Part One - What is a Botnet?

326 views

Published on

Jason Kott's Tour of the Botnet. Part One of a Three Part presentation on the rise of the TOR Botnet. Part One looks at what a Botnet is.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
326
On SlideShare
0
From Embeds
0
Number of Embeds
10
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • {}
  • Part One - What is a Botnet?

    1. 1. Botnet Group 3 IT 350
    2. 2. Definitions  Bot − −  Short for robot Refers to an infected computer that takes orders and reports back (Gassen et all, 2012) Botnet − A network of bots
    3. 3.  Botmaster − −  Also referred to botherder The person that controls a botnet (Gassen et all, 2012) C & C Server − Command and control server used by a botmaster to communicate with bots (Gassen et all, 2012)
    4. 4. Attack Methods   Infections can occur through trojans and worms Clicking on infected links and opening infected email attachments can cause infections
    5. 5. Vulnerabilities    Keeping all software, including OS, patched and up to date is the best defense At first attacks were only successful on weak systems Now malware can join secure computers to botnets – Many times antivirus software is unaware of the infection
    6. 6. The Extent of the Damage     It is estimated that hundreds of millions of computers are members of botnets (Greengard, 2012) Most of the time the user is unaware of the infection These botnets are being used to send spam Also being used to steal identities, credit card information, and trade secrets (Greengard, 2012)
    7. 7.  Attacks are primarily uses to generate income –  Stolen credit card numbers are worth $10700 on the black market (Gassen et all, 2012) Attacks may also have a military or political motive (Gassen et all, 2012)
    8. 8. References Gassen, J, Gerhards-Padilla, E, Martini, P. (2012). Current Botnet �Techniques and Countermeasures. PIK �Praxis der Informationsverarbeitung und Kommunikation. Vol 35 Issue 1, p310. Greengard, Samuel. (2012). The War Against Botnets. Communications of the ACM. Vol 55 Issue 2, p16-18.

    ×