SlideShare a Scribd company logo
1 of 12
Botnet

Group 3 IT 350
Definitions


Bot
−
−



Short for robot
Refers to an infected computer that takes
orders and reports back (Gassen et all,
2012)

Botnet
−

A network of bots


Botmaster
−
−



Also referred to botherder
The person that controls a botnet (Gassen
et all, 2012)

C & C Server
−

Command and control server used by a
botmaster to communicate with bots
(Gassen et all, 2012)
Attack Methods




Infections can occur through trojans and
worms
Clicking on infected links and opening
infected email attachments can cause
infections
Vulnerabilities






Keeping all software, including OS, patched
and up to date is the best defense
At first attacks were only successful on
weak systems
Now malware can join secure computers to
botnets
–

Many times antivirus software is unaware of
the infection
The Extent of the Damage







It is estimated that hundreds of millions of
computers are members of botnets
(Greengard, 2012)
Most of the time the user is unaware of the
infection
These botnets are being used to send spam
Also being used to steal identities, credit
card information, and trade secrets
(Greengard, 2012)


Attacks are primarily uses to generate
income
–



Stolen credit card numbers are worth $10700 on the black market (Gassen et all,
2012)

Attacks may also have a military or political
motive (Gassen et all, 2012)
References
Gassen, J, Gerhards-Padilla, E, Martini, P. (2012). Current Botnet
�Techniques and Countermeasures. PIK �Praxis der
Informationsverarbeitung und Kommunikation. Vol 35 Issue 1, p310.
Greengard, Samuel. (2012). The War Against Botnets. Communications
of the ACM. Vol 55

Issue 2, p16-18.

More Related Content

What's hot

Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
Patty Ramsey
 
ransomware_infographic-6-2016
ransomware_infographic-6-2016ransomware_infographic-6-2016
ransomware_infographic-6-2016
Sal Rodriguez
 

What's hot (11)

Dickmaster
DickmasterDickmaster
Dickmaster
 
Botnet
BotnetBotnet
Botnet
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
 
Electronic mail and online safety (Sep 17, 2008) (beginner)
Electronic mail and online safety (Sep 17, 2008) (beginner)Electronic mail and online safety (Sep 17, 2008) (beginner)
Electronic mail and online safety (Sep 17, 2008) (beginner)
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
Presentation on computer virus
Presentation on computer virusPresentation on computer virus
Presentation on computer virus
 
ransomware_infographic-6-2016
ransomware_infographic-6-2016ransomware_infographic-6-2016
ransomware_infographic-6-2016
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 

Viewers also liked

Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet Architecture
Bini Bs
 
Botnet Detection Techniques
Botnet Detection TechniquesBotnet Detection Techniques
Botnet Detection Techniques
Team Firefly
 
West Side Neighborhood In Newark
West Side Neighborhood In Newark West Side Neighborhood In Newark
West Side Neighborhood In Newark
APA-NJ
 
Lighting Design Project
Lighting Design Project Lighting Design Project
Lighting Design Project
dezyneecole
 
Green Building Construction in India
Green Building Construction in IndiaGreen Building Construction in India
Green Building Construction in India
intellobuild
 

Viewers also liked (20)

Botnets
BotnetsBotnets
Botnets
 
Botnet detection based on anomaly and community detection
Botnet detection based on anomaly and community detectionBotnet detection based on anomaly and community detection
Botnet detection based on anomaly and community detection
 
Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet Architecture
 
Botnet Detection Techniques
Botnet Detection TechniquesBotnet Detection Techniques
Botnet Detection Techniques
 
West Side Neighborhood In Newark
West Side Neighborhood In Newark West Side Neighborhood In Newark
West Side Neighborhood In Newark
 
Global Botnet Detector
Global Botnet DetectorGlobal Botnet Detector
Global Botnet Detector
 
Lighting Design Project
Lighting Design Project Lighting Design Project
Lighting Design Project
 
Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1
 
evocative architecture_final
evocative architecture_finalevocative architecture_final
evocative architecture_final
 
Botnet
Botnet Botnet
Botnet
 
Barrier free architecture in hospitals
Barrier free architecture in hospitals Barrier free architecture in hospitals
Barrier free architecture in hospitals
 
Rural development planning
Rural development planningRural development planning
Rural development planning
 
Barrier Free Design
Barrier Free DesignBarrier Free Design
Barrier Free Design
 
theories in rural development and planning
 theories in rural development  and planning theories in rural development  and planning
theories in rural development and planning
 
Interior lighting design tips
Interior lighting design tipsInterior lighting design tips
Interior lighting design tips
 
Green building
Green buildingGreen building
Green building
 
Neighborhood
NeighborhoodNeighborhood
Neighborhood
 
Barrier free architectural design
Barrier free architectural design Barrier free architectural design
Barrier free architectural design
 
Neighbourhood Planning
Neighbourhood PlanningNeighbourhood Planning
Neighbourhood Planning
 
Green Building Construction in India
Green Building Construction in IndiaGreen Building Construction in India
Green Building Construction in India
 

Similar to Part One - What is a Botnet?

1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
anjanaarts2014
 
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
DCIT, a.s.
 
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Editor IJCATR
 
What are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdfWhat are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdf
info309708
 

Similar to Part One - What is a Botnet? (20)

Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Botnet
BotnetBotnet
Botnet
 
Botnets
BotnetsBotnets
Botnets
 
Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1
 
Hack the hack
Hack the hackHack the hack
Hack the hack
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
A review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsA review botnet detection and suppression in clouds
A review botnet detection and suppression in clouds
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
 
BOTNETS
BOTNETSBOTNETS
BOTNETS
 
BOTNET
BOTNETBOTNET
BOTNET
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdf
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
 
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
 
Computer security
Computer securityComputer security
Computer security
 
Botnet
BotnetBotnet
Botnet
 
Cybersecurity -Terms.
Cybersecurity -Terms.Cybersecurity -Terms.
Cybersecurity -Terms.
 
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
What are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdfWhat are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdf
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Part One - What is a Botnet?

  • 2. Definitions  Bot − −  Short for robot Refers to an infected computer that takes orders and reports back (Gassen et all, 2012) Botnet − A network of bots
  • 3.  Botmaster − −  Also referred to botherder The person that controls a botnet (Gassen et all, 2012) C & C Server − Command and control server used by a botmaster to communicate with bots (Gassen et all, 2012)
  • 4. Attack Methods   Infections can occur through trojans and worms Clicking on infected links and opening infected email attachments can cause infections
  • 5.
  • 6. Vulnerabilities    Keeping all software, including OS, patched and up to date is the best defense At first attacks were only successful on weak systems Now malware can join secure computers to botnets – Many times antivirus software is unaware of the infection
  • 7. The Extent of the Damage     It is estimated that hundreds of millions of computers are members of botnets (Greengard, 2012) Most of the time the user is unaware of the infection These botnets are being used to send spam Also being used to steal identities, credit card information, and trade secrets (Greengard, 2012)
  • 8.  Attacks are primarily uses to generate income –  Stolen credit card numbers are worth $10700 on the black market (Gassen et all, 2012) Attacks may also have a military or political motive (Gassen et all, 2012)
  • 9.
  • 10.
  • 11.
  • 12. References Gassen, J, Gerhards-Padilla, E, Martini, P. (2012). Current Botnet �Techniques and Countermeasures. PIK �Praxis der Informationsverarbeitung und Kommunikation. Vol 35 Issue 1, p310. Greengard, Samuel. (2012). The War Against Botnets. Communications of the ACM. Vol 55 Issue 2, p16-18.

Editor's Notes

  1. {}