Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies 2014
DOI: 10.1145/2677855.2677947
|View full text |Cite
|
Sign up to set email alerts
|

Tools, Techniques & Analysis of Botnet

Abstract: The term botnet stands for robot in the internet environment. The botnet operates in collection of computers by performing malicious activity. It is basically installed in the computer by tricking the users to download of unauthorised software from the internet to steal user data and performing distributed denial of services. Different techniques has been adopted to prevent these botnets from executing and defend them using security techniques like firewall, antivirus etc. But today botnet creators are one ste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…Over time, however, bot codes could now be engineered to be able to recruit other vulnerable systems as bots into the botnet, report the status of the operations of individual bots in the botnet, and protect the botnet and its member bots from infiltration [1]. The design and anatomy of botnets often makes them flexible and robust enough to be able to threaten and even successfully subvert any network topology, from conventional cyber infrastructure and devices to Mobile Ad-hoc networks (MANET) [2], Voice over IP (VoIP) infrastructures [3], as well as Autonomous Vehicular Networks [4] Every botnet essentially has four general participants: These are the bots or zombies (the compromised machines) [5], the bot controller or bot code (the malicious code that infects the vulnerable hosts/targets in the network), the bot master or bot herder (the attacker/hacker/cybercriminal who engineers the bot code and controls the botnet) [6,7], and the command and control (C&C) server (the central rendezvous point for all the bots in the botnet [8]. The power that drives botnets to achieve their various goals lies in the structure and resilience of its architecture.…”
Section: Introductionmentioning
confidence: 99%
“…Over time, however, bot codes could now be engineered to be able to recruit other vulnerable systems as bots into the botnet, report the status of the operations of individual bots in the botnet, and protect the botnet and its member bots from infiltration [1]. The design and anatomy of botnets often makes them flexible and robust enough to be able to threaten and even successfully subvert any network topology, from conventional cyber infrastructure and devices to Mobile Ad-hoc networks (MANET) [2], Voice over IP (VoIP) infrastructures [3], as well as Autonomous Vehicular Networks [4] Every botnet essentially has four general participants: These are the bots or zombies (the compromised machines) [5], the bot controller or bot code (the malicious code that infects the vulnerable hosts/targets in the network), the bot master or bot herder (the attacker/hacker/cybercriminal who engineers the bot code and controls the botnet) [6,7], and the command and control (C&C) server (the central rendezvous point for all the bots in the botnet [8]. The power that drives botnets to achieve their various goals lies in the structure and resilience of its architecture.…”
Section: Introductionmentioning
confidence: 99%