Botnet attack is where group of devices are infected by malware that lets the hacker to manipulate these devices which are connected internally by internet within an organization. Botnet attack can destroy personal and enterprise identity. Initially botnet will attack an individual and eventually an organization. Botnet will gain access to an individual system and build its chain to strengthen the network like infecting more systems, electronic devices and network devices. These devices eventually will be controlled by the hacker. These devices are now called as bot. These army of bots will help botnet to achieve hackers’ goal such as data theft. Few potential threats are data breach. The organization can lose its confidential data related to organization, organization policies, employee, customers and organizations business strategy. As we know how important and confidential the data is for an organization. This article says that in 2014 few companies (like Microsoft and Symantec) has identified 19 botnet groups which controlled more than trillions of bots (Shirazi, 2015). Various organizations spent millions of dollars to build secure and safe environment. But using these bots, botnet can still break the security to gain access to the data. This can cause huge damage to an organization economically and destroy its reputation.
Reference:
Shirazi, R. (2015). Botnet takedown initiatives: A taxonomy and performance model. Technology Innovation Management Review, 5(1), 15-20. Retrieved from https://search.proquest.com/docview/1676102254?accountid=10378
14 hours ago
Karishma Paleja
Threats of Botnet Attack
COLLAPSE
Top of Form
In present world scenario Botnets can be responsible for a lot of damage which can be constrained by remotely by an assailant. Disavowals can be installed utilizing botnets for sending Spam or Phishing messages. furthermore they can be deployed for major identity theft or different maltreatment of traded off machines(Thorsten and Niels, 2007). A bot is introduced on a framework after a trade off and with a remote control component it very well may be worked remotely by an assailant by giving some self-assertive orders subsequently overseeing the casualty's framework (Thorsten and Niels, 2007). Five elements that include botnet assault: botnet administrator, botnet controller, assortment of bots, botnet programming drop, botnet target (Edward, 2012).
The above is the base for an assassin used to frame a system of commercial machines engaged to control framework along these lines an assassin can control enormous number of machines utilizing bots simultaneously.A botnet is framed in way to consolidate few more bots and with an effective intrusion, strategic framework can be constrained by an attacker and portrayal of bots can be characterized with three properties: a remote control office, execution of a few orders and spreading instrument for additional engendering (Thorsten and Niels, 2007).
Looking into the insigh.
Botnet attack is where group of devices are infected by malware th.docx
1. Botnet attack is where group of devices are infected by malware
that lets the hacker to manipulate these devices which are
connected internally by internet within an organization. Botnet
attack can destroy personal and enterprise identity. Initially
botnet will attack an individual and eventually an organization.
Botnet will gain access to an individual system and build its
chain to strengthen the network like infecting more systems,
electronic devices and network devices. These devices
eventually will be controlled by the hacker. These devices are
now called as bot. These army of bots will help botnet to
achieve hackers’ goal such as data theft. Few potential threats
are data breach. The organization can lose its confidential data
related to organization, organization policies, employee,
customers and organizations business strategy. As we know how
important and confidential the data is for an organization. This
article says that in 2014 few companies (like Microsoft and
Symantec) has identified 19 botnet groups which controlled
more than trillions of bots (Shirazi, 2015). Various
organizations spent millions of dollars to build secure and safe
environment. But using these bots, botnet can still break the
security to gain access to the data. This can cause huge damage
to an organization economically and destroy its reputation.
Reference:
Shirazi, R. (2015). Botnet takedown initiatives: A taxonomy and
performance model. Technology Innovation Management
Review, 5(1), 15-20. Retrieved from
https://search.proquest.com/docview/1676102254?accountid=10
378
2. 14 hours ago
Karishma Paleja
Threats of Botnet Attack
COLLAPSE
Top of Form
In present world scenario Botnets can be responsible for a lot
of damage which can be constrained by remotely by an
assailant. Disavowals can be installed utilizing botnets for
sending Spam or Phishing messages. furthermore they can be
deployed for major identity theft or different maltreatment of
traded off machines(Thorsten and Niels, 2007). A bot is
introduced on a framework after a trade off and with a remote
control component it very well may be worked remotely by an
assailant by giving some self-assertive orders subsequently
overseeing the casualty's framework (Thorsten and Niels, 2007).
Five elements that include botnet assault: botnet administrator,
botnet controller, assortment of bots, botnet programming drop,
botnet target (Edward, 2012).
The above is the base for an assassin used to frame a system of
commercial machines engaged to control framework along these
lines an assassin can control enormous number of machines
utilizing bots simultaneously.A botnet is framed in way to
consolidate few more bots and with an effective intrusion,
strategic framework can be constrained by an attacker and
portrayal of bots can be characterized with three properties: a
remote control office, execution of a few orders and spreading
instrument for additional engendering (Thorsten and Niels,
2007).
Looking into the insights effecting the each trait, governing a
bot remotely is achieved by mindfully incorporating the focal
IRC server for discipline and control. In case of concealed tasks
they use DNS burrow rather of IRC convention. DDoS and
updates are two sorts of orders for SYN and UDP flooding and
spreading instrument resembles worm where a bot examines the
entire system ranges for vulnerabilities and proliferates
themselves (Thorsten and Niels, 2007).
14. h
a
p
te
r 1
–
In
tro
d
u
c
tio
n• Ten basic design and operation principles:
– Deception – Discretion
– Separation – Collection
– Diversity – Correlation
– Commonality – Awareness
– Depth – Response
13
• Deliberately introducing misleading functionality or
misinformation for the purpose of tricking an
adversary
– Computer scientists call this functionality a honey pot
24. C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Discretion
23
• Collection involves automated gathering of system-
related information about national infrastructure to
enable security analysis
• Data is processed by a security information
management system.
• Operational challenges
– What type of information should be collected?
– How much information should be collected?