A survey of botnet crimeware life cycle (original) (raw)

A Wide Scale Survey on Botnet

research.ijcaonline.org

Among the diverse forms of malware, Botnet is the serious threat which occurs commonly in today"s cyber attacks and cyber crimes. Botnet are designed to perform predefined functions in an automated fashion, where these malicious activities ranges from online searching of data, accessing lists, moving files sharing channel information to DDoS attacks against critical targets, phishing, click fraud etc. Existence of command and control(C&C) infrastructure makes the functioning of Botnet unique; in turn throws challenges in the mitigation of Botnet attacks.

Survey on Botnet

2014

Now days internet users are increased drastically, with those malicious activities through internet have also been increased. One of the most commonly occurring and serious attack is botnet. Botnet is group of compromised computers and they are controlled remotely by the botmaster. And further more hackers also have started using fluxing techniques to evade the detection. It is impossible to detect and stop them completely. Here in this paper we discuss botnet in detail with its characteristics and some of its attacks and detection techniques.

Study of Botnets and their threats to Internet Security

2009

Among all media of communications, Internet is most vulnerable to attacks owing to its public nature and virtually without centralized control. With the growing financial dealings and dependence of businesses on Internet, these attacks have even more increased. Whereas previously hackers would satisfy themselves by breaking into someoneâ s system, in today's world hackers' work under an organized crime plan to obtain illicit financial gains. Various attacks than include spamming, phishing, click fraud, distributed denial of services, hosting illegal material, key logging, etc. are being carried out by hackers using botnets. In this paper a detailed study of botnets visa -vis their creation, propagation, command and control techniques, communication protocols and relay mechanism is presented. The aim of this paper is to gain an insight of security threats that users of Internet are facing from hackers by the use of malicious botnets.

A Framework on botnet deteetion and forensies

—The utilization of Internet on domestic and corporate front has been increasing at drastic rate. Each organization and enterprise exploits the internet to its fullest extent based on its requirements. In almost all areas, internet is proved to be a boon. But sometimes it lands the users into trouble because of un-wanted and uninvited harmful software applications. There are so many types of threats and challenges that are faced by the in-ternet users. Out of all the threats faced by internet users, botnets are at the top most position. Because of these prodigious threats botnets are the rising area of research. Botnet works as a coordinated or synchronized activity where different bots collectively participate to perform a malicious task. The botnet is different from other form of malware in its capability to compromise the computer systems or smartphones to set up a link with command and control(C&C) server controlled by bot controller. Because of the massive participation of compromised machines the losses caused by botnet attack are immeasurable. As a result, different researchers are showing keen interest in the field of botnets. The trend reflects that the number of researches in this field have gone up at tremendous rate in past 5 to 10 years. The present paper proposes a framework to systematically identify the presence of malicious bot, prevent it from spreading further and performing its forensic investigation.

A Critical Investigation of Botnet

Global journal of computer science and technology, 2013

A Botnet is a network of compromised hosts, called as bots that are used for malicious activity. These bots are then controlled by single master termed as Botmaster. A Botmaster may inject commands though any bot to launch DDoS attack. In this paper, we have demonstrated the behavior of Botnet on network in real time Internet environment.This will be helpful for researcher to detect the different types of emerging Botnet.

Botnet-A Network Threat

Ijca Proceedings on International Conference on Recent Trends in Information Technology and Computer Science, 2012

Botnet are network threats that generally occur from cyber attacks, which results in serious threats to our network assets and organization"s properties. Botnets are collections of compromised computers (Bots) which are remotely controlled by its originator (BotMaster) under a common Command-and-Control (C&C) infrastructure. Among the various forms of malware, botnets are emerging as the most serious threat against cyber-security as they provide a distributed platform for several illegal activities such as launching distributed denial of service attacks against critical targets, malware dissemination, phishing, and click fraud. The most important characteristic of botnets is the use of command and control channels through which they can be updated and directed. The target of the botnet attacks on the integrity and resources of users might be multifarious; including the teenagers evidencing their hacking skills to organized criminal syndicates, disabling the infrastructure and causing financial damage to organizations and governments. In this context, it is crucial to know in what ways the system could be targeted. The major advantage of this classification is to identify the problem and find the specific ways of defense and recovery. This paper aims to provide a concise overview of major existing types of Botnets on the basis of attacking techniques.

A survey on Malware, Botnets and their detection

— The use of Internet and its related services is increasing day by day. Many million people everyday surf net and use it for various reasons. With so much use of internet, the threats related to security are the major concern of today. There are many security concerns or threats faced by the net surfers and that is because of malwares which have many forms such as viruses, worms, trojans horses, rootkits, botnets and various other forms of data attacks. Among all the threats mentioned above, botnet seems to be quite prevalent now days. It has already spread its roots in Wide Area Network (WAN) such as Internet and continuously spreading at very high pace. Botnet is a network of computers where the computers are infected by installing in them a harmful program. Each computer as a part of Botnet is called a bot or zombie. A Botnet is remotely controlled by a person who commands and controls the bots through a server called command and control sever(C&C). Such person who commands the bots is called a botmaster or bot herder. This paper is written to serve the objective to perform an extensive study of core problem that is the study and detection of Botnets.This paper focuses on the study of malwares where special emphasis is put on botnets and their detection.

BOTNETs: A Network Security Issue

International Journal of Advanced Computer Science and Applications

With the technological advancements in the field of networking and information technology in general, organizations are enjoying the technological blessings and simultaneously under perpetual threats that are present in the form of attacks, designed especially to disable organizations and their infrastructure, as the gravest cyber threats in recent times. Compromised computers or BOTNETs are unarguably the most severe threat to the security of internet community. Organizations are doing their best to curb BOTNETs in every possible way, spending huge amount of their budget every year for available hardware and software solutions. This paper presents a survey on the security issues raised by the BOTNETs, their future; how they are evolving and how they could be circumvent to secure the most valuable resource of the organizations which is data. The compromised systems may be treated like viruses in the network which are capable of performing substantial loss to the organization including theft of confidential information. This paper highlights the parameters that should be considered by the organizations or Network administrators to find out the anomalies that may point to the presence of BOTNET in the network. The early detection may reduce the impact of damage by taking timely actions against compromised systems.

Botnet: Evolution, Life Cycle, Architecture and Detection Techniques

2020

Botnet has become thorn for the Internet and the cyber security. Botnets are network of zombies controlled by botherder for their malicious and nefarious activities. These activities include distributed denial of service (DDoS) attack, click fraud, phishing, spamming, malware dissemination, traffic sniffing etc. The botnets are capable of bringing down the whole network within seconds. A number of techniques have been developed to detect the botnet and dismantle them but attackers have shown that they are always ahead of these detection techniques. This paper discusses the evolution of botnet, life cycle of botnet, its architecture and detection techniques. There are numerous detection techniques proposed by researchers that are reviewed on the basis of various parameters in this work. In spite of having such vast amount of detection techniques botnet can’t be tackled because of the dynamic nature of the Internet. The war against botnet can be seen as cat and mouse which is never-en...