logo

(PDF) Study of Botnets and their threats to Internet Security

8 Pages1126 Words478 Views
   

Added on  2021-01-02

(PDF) Study of Botnets and their threats to Internet Security

   Added on 2021-01-02

ShareRelated Documents
Malicious Malware, Bots andBotnets
(PDF) Study of Botnets and their threats to Internet Security_1
TABLE OF CONTENTSINTRODUCTION...........................................................................................................................1MAIN BODY..................................................................................................................................1Malware practices and their controlling methods.......................................................................1Protocols and system Used by attackers to update botnet...........................................................2Botnets will be restricted in the foreseeable future.....................................................................2CONCLUSION................................................................................................................................2REFERENCES................................................................................................................................3
(PDF) Study of Botnets and their threats to Internet Security_2
INTRODUCTIONMalicious Malware is a practice of spreading virus in order to harm the system andinformation security of users. It might be in the form of worms, Trojan horses and Spyware. Abotnets are created to perform malware attacks such as denial of services, phishing, spamming,ransomware and other several activities which can harm the system security. This report willcontain information about protocols which hackers used to control the botnet practices. Thestudy will also mention few control measures about destruction of this malware activities withinnext few years.MAIN BODYMalware practices and their controlling methodsMalicious software are designed for the purpose of gaining access of an unauthorisedinformation and this will be responsible for various criminal activities such as data theft, to takecontrol over the device for the purpose of creating botnets etc. bots and botnets are generallyused by criminals to gain complete control on the functionalities of device (Satrya, Cahyani andAndreta, 2015). It is basically a string of connected computers which are coordinated together inorder to perform a particular tasks. These are commonly used to carry out attacks and criminalactivities on victim's system. It might be possible that infected computer will be traced back butis not possible to trace criminal at that time. It usually happens at the time of download-drive orby fooling users for installing Trojan horse on device. Attackers uses infected system to gainaccess of confidential data using botnet and it may carry out different tasks which includes:Denial of services: These attacks can be done using the machine's power which mayaffect the speed of internet connection and it also attacks websites and force them to shutdown.Spam email: Illegal application of botnets may be responsible for emailing millions ofinternet user using infected device.Repetitive pop-ups and ads on browser: These types of ads generally designed to getusers to pay for removal of such viruses using anti-spyware packages (Yu, Wang andZhou, 2015).1
(PDF) Study of Botnets and their threats to Internet Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Networking: Malicious Attacks, Social Engineering, Information Security Risks, Network Auditing, and Risk Assessment Management
|10
|3587
|73

Botnet operations and communication
|12
|2233
|40

Botnet: Variants, Architecture, Operations, Threats and Mitigation Techniques
|12
|2460
|68

Trojan Horse Attack
|11
|2804
|324

The Assignment on Information Security
|12
|832
|36

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491