logo

Overview of Network Security Discussion 2022

   

Added on  2022-09-18

12 Pages2283 Words21 Views
 | 
 | 
 | 
Running head: OVERVIEW OF NETWORK SECURITY
OVERVIEW OF NETWORK SECURITY
Name of the Student
Name of the University
Author Note
Overview of Network Security Discussion 2022_1

OVERVIEW OF NETWORK SECURITY 1
Table of Contents
Introduction:...............................................................................................................................3
Variants of botnet:......................................................................................................................3
Peer to peer botnet:.................................................................................................................3
IRC botnet:.............................................................................................................................4
Hybrid botnet:........................................................................................................................5
Botnet architecture:....................................................................................................................6
Botnet operations and communication:......................................................................................7
Threats of Botnet:.......................................................................................................................7
DDoS attack:..........................................................................................................................7
Traffic monitoring and spamming:........................................................................................7
Keylogging:............................................................................................................................8
Mitigation techniques:................................................................................................................8
Distributed and Separated assets:...........................................................................................8
Patch systems for preventing Dos and other Exploits:...........................................................8
Botnet attacks:............................................................................................................................9
Mirai attack:...........................................................................................................................9
Methbot attack:.......................................................................................................................9
3ve attack:..............................................................................................................................9
Conclusion:................................................................................................................................9
Overview of Network Security Discussion 2022_2

OVERVIEW OF NETWORK SECURITY 2
References:...............................................................................................................................11
Introduction:
The botnet is actually a group of computers that are connected in the coordinated
fashion. Each of the computers in the botnet is known as a bot. All of the bots are able to
form a network of computers that are compromised. The computers are fully controlled by
one of the third parties as well as used for transmitting spam or malware or for launching
attacks. The botnet can also know as the zombie army [1]. The impact of botnet on the users
can be both indirectly and directly. At present most of the people are storing data and
contains that are highly sensitive like legal or financial details. With the impact of botnet, the
sensitive and confidential information and data can be becoming vulnerable. This is also a big
problem that if any device belongs to government or company, the impact of botnet can harm
confidential and sensitive data of the organisation. The purpose of this paper is to discuss
about botnet, its impact, architecture, mitigation techniques and at last the paper will provide
a brief conclusion based on the entire paper.
Variants of botnet:
There are so many variations of botnet. Basically, there are four types of botnets on the basis
of C&C channels which are as per following:
i. IRC (Internet Relay Chat) botnet
P2P (Peer to Peer) botnet
ii. HTTP (Hyper Text Transfer protocol) botnet
iii. Hybrid botnet.
Overview of Network Security Discussion 2022_3

OVERVIEW OF NETWORK SECURITY 3
Peer to peer botnet:
The peer to peer botnet can be performed through the utilization of the peer to peer
protocols and nodes that are not centralized to the network. The decentralized botnet or the
peer to peer botnets are having very much difficulties to shut down the bots for the
decentralized structures. The command files can also be shared by the botmaster with a
keyword that is specific for every bot [2].
(Figure: P2P botnet)
IRC botnet:
The IRC type of botnet also known as the push style model as the forwarded commands are
connected to the botmaster IRC channels. The centralized botnets’ structure is having the
ability to use ports that are valid to activate command or scrips of them [3].
Overview of Network Security Discussion 2022_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Botnet operations and communication
|12
|2233
|40

Botnet: Variants, Architecture, Operations, Threats and Mitigation Techniques
|12
|2460
|68

The Botnets Cyber Crimes Report
|12
|2528
|18

(Solved) Information Security: Assignment
|28
|7728
|183

IT Network Security Literature Review 2022
|13
|2804
|12

Security Analysis for IOT Components in Industries.
|12
|2908
|18