The Botnets Cyber Crimes Report
Added on 2022-08-20
12 Pages2528 Words18 Views
|
|
|
Running head: Botnets Cyber Crimes 1
BOTNETS S CYBERCRIMES
[Student name]
[University name]
Research on the Botnets s Cybercrimes
BOTNETS S CYBERCRIMES
[Student name]
[University name]
Research on the Botnets s Cybercrimes
![The Botnets Cyber Crimes Report_1](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fzx%2F24d787295231481a8742f473e944c7db.jpg&w=3840&q=10)
2Botnets Cyber Crimes
Table of Contents
1 CHAPTER TWO LITERATURE REVIEW....................................................................4
1.1 INTRODUCTION.............................................................................................. 4
1.2 CHARACTERISTICS OF BOTNETS ...................................................................4
1.2.1 What a bot and a Botnets ?.....................................................................4
1.2.2 Botnets s Malicious Activities...................................................................4
1.2.2.1 DDOS.................................................................................................... 4
1.2.2.2 Spamming............................................................................................ 4
1.2.2.3 Thieving Personal Information..............................................................4
1.2.2.4 Illegal Hosting, Sale or Rent Services...................................................4
1.2.2.5 Click Fraud and Adware........................................................................4
1.3 Botnets Lifecycle........................................................................................... 4
1.3.1 Infection and Propagation........................................................................4
1.3.2 Rallying.................................................................................................... 4
1.3.3 Commands and Reports..........................................................................4
1.3.4 Abandon.................................................................................................. 4
1.3.5 Securing the Botnets ..............................................................................4
1.4 Command and Control (C&C) Mechanism......................................................5
1.4.1 Centralised C&C...................................................................................... 5
1.4.2 Decentralised C&C...................................................................................5
1.4.3 Hybrid C&C.............................................................................................. 5
1.5 Botnets protocols.......................................................................................... 5
1.5.1 IRC-Based Botnets .................................................................................. 5
1.5.2 P2P Botnets ............................................................................................ 5
1.5.3 HTTP-Based Botnets ............................................................................... 5
1.6 BOTNETS DETECTION.................................................................................... 5
1.6.1 Host-Based.............................................................................................. 5
1.6.2 Network-Based........................................................................................ 5
1.6.3 Signature-based Detection......................................................................5
1.6.4 Anomaly-based Detection........................................................................5
1.6.4.1 Detection by DNS Traffic Monitoring....................................................5
1.6.4.2 Behavioural Analysis Detection............................................................5
1.6.4.3 Attack Behaviour Analysis....................................................................5
Table of Contents
1 CHAPTER TWO LITERATURE REVIEW....................................................................4
1.1 INTRODUCTION.............................................................................................. 4
1.2 CHARACTERISTICS OF BOTNETS ...................................................................4
1.2.1 What a bot and a Botnets ?.....................................................................4
1.2.2 Botnets s Malicious Activities...................................................................4
1.2.2.1 DDOS.................................................................................................... 4
1.2.2.2 Spamming............................................................................................ 4
1.2.2.3 Thieving Personal Information..............................................................4
1.2.2.4 Illegal Hosting, Sale or Rent Services...................................................4
1.2.2.5 Click Fraud and Adware........................................................................4
1.3 Botnets Lifecycle........................................................................................... 4
1.3.1 Infection and Propagation........................................................................4
1.3.2 Rallying.................................................................................................... 4
1.3.3 Commands and Reports..........................................................................4
1.3.4 Abandon.................................................................................................. 4
1.3.5 Securing the Botnets ..............................................................................4
1.4 Command and Control (C&C) Mechanism......................................................5
1.4.1 Centralised C&C...................................................................................... 5
1.4.2 Decentralised C&C...................................................................................5
1.4.3 Hybrid C&C.............................................................................................. 5
1.5 Botnets protocols.......................................................................................... 5
1.5.1 IRC-Based Botnets .................................................................................. 5
1.5.2 P2P Botnets ............................................................................................ 5
1.5.3 HTTP-Based Botnets ............................................................................... 5
1.6 BOTNETS DETECTION.................................................................................... 5
1.6.1 Host-Based.............................................................................................. 5
1.6.2 Network-Based........................................................................................ 5
1.6.3 Signature-based Detection......................................................................5
1.6.4 Anomaly-based Detection........................................................................5
1.6.4.1 Detection by DNS Traffic Monitoring....................................................5
1.6.4.2 Behavioural Analysis Detection............................................................5
1.6.4.3 Attack Behaviour Analysis....................................................................5
![The Botnets Cyber Crimes Report_2](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fkn%2Ffed43efaaa9f45928d77c93a1cd21314.jpg&w=3840&q=10)
3Botnets Cyber Crimes
1.6.4.4 Operational Behaviour Analysis............................................................5
1.7 CURRENT CHALLENGES of Botnets Detection...............................................5
1.7.1 General Botnets Detection Challenges...................................................5
1.7.2 Changing Techniques and Environments.................................................5
1.7.3 Small-Scale and Single Bot Detection......................................................5
1.7.4 Botnets Response, Prevention and Mitigation........................................5
1.8 Feature Extraction in Botnets Detection.......................................................6
1.8.1 Source and Destination IP addresses.......................................................6
1.8.2 Source and Destination port....................................................................6
1.8.3 Protocol................................................................................................... 6
1.8.4 Duration and Periodicity..........................................................................6
1.8.5 Flow size features.................................................................................... 6
1.8.6 Number of Transferred Packets...............................................................6
1.9 Current Studies on Botnets Detection...........................................................6
1.9.1 IRC-based Botnets Detection..................................................................6
1.9.2 HTTP-based Botnets Detection...............................................................6
1.9.3 P2P-based Botnets Detection.................................................................6
1.10 Related Work................................................................................................. 6
1.11 Conclusion..................................................................................................... 6
1.12 Reference...................................................................................................... 7
1.6.4.4 Operational Behaviour Analysis............................................................5
1.7 CURRENT CHALLENGES of Botnets Detection...............................................5
1.7.1 General Botnets Detection Challenges...................................................5
1.7.2 Changing Techniques and Environments.................................................5
1.7.3 Small-Scale and Single Bot Detection......................................................5
1.7.4 Botnets Response, Prevention and Mitigation........................................5
1.8 Feature Extraction in Botnets Detection.......................................................6
1.8.1 Source and Destination IP addresses.......................................................6
1.8.2 Source and Destination port....................................................................6
1.8.3 Protocol................................................................................................... 6
1.8.4 Duration and Periodicity..........................................................................6
1.8.5 Flow size features.................................................................................... 6
1.8.6 Number of Transferred Packets...............................................................6
1.9 Current Studies on Botnets Detection...........................................................6
1.9.1 IRC-based Botnets Detection..................................................................6
1.9.2 HTTP-based Botnets Detection...............................................................6
1.9.3 P2P-based Botnets Detection.................................................................6
1.10 Related Work................................................................................................. 6
1.11 Conclusion..................................................................................................... 6
1.12 Reference...................................................................................................... 7
![The Botnets Cyber Crimes Report_3](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fhc%2F6bd53ccf63a14fdbb117a8c52f16ab9c.jpg&w=3840&q=10)
4Botnets Cyber Crimes
1 CHAPTER TWO LITERATURE REVIEW
1.1 INTRODUCTION
There had been involution in the information technology security issues where Botnets s is one
of the security challenges in the latest days however the Botnets s had been involving form the
single computer to complicated and distributed network systems. The Botnets s in the past was
used for some destructive purposes in the late 1990s and later were used for some of the
constructive purposes which include the maintenance of the controls of the ITC channel.
According to the research it is found that the Botnets were used by the hackers who were based
in Oregon states of United States of America. During that period the Botnets s were being
controlled in order to initiate an intentional DDoS (Distributed Denial of Service) attacks on the
e-bay website.
The peer to peer Botnets s was invented in year 2004 and from then the Botnets s HAD BEEN
USED for some destruction purposes for instance in year 2005 a new Botnets s virus called
ZOTOB was used to start the DDos attacks on various major U.S. Company’s websites.
More over there are various proves documented in the field of the Botnets s attack where Kraken
Botnets s attacks happened to more than 50 companies of the fortune 500 companies back year
2008 which were studied in the research field.
Apart from the above Botnets s cases described above there had been various instances where
there had been theft of money and leaking of information which had been achieved through the
use of the Botnets s viruses.
Currently there is the automated Botnets s which are one of the major threats where they keep on
sending messages to some individuals where there are no executed commands or controls since
they are self-automated
As a result of the increase in the level of the internet connectivity unlike in the past has highly
facilitated the increase in the incidences of the online attacks. At this time the internet access is
one of the major needs to each person and currently the technology had evolved to cloud
computing where the various users are able to store and access their major data through the cloud
services provided by some cloud services vendors.
1 CHAPTER TWO LITERATURE REVIEW
1.1 INTRODUCTION
There had been involution in the information technology security issues where Botnets s is one
of the security challenges in the latest days however the Botnets s had been involving form the
single computer to complicated and distributed network systems. The Botnets s in the past was
used for some destructive purposes in the late 1990s and later were used for some of the
constructive purposes which include the maintenance of the controls of the ITC channel.
According to the research it is found that the Botnets were used by the hackers who were based
in Oregon states of United States of America. During that period the Botnets s were being
controlled in order to initiate an intentional DDoS (Distributed Denial of Service) attacks on the
e-bay website.
The peer to peer Botnets s was invented in year 2004 and from then the Botnets s HAD BEEN
USED for some destruction purposes for instance in year 2005 a new Botnets s virus called
ZOTOB was used to start the DDos attacks on various major U.S. Company’s websites.
More over there are various proves documented in the field of the Botnets s attack where Kraken
Botnets s attacks happened to more than 50 companies of the fortune 500 companies back year
2008 which were studied in the research field.
Apart from the above Botnets s cases described above there had been various instances where
there had been theft of money and leaking of information which had been achieved through the
use of the Botnets s viruses.
Currently there is the automated Botnets s which are one of the major threats where they keep on
sending messages to some individuals where there are no executed commands or controls since
they are self-automated
As a result of the increase in the level of the internet connectivity unlike in the past has highly
facilitated the increase in the incidences of the online attacks. At this time the internet access is
one of the major needs to each person and currently the technology had evolved to cloud
computing where the various users are able to store and access their major data through the cloud
services provided by some cloud services vendors.
![The Botnets Cyber Crimes Report_4](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Ffe%2F1c0852e24f3f4b648617ff26d0cbfd95.jpg&w=3840&q=10)
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Overview of Network Security Discussion 2022lg...
|12
|2283
|21
Botnet operations and communicationlg...
|12
|2233
|40
Botnet: Variants, Architecture, Operations, Threats and Mitigation Techniqueslg...
|12
|2460
|68
Detecting Malicious Traffic between Server and Mobile Phones using MITM Proxylg...
|42
|15030
|110
Mobile Device Security Strategieslg...
|13
|2575
|61
IT Network Security Literature Review 2022lg...
|13
|2804
|12