“Botnet” - Most Serious Network Threat against CyberSecurity Faced by Online Ecosystems and Computing Assets
Abhishek Shukla, Sayali Pantoji
Abstract
The rapid usages of the Internet over the past few years have facilitated an increase in the incidents of online attacks. One of the most vexing cyber-security threats today is the use of very large, coordinated groups of hosts for brute-force attacks, intrusions, and generating unsolicited emails. The denial of service (DoS) attack is one such powerful attack. If the attack is distributed, it leads to a very significant damage to the network. A distributed denial of service (DDoS) attack is launched by a mechanism called Botnet through a network of controlled computers. Vulnerable hosts are turned into so-called zombies which can be controlled from afar. A collection of zombies called bots, when controlled by a single command and control (C2) infrastructure, form what is called a Botnet. Botnet are network threats that generally occur from cyber-attacks, which results in serious threats to our network assets and organization’s properties. Malicious botnets are distributed computing platforms predominantly used for illegal activities such as launching Distributed Denial of Service (DDoS) attacks, sending spam, trojan and phishing emails, illegally distributing pirated media and software, force distribution, stealing information and computing resource, e-business extortion, performing click fraud, and identity theft. In this article we try to provide information on how Botnet facilitate distributed denial of service (DDoS) attacks that hamper the Web server. Botnets compromise a network of machines with programs (usually referred to as a bot, zombie, or drone) and implement under a command and control (C&C) management infrastructure
Keywords
Botnet, Cyber-security, Online ecosystems, Denial of Service (DoS), Agent-handler model, Internet Relay Chat (IRC) model, Web-based model.
References
Zeidanloo HR, Manaf AA, Ahmad R et al. A Proposed Framework for P2P Botnet Detection. IACSIT International Journal of Engineering and Technology Apr 2010; 2(2). [2] Feily M, Shahrestani A, Ramadass S. A Survey of Botnet and Botnet Detection. Third International Conference on Emerging Security Information, Systems and Technologies, 2009.
Gupta BB, Joshi RC, Misra M. ANN Based Scheme to Predict Number of Zombies involved in a DDoS Attack, International Journal of Network Security (IJNS) 2012; 14(1): 36-45. [4] Livadas C, Walsh B, Lapsley D. Using Machine Learning Techniques to Identify Botnet Traffic. Internetwork Research Department BBN Technologies. [5] Feily M. A Survey of Botnet and Botnet Detection, National Advanced IPv6 Center of Excellence (NAv6). IMPACT Research Team, UniversitiSains Malaysia (USM) Penang, Malaysia. [6] Saha B, Gairola A. Botnet: An Overview. CERT-In White Paper, CIWP-2005-05, Jun 2005. [7] Patrikakis C, Masikos M, Zouraraki O. Distributed Denial of Service Attacks. National Technical University of Athens. The Internet Protocol Journal Dec 2004. [8] Choi H, Lee H, Lee H et al. Botnet Detection by Monitoring Group Activities in DNS Traffic. Proc. 7th IEEE International Conference on Computer and Information Technology (CIT 2007), 2007: 715-20.
Refbacks
- There are currently no refbacks.