TABLE OF CONTENTS INTRODUCTION...........................................................................................................................1 MAIN BODY..................................................................................................................................1 Malware practices and their controlling methods.......................................................................1 Protocols and system Used by attackers to update botnet...........................................................2 Botnets will be restricted in the foreseeable future.....................................................................2 CONCLUSION................................................................................................................................2 REFERENCES................................................................................................................................3
INTRODUCTION Malicious Malware is a practice of spreading virus in order to harm the system and information security of users. It might be in the form of worms, Trojan horses and Spyware. A botnets are created to perform malware attacks such as denial of services, phishing, spamming, ransomware and other several activities which can harm the system security. This report will contain information about protocols which hackers used to control the botnet practices. The study will also mention few control measures about destruction of this malware activities within next few years. MAIN BODY Malware practices and their controlling methods Malicious software are designed for the purpose of gaining access of an unauthorised information and this will be responsible for various criminal activities such as data theft, to take control over the device for the purpose of creating botnets etc. bots and botnets are generally used by criminals to gain complete control on the functionalities of device (Satrya, Cahyani and Andreta, 2015). It is basically a string of connected computers which are coordinated together in order to perform a particular tasks. These are commonly used to carry out attacks and criminal activities on victim's system. It might be possible that infected computer will be traced back but is not possible to trace criminal at that time. It usually happens at the time of download-drive or by fooling users for installing Trojan horse on device. Attackers uses infected system to gain access of confidential data using botnet and it may carry out different tasks which includes:ï‚·Denial of services:These attacks can be done using the machine's power which may affect the speed of internet connection and it also attacks websites and force them to shut down.ï‚·Spam email:Illegal application of botnets may be responsible for emailing millions of internet user using infected device. ï‚·Repetitive pop-ups and ads on browser:These types of ads generally designed to get users to pay for removal of such viruses using anti-spyware packages (Yu, Wang and Zhou, 2015). 1
Protocols and system Used by attackers to update botnet These bots are often controlled by hackers with the help of IRC (Internet Relay Chat). Criminals commonly use Telnet protocol in order to attack the packets of information send. Attackers can affect the system security by altering the IP addresses of such data packets this will cause the data theft and loss of private information over the internet (Soltani and et.al., 2014). In early days of internet, botnet was created to traverse through multiple websites in order to collide the meaningful content. The protocols and standard control the malicious practices which adopted by criminals in order to gain access of confidential information of user.To communicate with server botnet master adopts various hidden channels like IRC and HTTp websites and several popular services such as twitter, Facebook and Reddit etc. botnet servers can easily communicate with each other using P2P control network. Changes over past five years In next five years IT industry will restrict such spamming mails and malware practices entering into the system with the purpose of harming one's confidential information (Types of bot fraud:malware bot vs. Ad fraud Bot,2018). This communication channel between the bot-master and individual bots allow the transmission of data from infected machines to bot-master which can be used to provide commands to individual boats and this will be referred as hijacking of system an control over the large interconnected systems.Some malware and malicious practices like denial of services, spamming mails can be controllable by IT professionals in next few years. Botnets will be restricted in the foreseeable future This technology based world have found out the alternative solutions to deal with cybersecuritybyvariousmeans.Informationtechnologyhavedevelopeddatasecurity application and antivirus application to prevent the information from criminals and unauthorised users (Wielogorska and O'Brien, 2017). Yes, it can be believable that in next five years can be continued but that will be used only for the purpose of sharing information legally.Increasing command of IT professionals overs computers will restrict these types of illegal practices of criminals. 2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CONCLUSION It can be concluded from the above report that botnets are used by criminals to get control over the device. This study had also mentioned standards and protocols which are used by attackers in order to update botnets. The report was also focussed towards many tasks which are performed by attackers to access the secured data using botnets. It was also discussed that It industry will generate ultimate solution in past five years to control malicious practices of hackers. 3
REFERENCES Books and Journals Satrya, G.B., Cahyani, N.D. and Andreta, R.F., 2015, August. The detection of 8 type malware botnet using hybrid malware analysis in executable file windows operating systems. InProceedings of the 17th International Conference on Electronic Commerce 2015(p. 5). ACM. Soltani,S.andet.al.,2014.Asurveyonrealworldbotnetsanddetection mechanisms.International Journal of Information and Network Security.3(2). p.116. Wielogorska, M. and O'Brien, D., 2017. DNS Traffic analysis for botnet detection. Yu, S., Wang, G. and Zhou, W., 2015. Modeling malicious activities in cyber space.IEEE network.29(6). pp.83-87. Online Typesofbotfraud:malwarebotvs.AdfraudBot.2018.[Online].Availablethrough: <https://zvelo.com/malware-bots-vs-ad-fraud-bots/> 4
Types of Bot Fraud: Malware Bots vs. Ad Fraud Bots Types of Bot Fraud: Malware Bots vs. Ad Fraud Bots Types of Bot Fraud: Malware Bots vs. Ad Fraud Bots Types of Bot Fraud: Malware Bots vs. Ad Fraud Bots Types of Bot Fraud: Malware Bots vs. Ad Fraud Bots What are Bots, Botnets and Zombies? 5
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.