SlideShare una empresa de Scribd logo
1 de 21
A STUDY ON BOTNET
ARCHITECTURE
Seminar Guide,
SHIBU V.S
Asst.Professor

By,

BINI B.S
M1,CSE

1
Overview
Introduction
How Botnet Works
Botnet Life Cycle

Botnet Architecture
Centralized Botnet Architecture.
Peer to Peer Botnet Architecture (P2P).

Hybrid Botnet Architecture.
Hyper Text Transfer Protocol with Peer to Peer (HttP2P)
Botnet Architecture.

Self-healing system Architecture.
Conclusion
References

2
Introduction
 BOTNET or Robot Network is the biggest network security
threats faced by home users, organizations, and governments.
 A “BOTNET” is a network of compromised computers (“bots”)
connected to the Internet that is controlled by a remote
attacker (“botmaster”).
 Created by intelligent and up to date hackers.
3
4
Botnet Life Cycle
• Once botnet infects a computer, A bot usually
steals something such as personal information,
Authentication credentials or Credit card data.
• The machine then becomes part of the botnet,
ready to perform designated malicious tasks.
• Common functions in most botnets include
DDoS attacks, Click fraud ,spam, phishing etc.

5
6

Botnet Life Cycle
Botnet Architecture
 Different types of BOTNET architectures:

i.
ii.
iii.
iv.

Centralized Botnet Architecture.
Peer to Peer Botnet Architecture (P2P).
Hybrid Botnet Architecture
Hyper Text Transfer Protocol with Peer
to Peer Botnet Architecture.
7
I. Centralized Botnet Architecture
• Oldest and easiest architecture to manage and
control botnets.
• All the zombie computers is being supervised
from a center point, which makes them easy to
manage.
• The disadvantage : Entire botnet can be
shutdown if the defender captures the C&C
server.
• Examples: AgoBot, SDBot, SpyBot, GTBot etc.

8
9
II.Peer to Peer Botnet Architecture
• Used to remove the drawbacks of centralized
architecture.
• P2P based n/w is much harder to shutdown.
• In this architecture a node can act as a client(soldier
bot) as well as a server(supervisor bot) and there is
no centralized point as C&C server.
• Examples : Phatbot and Peacomm.

10
11
III. Hybrid Botnet Architecture
• It is harder to be shut down, monitored, and hijacked.
• A botmaster could easily monitor the entire botnet by
issuing a report command , and make it harder from
detecting bots.

12
13
IV. Hyper Text Transfer Protocol with Peer to Peer:
• The Supervisor-Bot cipher the message.
• It continuously search for Soldier-Bot, and when
found deliver message to it.
• While the Soldier-Bot does not contact
dynamically to Supervisor-Bot rather it waits for
a call from its supervisor.
14
Self healing System Architecture
• Concept is inspired by the way organisms adapt
to their environment by developing immunity
against harmful viruses, bacteria and toxins.
• It is based on a study of two HTTP-based
botnets, Zeus and Black energy, and two P2P
botnets , Waledac and Storm.

15
Self healing System Architecture (cont..)
• It enables networked systems to look
continuously for any alteration of “normal
behavior” and apply appropriate corrective
actions.
• It can recognize when it is not operating
correctly and, with little or no human
intervention occurs.
16
V. Self healing System Architecture
(cont..)
• It is optimized for a domain controlled network
that connects to a large geographic region.
• Application is mainly in Defense-in-depth security
solution for domain-controlled enterprise
networks.
17
18

Self-healing System Architecture
Conclusion
• Botnets have a direct influence on the number of
cybercrimes committed. We have to be well
prepared for future botnets. It is an ongoing war
between botnet attacks and defenses.

19
Reference
• [1] Ihsan Ullah, Naveed Khan, Hatim A.Aboalsamh,“ SURVEY
ON BOTNET: ITS ARCHITECTURE, DETECTION, PREVENTION
AND MITIGATION”, 978-1-4673-5200-0/13/$31.00 ©2013 IEEE.
• [2]Bhagath Singh Jayaprakasam,” MODELING BOTNET IN PEER
TO PEER SYSTEMSPRESENTED” Apr 28, 2011.
• [3] Adeeb Alhomoud and Irfan Awan ,Jules Ferdinand Pagna
Disso, Muhammad Younas,“A Next- Generation Approach to
Combating Botnets” 0018-9162/13/$31.00 © 2013 IEEE.

20
21

Más contenido relacionado

La actualidad más candente

Botnets presentation
Botnets presentationBotnets presentation
Botnets presentationMahmoud Ibra
 
Global Botnet Detector
Global Botnet DetectorGlobal Botnet Detector
Global Botnet DetectorBrenton Mallen
 
A Brief Incursion into Botnet Detection
A Brief Incursion into Botnet DetectionA Brief Incursion into Botnet Detection
A Brief Incursion into Botnet DetectionAnant Narayanan
 
Botnets In Cyber Security
Botnets In Cyber SecurityBotnets In Cyber Security
Botnets In Cyber Securitysumit saurav
 
Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Aniq Eastrarulkhair
 
All you know about Botnet
All you know about BotnetAll you know about Botnet
All you know about BotnetNaveen Titare
 
A Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior AnalysisA Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior Analysisidescitation
 
Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet ArchitectureBini Bs
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...OWASP Delhi
 

La actualidad más candente (20)

BOTNET
BOTNETBOTNET
BOTNET
 
Botnet Architecture
Botnet ArchitectureBotnet Architecture
Botnet Architecture
 
Botnets 101
Botnets 101Botnets 101
Botnets 101
 
What is botnet?
What is botnet?What is botnet?
What is botnet?
 
introduction to Botnet
introduction to Botnetintroduction to Botnet
introduction to Botnet
 
about botnets
about botnetsabout botnets
about botnets
 
Botnets presentation
Botnets presentationBotnets presentation
Botnets presentation
 
Botnets
BotnetsBotnets
Botnets
 
Global Botnet Detector
Global Botnet DetectorGlobal Botnet Detector
Global Botnet Detector
 
A Brief Incursion into Botnet Detection
A Brief Incursion into Botnet DetectionA Brief Incursion into Botnet Detection
A Brief Incursion into Botnet Detection
 
Botnet
BotnetBotnet
Botnet
 
Botnets
BotnetsBotnets
Botnets
 
Botnets In Cyber Security
Botnets In Cyber SecurityBotnets In Cyber Security
Botnets In Cyber Security
 
Botnet
BotnetBotnet
Botnet
 
Bots and Botnet
Bots and BotnetBots and Botnet
Bots and Botnet
 
Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1
 
All you know about Botnet
All you know about BotnetAll you know about Botnet
All you know about Botnet
 
A Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior AnalysisA Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior Analysis
 
Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet Architecture
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
 

Destacado

evocative architecture_final
evocative architecture_finalevocative architecture_final
evocative architecture_finalSMMCAnagpur
 
Preparing the interviews 2
Preparing the interviews 2Preparing the interviews 2
Preparing the interviews 2Rosamsamper
 
Social - Andreas Grasmo Johansen - Skill AS
Social - Andreas Grasmo Johansen - Skill ASSocial - Andreas Grasmo Johansen - Skill AS
Social - Andreas Grasmo Johansen - Skill ASLiselotte Haugsnes
 
WHERE IS SINDH....A PETITION TO HON. PRIME MINISTER NARENDRA MODI
WHERE IS SINDH....A PETITION TO HON. PRIME MINISTER NARENDRA MODIWHERE IS SINDH....A PETITION TO HON. PRIME MINISTER NARENDRA MODI
WHERE IS SINDH....A PETITION TO HON. PRIME MINISTER NARENDRA MODIBIREN SHAH
 
как работать с тестами. инструкция для ученика
как работать с тестами. инструкция для ученикакак работать с тестами. инструкция для ученика
как работать с тестами. инструкция для ученикаukraina07
 
Questions that we are afraid to ask...
Questions that we are afraid to ask... Questions that we are afraid to ask...
Questions that we are afraid to ask... TezLaguna
 
4.zitoplasma.organuluak.
4.zitoplasma.organuluak.4.zitoplasma.organuluak.
4.zitoplasma.organuluak.Hod Ei
 
Sand and Stone
Sand and StoneSand and Stone
Sand and StoneTezLaguna
 
Educational technology and innovation report
Educational technology and innovation reportEducational technology and innovation report
Educational technology and innovation reportJuner Gultiano
 

Destacado (20)

evocative architecture_final
evocative architecture_finalevocative architecture_final
evocative architecture_final
 
Questions to ask your hearing specialist
Questions to ask your hearing specialistQuestions to ask your hearing specialist
Questions to ask your hearing specialist
 
Preparing the interviews 2
Preparing the interviews 2Preparing the interviews 2
Preparing the interviews 2
 
Social - Andreas Grasmo Johansen - Skill AS
Social - Andreas Grasmo Johansen - Skill ASSocial - Andreas Grasmo Johansen - Skill AS
Social - Andreas Grasmo Johansen - Skill AS
 
WHERE IS SINDH....A PETITION TO HON. PRIME MINISTER NARENDRA MODI
WHERE IS SINDH....A PETITION TO HON. PRIME MINISTER NARENDRA MODIWHERE IS SINDH....A PETITION TO HON. PRIME MINISTER NARENDRA MODI
WHERE IS SINDH....A PETITION TO HON. PRIME MINISTER NARENDRA MODI
 
как работать с тестами. инструкция для ученика
как работать с тестами. инструкция для ученикакак работать с тестами. инструкция для ученика
как работать с тестами. инструкция для ученика
 
CTR GUYS
CTR GUYSCTR GUYS
CTR GUYS
 
Questions that we are afraid to ask...
Questions that we are afraid to ask... Questions that we are afraid to ask...
Questions that we are afraid to ask...
 
4.zitoplasma.organuluak.
4.zitoplasma.organuluak.4.zitoplasma.organuluak.
4.zitoplasma.organuluak.
 
8 Reasons Hearing Loss is More Dangerous Than You Think
8 Reasons Hearing Loss is More Dangerous Than You Think8 Reasons Hearing Loss is More Dangerous Than You Think
8 Reasons Hearing Loss is More Dangerous Than You Think
 
Michelle
MichelleMichelle
Michelle
 
Spotter 1
Spotter 1Spotter 1
Spotter 1
 
Skill
SkillSkill
Skill
 
Brazil
BrazilBrazil
Brazil
 
Phonics ideas
Phonics ideasPhonics ideas
Phonics ideas
 
Sand and Stone
Sand and StoneSand and Stone
Sand and Stone
 
Apostila anvisa01
Apostila anvisa01Apostila anvisa01
Apostila anvisa01
 
Educational technology and innovation report
Educational technology and innovation reportEducational technology and innovation report
Educational technology and innovation report
 
Anp 1999
Anp 1999Anp 1999
Anp 1999
 
6 Ways Your Brain Transforms Sound into Emotion
6 Ways Your Brain Transforms Sound into Emotion6 Ways Your Brain Transforms Sound into Emotion
6 Ways Your Brain Transforms Sound into Emotion
 

Similar a Study on Botnet Architecture

Detection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P BotnetsDetection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P BotnetsCSCJournals
 
Understanding the Botnet Phenomenon
Understanding the Botnet PhenomenonUnderstanding the Botnet Phenomenon
Understanding the Botnet PhenomenonDr. Amarjeet Singh
 
Botnets And Alife
Botnets And AlifeBotnets And Alife
Botnets And AlifeZotronix
 
Detecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT BotnetsDetecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT BotnetsFarjad Noor
 
Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)sadique_ghitm
 
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)André Fucs de Miranda
 
paper review about botnet
paper review about botnetpaper review about botnet
paper review about botnetJhang Raymond
 
IoT Honeypots: State of the Art
IoT Honeypots: State of the ArtIoT Honeypots: State of the Art
IoT Honeypots: State of the ArtBiagio Botticelli
 
Untitled document.pdf
Untitled document.pdfUntitled document.pdf
Untitled document.pdfgoogle
 
Botnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdfBotnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdfuzair
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The BotmasterIJERA Editor
 
Fight fire with fire draft
Fight fire with fire draftFight fire with fire draft
Fight fire with fire draftNishant Agrawal
 
Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques SafiUllah Saikat
 
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
[2010 CodeEngn Conference 04] Max - Fighting against Botnet[2010 CodeEngn Conference 04] Max - Fighting against Botnet
[2010 CodeEngn Conference 04] Max - Fighting against BotnetGangSeok Lee
 
Botnet detection by Imitation method
Botnet detection  by Imitation methodBotnet detection  by Imitation method
Botnet detection by Imitation methodAcad
 
Bot net detection by using ssl encryption
Bot net detection by using ssl encryptionBot net detection by using ssl encryption
Bot net detection by using ssl encryptionAcad
 
“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”iosrjce
 

Similar a Study on Botnet Architecture (20)

Detection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P BotnetsDetection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P Botnets
 
Understanding the Botnet Phenomenon
Understanding the Botnet PhenomenonUnderstanding the Botnet Phenomenon
Understanding the Botnet Phenomenon
 
Botnets And Alife
Botnets And AlifeBotnets And Alife
Botnets And Alife
 
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
 
Detecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT BotnetsDetecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT Botnets
 
Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)
 
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)
 
paper review about botnet
paper review about botnetpaper review about botnet
paper review about botnet
 
BOTLAB excersise
BOTLAB excersiseBOTLAB excersise
BOTLAB excersise
 
IoT Honeypots: State of the Art
IoT Honeypots: State of the ArtIoT Honeypots: State of the Art
IoT Honeypots: State of the Art
 
Untitled document.pdf
Untitled document.pdfUntitled document.pdf
Untitled document.pdf
 
Botnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdfBotnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdf
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The Botmaster
 
Fight fire with fire draft
Fight fire with fire draftFight fire with fire draft
Fight fire with fire draft
 
Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques
 
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
[2010 CodeEngn Conference 04] Max - Fighting against Botnet[2010 CodeEngn Conference 04] Max - Fighting against Botnet
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
 
Botnet detection by Imitation method
Botnet detection  by Imitation methodBotnet detection  by Imitation method
Botnet detection by Imitation method
 
Bot net detection by using ssl encryption
Bot net detection by using ssl encryptionBot net detection by using ssl encryption
Bot net detection by using ssl encryption
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”
 

Último

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Último (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

Study on Botnet Architecture

  • 1. A STUDY ON BOTNET ARCHITECTURE Seminar Guide, SHIBU V.S Asst.Professor By, BINI B.S M1,CSE 1
  • 2. Overview Introduction How Botnet Works Botnet Life Cycle Botnet Architecture Centralized Botnet Architecture. Peer to Peer Botnet Architecture (P2P). Hybrid Botnet Architecture. Hyper Text Transfer Protocol with Peer to Peer (HttP2P) Botnet Architecture. Self-healing system Architecture. Conclusion References 2
  • 3. Introduction  BOTNET or Robot Network is the biggest network security threats faced by home users, organizations, and governments.  A “BOTNET” is a network of compromised computers (“bots”) connected to the Internet that is controlled by a remote attacker (“botmaster”).  Created by intelligent and up to date hackers. 3
  • 4. 4
  • 5. Botnet Life Cycle • Once botnet infects a computer, A bot usually steals something such as personal information, Authentication credentials or Credit card data. • The machine then becomes part of the botnet, ready to perform designated malicious tasks. • Common functions in most botnets include DDoS attacks, Click fraud ,spam, phishing etc. 5
  • 7. Botnet Architecture  Different types of BOTNET architectures: i. ii. iii. iv. Centralized Botnet Architecture. Peer to Peer Botnet Architecture (P2P). Hybrid Botnet Architecture Hyper Text Transfer Protocol with Peer to Peer Botnet Architecture. 7
  • 8. I. Centralized Botnet Architecture • Oldest and easiest architecture to manage and control botnets. • All the zombie computers is being supervised from a center point, which makes them easy to manage. • The disadvantage : Entire botnet can be shutdown if the defender captures the C&C server. • Examples: AgoBot, SDBot, SpyBot, GTBot etc. 8
  • 9. 9
  • 10. II.Peer to Peer Botnet Architecture • Used to remove the drawbacks of centralized architecture. • P2P based n/w is much harder to shutdown. • In this architecture a node can act as a client(soldier bot) as well as a server(supervisor bot) and there is no centralized point as C&C server. • Examples : Phatbot and Peacomm. 10
  • 11. 11
  • 12. III. Hybrid Botnet Architecture • It is harder to be shut down, monitored, and hijacked. • A botmaster could easily monitor the entire botnet by issuing a report command , and make it harder from detecting bots. 12
  • 13. 13
  • 14. IV. Hyper Text Transfer Protocol with Peer to Peer: • The Supervisor-Bot cipher the message. • It continuously search for Soldier-Bot, and when found deliver message to it. • While the Soldier-Bot does not contact dynamically to Supervisor-Bot rather it waits for a call from its supervisor. 14
  • 15. Self healing System Architecture • Concept is inspired by the way organisms adapt to their environment by developing immunity against harmful viruses, bacteria and toxins. • It is based on a study of two HTTP-based botnets, Zeus and Black energy, and two P2P botnets , Waledac and Storm. 15
  • 16. Self healing System Architecture (cont..) • It enables networked systems to look continuously for any alteration of “normal behavior” and apply appropriate corrective actions. • It can recognize when it is not operating correctly and, with little or no human intervention occurs. 16
  • 17. V. Self healing System Architecture (cont..) • It is optimized for a domain controlled network that connects to a large geographic region. • Application is mainly in Defense-in-depth security solution for domain-controlled enterprise networks. 17
  • 19. Conclusion • Botnets have a direct influence on the number of cybercrimes committed. We have to be well prepared for future botnets. It is an ongoing war between botnet attacks and defenses. 19
  • 20. Reference • [1] Ihsan Ullah, Naveed Khan, Hatim A.Aboalsamh,“ SURVEY ON BOTNET: ITS ARCHITECTURE, DETECTION, PREVENTION AND MITIGATION”, 978-1-4673-5200-0/13/$31.00 ©2013 IEEE. • [2]Bhagath Singh Jayaprakasam,” MODELING BOTNET IN PEER TO PEER SYSTEMSPRESENTED” Apr 28, 2011. • [3] Adeeb Alhomoud and Irfan Awan ,Jules Ferdinand Pagna Disso, Muhammad Younas,“A Next- Generation Approach to Combating Botnets” 0018-9162/13/$31.00 © 2013 IEEE. 20
  • 21. 21