SlideShare a Scribd company logo
1 of 12
Botnet

Group 3 IT 350
Definitions


Bot
−
−



Short for robot
Refers to an infected computer that takes
orders and reports back (Gassen et all,
2012)

Botnet
−

A network of bots


Botmaster
−
−



Also referred to botherder
The person that controls a botnet (Gassen
et all, 2012)

C & C Server
−

Command and control server used by a
botmaster to communicate with bots
(Gassen et all, 2012)
Attack Methods




Infections can occur through trojans and
worms
Clicking on infected links and opening
infected email attachments can cause
infections
Vulnerabilities






Keeping all software, including OS, patched
and up to date is the best defense
At first attacks were only successful on
weak systems
Now malware can join secure computers to
botnets
–

Many times antivirus software is unaware of
the infection
The Extent of the Damage







It is estimated that hundreds of millions of
computers are members of botnets
(Greengard, 2012)
Most of the time the user is unaware of the
infection
These botnets are being used to send spam
Also being used to steal identities, credit
card information, and trade secrets
(Greengard, 2012)


Attacks are primarily uses to generate
income
–



Stolen credit card numbers are worth $10700 on the black market (Gassen et all,
2012)

Attacks may also have a military or political
motive (Gassen et all, 2012)
References
Gassen, J, Gerhards-Padilla, E, Martini, P. (2012). Current Botnet
�Techniques and Countermeasures. PIK �Praxis der
Informationsverarbeitung und Kommunikation. Vol 35 Issue 1, p310.
Greengard, Samuel. (2012). The War Against Botnets. Communications
of the ACM. Vol 55

Issue 2, p16-18.

More Related Content

What's hot

8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020SecPod Technologies
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID SystemGayathridevi120
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSKenny Huang Ph.D.
 
Electronic mail and online safety (Sep 17, 2008) (beginner)
Electronic mail and online safety (Sep 17, 2008) (beginner)Electronic mail and online safety (Sep 17, 2008) (beginner)
Electronic mail and online safety (Sep 17, 2008) (beginner)Henry Van Styn
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threadssrivijaymanickam
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityPatty Ramsey
 
Presentation on computer virus
Presentation on computer virusPresentation on computer virus
Presentation on computer virusShashankRoy11
 
ransomware_infographic-6-2016
ransomware_infographic-6-2016ransomware_infographic-6-2016
ransomware_infographic-6-2016Sal Rodriguez
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethicsArgie242424
 

What's hot (11)

Dickmaster
DickmasterDickmaster
Dickmaster
 
Botnet
BotnetBotnet
Botnet
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
 
Electronic mail and online safety (Sep 17, 2008) (beginner)
Electronic mail and online safety (Sep 17, 2008) (beginner)Electronic mail and online safety (Sep 17, 2008) (beginner)
Electronic mail and online safety (Sep 17, 2008) (beginner)
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
Presentation on computer virus
Presentation on computer virusPresentation on computer virus
Presentation on computer virus
 
ransomware_infographic-6-2016
ransomware_infographic-6-2016ransomware_infographic-6-2016
ransomware_infographic-6-2016
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 

Viewers also liked

Botnet detection based on anomaly and community detection
Botnet detection based on anomaly and community detectionBotnet detection based on anomaly and community detection
Botnet detection based on anomaly and community detectionShakas Technologies
 
Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet ArchitectureBini Bs
 
Botnet Detection Techniques
Botnet Detection TechniquesBotnet Detection Techniques
Botnet Detection TechniquesTeam Firefly
 
West Side Neighborhood In Newark
West Side Neighborhood In Newark West Side Neighborhood In Newark
West Side Neighborhood In Newark APA-NJ
 
Global Botnet Detector
Global Botnet DetectorGlobal Botnet Detector
Global Botnet DetectorBrenton Mallen
 
Lighting Design Project
Lighting Design Project Lighting Design Project
Lighting Design Project dezyneecole
 
Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1Cysinfo Cyber Security Community
 
evocative architecture_final
evocative architecture_finalevocative architecture_final
evocative architecture_finalSMMCAnagpur
 
Barrier free architecture in hospitals
Barrier free architecture in hospitals Barrier free architecture in hospitals
Barrier free architecture in hospitals Abhishek Singh
 
Rural development planning
Rural development planningRural development planning
Rural development planningM Usama Sehgal
 
theories in rural development and planning
 theories in rural development  and planning theories in rural development  and planning
theories in rural development and planningGopal Menghwar
 
Interior lighting design tips
Interior lighting design tipsInterior lighting design tips
Interior lighting design tipsDhiraj Salhotra
 
Barrier free architectural design
Barrier free architectural design Barrier free architectural design
Barrier free architectural design jitendra jain
 
Green Building Construction in India
Green Building Construction in IndiaGreen Building Construction in India
Green Building Construction in Indiaintellobuild
 

Viewers also liked (20)

Botnets
BotnetsBotnets
Botnets
 
Botnet detection based on anomaly and community detection
Botnet detection based on anomaly and community detectionBotnet detection based on anomaly and community detection
Botnet detection based on anomaly and community detection
 
Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet Architecture
 
Botnet Detection Techniques
Botnet Detection TechniquesBotnet Detection Techniques
Botnet Detection Techniques
 
West Side Neighborhood In Newark
West Side Neighborhood In Newark West Side Neighborhood In Newark
West Side Neighborhood In Newark
 
Global Botnet Detector
Global Botnet DetectorGlobal Botnet Detector
Global Botnet Detector
 
Lighting Design Project
Lighting Design Project Lighting Design Project
Lighting Design Project
 
Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1
 
evocative architecture_final
evocative architecture_finalevocative architecture_final
evocative architecture_final
 
Botnet
Botnet Botnet
Botnet
 
Barrier free architecture in hospitals
Barrier free architecture in hospitals Barrier free architecture in hospitals
Barrier free architecture in hospitals
 
Rural development planning
Rural development planningRural development planning
Rural development planning
 
Barrier Free Design
Barrier Free DesignBarrier Free Design
Barrier Free Design
 
theories in rural development and planning
 theories in rural development  and planning theories in rural development  and planning
theories in rural development and planning
 
Interior lighting design tips
Interior lighting design tipsInterior lighting design tips
Interior lighting design tips
 
Green building
Green buildingGreen building
Green building
 
Neighborhood
NeighborhoodNeighborhood
Neighborhood
 
Barrier free architectural design
Barrier free architectural design Barrier free architectural design
Barrier free architectural design
 
Neighbourhood Planning
Neighbourhood PlanningNeighbourhood Planning
Neighbourhood Planning
 
Green Building Construction in India
Green Building Construction in IndiaGreen Building Construction in India
Green Building Construction in India
 

Similar to Part One - What is a Botnet?

Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Aniq Eastrarulkhair
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
A review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsA review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsAlexander Decker
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber securityBansari Shah
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfLucaMartins7
 
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdfanjanaarts2014
 
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)DCIT, a.s.
 
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...Editor IJCATR
 
What are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdfWhat are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdfinfo309708
 

Similar to Part One - What is a Botnet? (20)

Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Botnet
BotnetBotnet
Botnet
 
Botnets
BotnetsBotnets
Botnets
 
Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1
 
Hack the hack
Hack the hackHack the hack
Hack the hack
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
A review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsA review botnet detection and suppression in clouds
A review botnet detection and suppression in clouds
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
 
BOTNETS
BOTNETSBOTNETS
BOTNETS
 
BOTNET
BOTNETBOTNET
BOTNET
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdf
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
 
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
 
Computer security
Computer securityComputer security
Computer security
 
Botnet
BotnetBotnet
Botnet
 
Cybersecurity -Terms.
Cybersecurity -Terms.Cybersecurity -Terms.
Cybersecurity -Terms.
 
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
What are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdfWhat are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdf
 

Recently uploaded

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

Part One - What is a Botnet?

  • 2. Definitions  Bot − −  Short for robot Refers to an infected computer that takes orders and reports back (Gassen et all, 2012) Botnet − A network of bots
  • 3.  Botmaster − −  Also referred to botherder The person that controls a botnet (Gassen et all, 2012) C & C Server − Command and control server used by a botmaster to communicate with bots (Gassen et all, 2012)
  • 4. Attack Methods   Infections can occur through trojans and worms Clicking on infected links and opening infected email attachments can cause infections
  • 5.
  • 6. Vulnerabilities    Keeping all software, including OS, patched and up to date is the best defense At first attacks were only successful on weak systems Now malware can join secure computers to botnets – Many times antivirus software is unaware of the infection
  • 7. The Extent of the Damage     It is estimated that hundreds of millions of computers are members of botnets (Greengard, 2012) Most of the time the user is unaware of the infection These botnets are being used to send spam Also being used to steal identities, credit card information, and trade secrets (Greengard, 2012)
  • 8.  Attacks are primarily uses to generate income –  Stolen credit card numbers are worth $10700 on the black market (Gassen et all, 2012) Attacks may also have a military or political motive (Gassen et all, 2012)
  • 9.
  • 10.
  • 11.
  • 12. References Gassen, J, Gerhards-Padilla, E, Martini, P. (2012). Current Botnet �Techniques and Countermeasures. PIK �Praxis der Informationsverarbeitung und Kommunikation. Vol 35 Issue 1, p310. Greengard, Samuel. (2012). The War Against Botnets. Communications of the ACM. Vol 55 Issue 2, p16-18.

Editor's Notes

  1. {}