• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Part One - What is a Botnet?
 

Part One - What is a Botnet?

on

  • 138 views

Jason Kott's Tour of the Botnet. Part One of a Three Part presentation on the rise of the TOR Botnet. Part One looks at what a Botnet is.

Jason Kott's Tour of the Botnet. Part One of a Three Part presentation on the rise of the TOR Botnet. Part One looks at what a Botnet is.

Statistics

Views

Total Views
138
Views on SlideShare
132
Embed Views
6

Actions

Likes
0
Downloads
6
Comments
0

1 Embed 6

http://torbotnet.com 6

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • {}

Part One - What is a Botnet? Part One - What is a Botnet? Presentation Transcript

  • Botnet Group 3 IT 350
  • Definitions  Bot − −  Short for robot Refers to an infected computer that takes orders and reports back (Gassen et all, 2012) Botnet − A network of bots
  •  Botmaster − −  Also referred to botherder The person that controls a botnet (Gassen et all, 2012) C & C Server − Command and control server used by a botmaster to communicate with bots (Gassen et all, 2012)
  • Attack Methods   Infections can occur through trojans and worms Clicking on infected links and opening infected email attachments can cause infections
  • Vulnerabilities    Keeping all software, including OS, patched and up to date is the best defense At first attacks were only successful on weak systems Now malware can join secure computers to botnets – Many times antivirus software is unaware of the infection
  • The Extent of the Damage     It is estimated that hundreds of millions of computers are members of botnets (Greengard, 2012) Most of the time the user is unaware of the infection These botnets are being used to send spam Also being used to steal identities, credit card information, and trade secrets (Greengard, 2012)
  •  Attacks are primarily uses to generate income –  Stolen credit card numbers are worth $10700 on the black market (Gassen et all, 2012) Attacks may also have a military or political motive (Gassen et all, 2012)
  • References Gassen, J, Gerhards-Padilla, E, Martini, P. (2012). Current Botnet �Techniques and Countermeasures. PIK �Praxis der Informationsverarbeitung und Kommunikation. Vol 35 Issue 1, p310. Greengard, Samuel. (2012). The War Against Botnets. Communications of the ACM. Vol 55 Issue 2, p16-18.