(PDF) Study of Botnets and their threats to Internet Security
VerifiedAdded on 2021/01/02
|8
|1126
|478
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Malicious Malware, Bots and
Botnets
Botnets
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................1
MAIN BODY..................................................................................................................................1
Malware practices and their controlling methods.......................................................................1
Protocols and system Used by attackers to update botnet...........................................................2
Botnets will be restricted in the foreseeable future.....................................................................2
CONCLUSION................................................................................................................................2
REFERENCES................................................................................................................................3
INTRODUCTION...........................................................................................................................1
MAIN BODY..................................................................................................................................1
Malware practices and their controlling methods.......................................................................1
Protocols and system Used by attackers to update botnet...........................................................2
Botnets will be restricted in the foreseeable future.....................................................................2
CONCLUSION................................................................................................................................2
REFERENCES................................................................................................................................3
INTRODUCTION
Malicious Malware is a practice of spreading virus in order to harm the system and
information security of users. It might be in the form of worms, Trojan horses and Spyware. A
botnets are created to perform malware attacks such as denial of services, phishing, spamming,
ransomware and other several activities which can harm the system security. This report will
contain information about protocols which hackers used to control the botnet practices. The
study will also mention few control measures about destruction of this malware activities within
next few years.
MAIN BODY
Malware practices and their controlling methods
Malicious software are designed for the purpose of gaining access of an unauthorised
information and this will be responsible for various criminal activities such as data theft, to take
control over the device for the purpose of creating botnets etc. bots and botnets are generally
used by criminals to gain complete control on the functionalities of device (Satrya, Cahyani and
Andreta, 2015). It is basically a string of connected computers which are coordinated together in
order to perform a particular tasks. These are commonly used to carry out attacks and criminal
activities on victim's system. It might be possible that infected computer will be traced back but
is not possible to trace criminal at that time. It usually happens at the time of download-drive or
by fooling users for installing Trojan horse on device. Attackers uses infected system to gain
access of confidential data using botnet and it may carry out different tasks which includes: Denial of services: These attacks can be done using the machine's power which may
affect the speed of internet connection and it also attacks websites and force them to shut
down. Spam email: Illegal application of botnets may be responsible for emailing millions of
internet user using infected device.
Repetitive pop-ups and ads on browser: These types of ads generally designed to get
users to pay for removal of such viruses using anti-spyware packages (Yu, Wang and
Zhou, 2015).
1
Malicious Malware is a practice of spreading virus in order to harm the system and
information security of users. It might be in the form of worms, Trojan horses and Spyware. A
botnets are created to perform malware attacks such as denial of services, phishing, spamming,
ransomware and other several activities which can harm the system security. This report will
contain information about protocols which hackers used to control the botnet practices. The
study will also mention few control measures about destruction of this malware activities within
next few years.
MAIN BODY
Malware practices and their controlling methods
Malicious software are designed for the purpose of gaining access of an unauthorised
information and this will be responsible for various criminal activities such as data theft, to take
control over the device for the purpose of creating botnets etc. bots and botnets are generally
used by criminals to gain complete control on the functionalities of device (Satrya, Cahyani and
Andreta, 2015). It is basically a string of connected computers which are coordinated together in
order to perform a particular tasks. These are commonly used to carry out attacks and criminal
activities on victim's system. It might be possible that infected computer will be traced back but
is not possible to trace criminal at that time. It usually happens at the time of download-drive or
by fooling users for installing Trojan horse on device. Attackers uses infected system to gain
access of confidential data using botnet and it may carry out different tasks which includes: Denial of services: These attacks can be done using the machine's power which may
affect the speed of internet connection and it also attacks websites and force them to shut
down. Spam email: Illegal application of botnets may be responsible for emailing millions of
internet user using infected device.
Repetitive pop-ups and ads on browser: These types of ads generally designed to get
users to pay for removal of such viruses using anti-spyware packages (Yu, Wang and
Zhou, 2015).
1
Protocols and system Used by attackers to update botnet
These bots are often controlled by hackers with the help of IRC (Internet Relay Chat).
Criminals commonly use Telnet protocol in order to attack the packets of information send.
Attackers can affect the system security by altering the IP addresses of such data packets this will
cause the data theft and loss of private information over the internet (Soltani and et.al., 2014). In
early days of internet, botnet was created to traverse through multiple websites in order to collide
the meaningful content. The protocols and standard control the malicious practices which
adopted by criminals in order to gain access of confidential information of user. To communicate
with server botnet master adopts various hidden channels like IRC and HTTp websites and
several popular services such as twitter, Facebook and Reddit etc. botnet servers can easily
communicate with each other using P2P control network.
Changes over past five years
In next five years IT industry will restrict such spamming mails and malware practices
entering into the system with the purpose of harming one's confidential information (Types of bot
fraud:malware bot vs. Ad fraud Bot, 2018). This communication channel between the bot-master
and individual bots allow the transmission of data from infected machines to bot-master which
can be used to provide commands to individual boats and this will be referred as hijacking of
system an control over the large interconnected systems. Some malware and malicious practices
like denial of services, spamming mails can be controllable by IT professionals in next few
years.
Botnets will be restricted in the foreseeable future
This technology based world have found out the alternative solutions to deal with
cybersecurity by various means. Information technology have developed data security
application and antivirus application to prevent the information from criminals and unauthorised
users (Wielogorska and O'Brien, 2017).
Yes, it can be believable that in next five years can be continued but that will be used
only for the purpose of sharing information legally. Increasing command of IT professionals
overs computers will restrict these types of illegal practices of criminals.
2
These bots are often controlled by hackers with the help of IRC (Internet Relay Chat).
Criminals commonly use Telnet protocol in order to attack the packets of information send.
Attackers can affect the system security by altering the IP addresses of such data packets this will
cause the data theft and loss of private information over the internet (Soltani and et.al., 2014). In
early days of internet, botnet was created to traverse through multiple websites in order to collide
the meaningful content. The protocols and standard control the malicious practices which
adopted by criminals in order to gain access of confidential information of user. To communicate
with server botnet master adopts various hidden channels like IRC and HTTp websites and
several popular services such as twitter, Facebook and Reddit etc. botnet servers can easily
communicate with each other using P2P control network.
Changes over past five years
In next five years IT industry will restrict such spamming mails and malware practices
entering into the system with the purpose of harming one's confidential information (Types of bot
fraud:malware bot vs. Ad fraud Bot, 2018). This communication channel between the bot-master
and individual bots allow the transmission of data from infected machines to bot-master which
can be used to provide commands to individual boats and this will be referred as hijacking of
system an control over the large interconnected systems. Some malware and malicious practices
like denial of services, spamming mails can be controllable by IT professionals in next few
years.
Botnets will be restricted in the foreseeable future
This technology based world have found out the alternative solutions to deal with
cybersecurity by various means. Information technology have developed data security
application and antivirus application to prevent the information from criminals and unauthorised
users (Wielogorska and O'Brien, 2017).
Yes, it can be believable that in next five years can be continued but that will be used
only for the purpose of sharing information legally. Increasing command of IT professionals
overs computers will restrict these types of illegal practices of criminals.
2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CONCLUSION
It can be concluded from the above report that botnets are used by criminals to get
control over the device. This study had also mentioned standards and protocols which are used
by attackers in order to update botnets. The report was also focussed towards many tasks which
are performed by attackers to access the secured data using botnets. It was also discussed that It
industry will generate ultimate solution in past five years to control malicious practices of
hackers.
3
It can be concluded from the above report that botnets are used by criminals to get
control over the device. This study had also mentioned standards and protocols which are used
by attackers in order to update botnets. The report was also focussed towards many tasks which
are performed by attackers to access the secured data using botnets. It was also discussed that It
industry will generate ultimate solution in past five years to control malicious practices of
hackers.
3
REFERENCES
Books and Journals
Satrya, G.B., Cahyani, N.D. and Andreta, R.F., 2015, August. The detection of 8 type malware
botnet using hybrid malware analysis in executable file windows operating systems.
In Proceedings of the 17th International Conference on Electronic Commerce 2015 (p.
5). ACM.
Soltani, S. and et.al., 2014. A survey on real world botnets and detection
mechanisms. International Journal of Information and Network Security. 3(2). p.116.
Wielogorska, M. and O'Brien, D., 2017. DNS Traffic analysis for botnet detection.
Yu, S., Wang, G. and Zhou, W., 2015. Modeling malicious activities in cyber space. IEEE
network. 29(6). pp.83-87.
Online
Types of bot fraud:malware bot vs. Ad fraud Bot. 2018. [Online]. Available through:
<https://zvelo.com/malware-bots-vs-ad-fraud-bots/>
4
Books and Journals
Satrya, G.B., Cahyani, N.D. and Andreta, R.F., 2015, August. The detection of 8 type malware
botnet using hybrid malware analysis in executable file windows operating systems.
In Proceedings of the 17th International Conference on Electronic Commerce 2015 (p.
5). ACM.
Soltani, S. and et.al., 2014. A survey on real world botnets and detection
mechanisms. International Journal of Information and Network Security. 3(2). p.116.
Wielogorska, M. and O'Brien, D., 2017. DNS Traffic analysis for botnet detection.
Yu, S., Wang, G. and Zhou, W., 2015. Modeling malicious activities in cyber space. IEEE
network. 29(6). pp.83-87.
Online
Types of bot fraud:malware bot vs. Ad fraud Bot. 2018. [Online]. Available through:
<https://zvelo.com/malware-bots-vs-ad-fraud-bots/>
4
Types of Bot Fraud: Malware
Bots vs. Ad Fraud Bots
Types of Bot Fraud: Malware
Bots vs. Ad Fraud Bots
Types of Bot Fraud: Malware
Bots vs. Ad Fraud Bots
Types of Bot Fraud: Malware
Bots vs. Ad Fraud Bots
Types of Bot Fraud: Malware
Bots vs. Ad Fraud Bots
What are Bots, Botnets and Zombies?
5
Bots vs. Ad Fraud Bots
Types of Bot Fraud: Malware
Bots vs. Ad Fraud Bots
Types of Bot Fraud: Malware
Bots vs. Ad Fraud Bots
Types of Bot Fraud: Malware
Bots vs. Ad Fraud Bots
Types of Bot Fraud: Malware
Bots vs. Ad Fraud Bots
What are Bots, Botnets and Zombies?
5
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Bots, Botnets and Zombies?
What are Bots, Botnets and Zombies?
6
What are Bots, Botnets and Zombies?
6
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.