Combating the Botnet Scourge
نویسندگان
چکیده
Recently, the increase in “spam,” distributed denialof-service (DDoS) attacks, and other acts of online crime are facilitated by “botnets,” which are networks of compromised computer systems executing “bot” programs. In this paper, we precisely define the terms bot and botnet and explain their workings. We describe how miscreants have used and continue to use botnets to launch the aforementioned attacks, disrupt internetworked computer systems, and perpetrate fraud and other crimes. We illustrate successful law enforcement actions against botnets in the past and how botnets may be dismantled. Finally, we conclude that botnets are only one facet of “convergent” threats to network security that pose a significant challenge to the Internet’s future.
منابع مشابه
Basic Training Sandboxing and Virtualization Modern Tools for Combating Malware Enter Sandboxing and Application Virtualization Basic Training Application Sandboxing
botnet infections every month, 60,000 new pieces of malware per day, and 60 percent of top Google search terms returning links to malicious sites within the first 100 results (www. mca fee.com/us/about/news/ 2010/q4/20101117-01.aspx). In fact, Cisco has reported that 10 percent of all Web malware is encountered through search engine traffic, with Google being the largest search engine provider ...
متن کاملBotOnus: an online unsupervised method for Botnet detection
Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...
متن کاملThe Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns
Spam accounts for a large portion of the email exchange on the Internet. In addition to being a nuisance and a waste of costly resources, spam is used as a delivery mechanism for many criminal scams and large-scale compromises. Most of this spam is sent using botnets, which are often rented for a fee to criminal organizations. Even though there has been a considerable corpus of research focused...
متن کاملUsing Machine Learning Techniques to Identify Botnet Traffic
To date, techniques to counter cyber-attacks have predominantly been reactive; they focus on monitoring network traffic, detecting anomalies and cyber-attack traffic patterns, and, a posteriori, combating the cyber-attacks and mitigating their effects. Contrary to such approaches, we advocate proactively detecting and identifying botnets prior to their being used as part of a cyber-attack [12]....
متن کاملComparison of the Mean-Field Approach and Simulation in a Peer-to-Peer Botnet Case Study
Peer-to-peer botnets, as exemplified by the Storm Worm and Stuxnet, are a relatively new threat to security on the internet: infected computers automatically search for other computers to be infected, thus spreading the infection rapidly. In a recent paper, such botnets have been modeled using Stochastic Activity Networks, allowing the use of discreteevent simulation to judge strategies for com...
متن کامل