So HashXplorerisa reliable
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1643 software for law enforcement agencies for measuring the strength of the password. REFERENCES 1. Haque, A K M Bahalul.(2019).Big-Brother-In-1984-The- Modern-Era-Surveillance. International Journal of Scientific & Technology Research. 8. 186-190. 2. B. Stone-Gross et al., “Your botnet is my botnet: analysis of a botnet takeover,” in Proceedings of the 16th ACM conference on Computer and communicationssecurity - CCS ’09, Chicago, Illinois, USA, 2009, p. 635. 3. D. Thangavel, X. Ma, A. Valera, H.-X. Tan, and C. K.-Y.Tan, “Performance evaluation of MQTT and CoAP via a common middleware,” in 2014 IEEENinthInternational Conference on Intelligent Sensors,SensorNetworksand Information Processing (ISSNIP), Singapore, 2014, pp. 1–6. 4. “Brute-force & Dictionary Attacks: Prevention & Detection Techniques,” Rapid7. [Online]. Available: https://www.rapid7.com/fundamentals/brute-force- and-dictionary-attacks/. [Accessed: 20-Feb-2019]. 5. Yin, C., Zou, M., Iko, D., & Wang, J. (2013). Botnet detection based on correlation of malicious behaviors. International Journal ofHybridInformationTechnology, 6(6), 291-300 6. M. Rahimipour and D. S. Jamali, “A Survey on Botnets and Web-based Botnet Characteristics”. International Journal of Computer Science Engineering and Technology,vol. 4, no. 11, p. 5, 2014. 7. “What is command-and-control server (C&C server)? - Definition from WhatIs.com,” WhatIs.com. [Online]. Available: https://whatis.techtarget.com/definition/command- and-control-server-CC-server.[Accessed:20-Feb-2019]. 8. Sadeghian and M. Zamani, "Detecting and preventing DDoS attacks in botnets by the help of self triggered black holes," 2014 Asia-Pacific ConferenceonComputer Aided System Engineering (APCASE), South Kuta, 2014, pp. 38-42. 9. Eslahi, M., Salleh, R., & Anuar, N. B. (2012). Bots and botnets: An overview of characteristics, detection and challenges. 2012 IEEE International Conference on Control System, Computing and Engineering. 10. “DDoS attacks in Q1 2018.” [Online]. Available: https://securelist.com/ddos-report-in-q1- 2018/85373/. [Accessed: 20-Feb-2019]. 11. Vu, J. Han, H. Nguyen, Y. Kim and E. Im, "A homogeneous parallel brute force cracking algorithm on the GPU," ICTC 2011, Seoul, 2011, pp. 561-564. 12. M. M. Albashear and H. A. Ali, "The Effect of the Initial Retransmission Timeout upon the Dictionary Attack Delay," 2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE), Khartoum, 2018, pp. 1-6. 13. M. Debashi and P. Vickers, “Sonification of Network Traffic for Detecting and Learning About Botnet Behavior,” IEEE Access, vol. 6, pp. 33826–33839, 2018. 14. Stalmans and B. Irwin, A Framework for DNS Based Detection and Mitigation of Malware Infections on a Network. . “A framework for DNS based detectionandmitigationof malware infections on a network,’’ in Proc. IEEE 15. J. Zhang, R. Perdisci, W. Lee, U. Sarfraz, and X. Luo, “Detecting Stealthy P2P Botnets Using Statistical Traffic Fingerprints,” in Proceedingsofthe2011IEEE/IFIP41st International Conference on Dependable Systems&Networks, Washington, DC, USA, 2011, pp. 121–132. 16. E. Alomari, S. Manickam, B. B. Gupta, S. Karuppayah,and R. Alfaris, “Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art,” International Journal of Computer Applications, vol. 49, no. 7, pp. 24–32, Jul. 2012. 17. B. Gupta, R. C. Joshi, M. Misra, ―Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks DetectioninISPNetwork,‖International Journal of Computer Theory and Engineering (IJCTE) 1 (1), pp. 71-80, 2009. 18. P. J. Criscuolo, "Distributed Denial of Service: Trin00, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht CIAC-2319," DTIC Document, 2000. 19. J. Anish Dev, "Usage of botnets for high speed MD5 hash cracking," Third International ConferenceonInnovative Computing Technology (INTECH 2013), London, 2013, pp. 314-320. 20. L. Bošnjak, J. Sreš and B. Brumen, "Brute-force and dictionary attack on hashed real-world passwords," 2018 41st International Convention on Informationand Communication Technology, Electronics and Microelectronics(MIPRO),Opatija,2018,pp.1161-1166. 21. “hashcat - advanced password recovery.” [Online]. Available: https://hashcat.net/hashcat/.[Accessed:20- Feb-2019]. 22. V. R. Kebande and H. S. Venter, "A cognitiveapproachfor botnet detection using Artificial Immune System in the cloud," 2014 Third International Conference on Cyber Security, Cyber Warfareand Digital Forensic(CyberSec), Beirut, 2014, pp. 52-57.
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1644 23. P. Wang, S. Sparks and C. C. Zou, "An Advanced Hybrid Peer-to-Peer Botnet," in IEEE Transactions on Dependable and Secure Computing,vol.7,no.2,pp.113- 127, April-June 2010. 24. S. Wang, H. Ke, J. Huang and C. Chan, "Concerns about Hash Cracking Aftereffect on AuthenticationProcedures in Applications of Cyberspace," in IEEE Aerospace and Electronic Systems Magazine, vol. 22, no. 1, pp. 3-7, Jan. 2007. 25. E. İ. Tatlı, "Cracking More Password Hashes With Patterns," in IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1656-1665, Aug. 2015. 26. M. Singh and D. Garg, "Choosing Best Hashing Strategies and Hash Functions," 2009 IEEE International Advance Computing Conference, Patiala, 2009, pp. 50-55. 27. Bari, S. T. Nisa, and A. B. Haque, “Osploit - A Privacy Invader RATforCyber ThreatIntelligence”.International Journal of Computer Science and Network, vol. 7, no. 6, p. 5, 2018. 28. “HTTP-Botnets: The Dark Side of a Standard Protocol!,” Security Affairs, 22-Apr-2013. [Online]. Available: https://securityaffairs.co/wordpress/13747/cyber- crime/http-botnets.html. [Accessed: 20-Feb-2019]. 29. M. Singh and D. Garg, "Choosing Best Hashing Strategies and Hash Functions," 2009 IEEE International Advance Computing Conference, Patiala, 2009, pp. 50-55. 30. “What Is MongoDB? | MongoDB.” [Online]. Available: https://www.mongodb.com/what-is-mongodb. [Accessed: 20-Feb-2019]. 31. W. B. Moore, C. Wacek, and M. Sherr, “Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and Steady Wins the Race with Tortoise,” in Proceedings of the 27th Annual Computer Security Applications Conference, New York, NY, USA, 2011, pp. 207–216. 32. “Welcome to The Apache Software Foundation!” [Online].Available:http://www.apache.org/.[Accessed: 20-Feb-2019]. 33. Yiming Hu, A. Nanda and Qing Yang, "Measurement, analysis and performance improvement of the Apache Web server," 1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305), Scottsdale,AZ,USA,1999,pp.261-267. 34. “HAProxy - The Reliable, High Performance TCP/HTTP Load Balancer.” [Online]. Available: http://www.haproxy.org/. [Accessed: 19-Feb-2019]. 35. H. Handoko, S. M. Isa, S. Si and M. Kom, "HighAvailability Analysis with Database Cluster, Load Balancer and Virtual Router Redudancy Protocol," 2018 3rd International Conference on Computer and Communication Systems (ICCCS), Nagoya, 2018, pp. 482-486. 36. K. Kasgar and M. K. Dhariwal, “A Review Paper of Message Digest 5 (MD5),” Management Research, vol.1, no. 4, p. 7, 2013. 37. M. D. Leonhard and V. N. Venkatakrishnan, "A comparative study of three random password generators," 2007 IEEE International Conference on Electro/Information Technology, Chicago, IL, 2007, pp. 227-232. 38. “What a brute force attack is (with examples) How to protect against them,”Available: https://www.comparitech.com/blog/information- security/brute-force-attack/. [Accessed: 19-Feb-2019]. 39. Haque, AKM Bahalul, Farhat Tasnim Progga, and Md Amdadul Bari. "An Analytical Study of Web Tracking: In a Nutshell."International Journal of Scientific & Engineering ResearchVolume9,Issue11,P-1742-1746, November-2018 40. “Lab: Password cracking and social engineering8.” [Online]. Available: http://ver.miun.se/courses/security/dasak/pwdguess. pdf. [Accessed: 20-Feb-2019].