logo

The Botnets Cyber Crimes Report

   

Added on  2022-08-20

12 Pages2528 Words18 Views
 | 
 | 
 | 
Running head: Botnets Cyber Crimes 1
BOTNETS S CYBERCRIMES
[Student name]
[University name]
Research on the Botnets s Cybercrimes
The Botnets Cyber Crimes Report_1

2Botnets Cyber Crimes
Table of Contents
1 CHAPTER TWO LITERATURE REVIEW....................................................................4
1.1 INTRODUCTION.............................................................................................. 4
1.2 CHARACTERISTICS OF BOTNETS ...................................................................4
1.2.1 What a bot and a Botnets ?.....................................................................4
1.2.2 Botnets s Malicious Activities...................................................................4
1.2.2.1 DDOS.................................................................................................... 4
1.2.2.2 Spamming............................................................................................ 4
1.2.2.3 Thieving Personal Information..............................................................4
1.2.2.4 Illegal Hosting, Sale or Rent Services...................................................4
1.2.2.5 Click Fraud and Adware........................................................................4
1.3 Botnets Lifecycle........................................................................................... 4
1.3.1 Infection and Propagation........................................................................4
1.3.2 Rallying.................................................................................................... 4
1.3.3 Commands and Reports..........................................................................4
1.3.4 Abandon.................................................................................................. 4
1.3.5 Securing the Botnets ..............................................................................4
1.4 Command and Control (C&C) Mechanism......................................................5
1.4.1 Centralised C&C...................................................................................... 5
1.4.2 Decentralised C&C...................................................................................5
1.4.3 Hybrid C&C.............................................................................................. 5
1.5 Botnets protocols.......................................................................................... 5
1.5.1 IRC-Based Botnets .................................................................................. 5
1.5.2 P2P Botnets ............................................................................................ 5
1.5.3 HTTP-Based Botnets ............................................................................... 5
1.6 BOTNETS DETECTION.................................................................................... 5
1.6.1 Host-Based.............................................................................................. 5
1.6.2 Network-Based........................................................................................ 5
1.6.3 Signature-based Detection......................................................................5
1.6.4 Anomaly-based Detection........................................................................5
1.6.4.1 Detection by DNS Traffic Monitoring....................................................5
1.6.4.2 Behavioural Analysis Detection............................................................5
1.6.4.3 Attack Behaviour Analysis....................................................................5
The Botnets Cyber Crimes Report_2

3Botnets Cyber Crimes
1.6.4.4 Operational Behaviour Analysis............................................................5
1.7 CURRENT CHALLENGES of Botnets Detection...............................................5
1.7.1 General Botnets Detection Challenges...................................................5
1.7.2 Changing Techniques and Environments.................................................5
1.7.3 Small-Scale and Single Bot Detection......................................................5
1.7.4 Botnets Response, Prevention and Mitigation........................................5
1.8 Feature Extraction in Botnets Detection.......................................................6
1.8.1 Source and Destination IP addresses.......................................................6
1.8.2 Source and Destination port....................................................................6
1.8.3 Protocol................................................................................................... 6
1.8.4 Duration and Periodicity..........................................................................6
1.8.5 Flow size features.................................................................................... 6
1.8.6 Number of Transferred Packets...............................................................6
1.9 Current Studies on Botnets Detection...........................................................6
1.9.1 IRC-based Botnets Detection..................................................................6
1.9.2 HTTP-based Botnets Detection...............................................................6
1.9.3 P2P-based Botnets Detection.................................................................6
1.10 Related Work................................................................................................. 6
1.11 Conclusion..................................................................................................... 6
1.12 Reference...................................................................................................... 7
The Botnets Cyber Crimes Report_3

4Botnets Cyber Crimes
1 CHAPTER TWO LITERATURE REVIEW
1.1 INTRODUCTION
There had been involution in the information technology security issues where Botnets s is one
of the security challenges in the latest days however the Botnets s had been involving form the
single computer to complicated and distributed network systems. The Botnets s in the past was
used for some destructive purposes in the late 1990s and later were used for some of the
constructive purposes which include the maintenance of the controls of the ITC channel.
According to the research it is found that the Botnets were used by the hackers who were based
in Oregon states of United States of America. During that period the Botnets s were being
controlled in order to initiate an intentional DDoS (Distributed Denial of Service) attacks on the
e-bay website.
The peer to peer Botnets s was invented in year 2004 and from then the Botnets s HAD BEEN
USED for some destruction purposes for instance in year 2005 a new Botnets s virus called
ZOTOB was used to start the DDos attacks on various major U.S. Company’s websites.
More over there are various proves documented in the field of the Botnets s attack where Kraken
Botnets s attacks happened to more than 50 companies of the fortune 500 companies back year
2008 which were studied in the research field.
Apart from the above Botnets s cases described above there had been various instances where
there had been theft of money and leaking of information which had been achieved through the
use of the Botnets s viruses.
Currently there is the automated Botnets s which are one of the major threats where they keep on
sending messages to some individuals where there are no executed commands or controls since
they are self-automated
As a result of the increase in the level of the internet connectivity unlike in the past has highly
facilitated the increase in the incidences of the online attacks. At this time the internet access is
one of the major needs to each person and currently the technology had evolved to cloud
computing where the various users are able to store and access their major data through the cloud
services provided by some cloud services vendors.
The Botnets Cyber Crimes Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Overview of Network Security Discussion 2022
|12
|2283
|21

Botnet operations and communication
|12
|2233
|40

Botnet: Variants, Architecture, Operations, Threats and Mitigation Techniques
|12
|2460
|68

Detecting Malicious Traffic between Server and Mobile Phones using MITM Proxy
|42
|15030
|110

Mobile Device Security Strategies
|13
|2575
|61

IT Network Security Literature Review 2022
|13
|2804
|12