logo

Botnet operations and communication

   

Added on  2022-09-17

12 Pages2233 Words40 Views
Running head: MN502 OVERVIEW OF NETWORK SECURITY
MN502 OVERVIEW OF NETWORK SECURITY
Name of the Student
Name of the University
Author Note

MN502 OVERVIEW OF NETWORK SECURITY 1
Table of Contents
Introduction:...............................................................................................................................3
Variations of Botnet:..................................................................................................................3
IRC botnet:.............................................................................................................................3
Peer to peer botnet:.................................................................................................................4
Hybrid botnet:........................................................................................................................5
Botnet architecture:....................................................................................................................5
Botnet operations and communication:......................................................................................6
Threats of botnet:.......................................................................................................................7
DDoS attack:..........................................................................................................................7
Spamming:.............................................................................................................................7
Phishing and Identity theft:....................................................................................................7
Mitigation techniques and tools:................................................................................................8
Patch systems to prevent Dos and other Exploits:.................................................................8
Separate and Distributed Assets:............................................................................................8
Botnet attacks:............................................................................................................................9
3ve - 2018...............................................................................................................................9
Mirai -2016:...........................................................................................................................9
Methbot -2016:.......................................................................................................................9
Conclusion:................................................................................................................................9

MN502 OVERVIEW OF NETWORK SECURITY 2
References:...............................................................................................................................10

MN502 OVERVIEW OF NETWORK SECURITY 3
Introduction:
A botnet is basically the collection of the devices that are connected by Internet that
can include servers, PCs, internet of things and mobile devices which are controlled and
infected though a common malware. The users can even unaware of the botnets infecting the
systems of them. The devices that are infected can be remotely controlled by cyber-criminals
and threat actors for some of the specific functions so that the malicious based operations will
be stay hidden for the users [1]. The botnets can be used commonly for sending spam emails,
engaging in clicking the fraud campaigning as well as generating malicious traffic for the
DDoS attack. The botnets impose social and economic costs on the users, network operators,
service providers as well as society as a whole. Without the having effective efforts for
mitigating them the botnets are having the potential to harm social and economic benefits of
Internet. The purpose of this paper is to discuss botnet technology, its effect, architecture and
at last the paper will provide a conclusion on the basis of entire report.
Variations of Botnet:
The botnets can be classified mainly into four type on the basis of C&C channels that
are used. They are:
i. IRC (Internet Relay Chat) botnet
ii. P2P (Peer to Peer) botnet
iii. HTTP (Hyper Text Transfer protocol) botnet
iv. Hybrid botnet.
IRC botnet:
The IRC Botnet is called as the push style model as the commands that are sent to the
botnets that are connected to the IRC channels from the botmaster. On the basis of the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Overview of Network Security Discussion 2022
|12
|2283
|21

Botnet: Variants, Architecture, Operations, Threats and Mitigation Techniques
|12
|2460
|68

The Botnets Cyber Crimes Report
|12
|2528
|18

(PDF) Study of Botnets and their threats to Internet Security
|8
|1126
|478

Distributed Denial of Service
|10
|2237
|162

(Solved) Information Security: Assignment
|28
|7728
|183