Daniul byrd
This presentation is the property of its rightful owner.
Sponsored Links
1 / 10

Botnets PowerPoint PPT Presentation


  • 65 Views
  • Uploaded on
  • Presentation posted in: General

Daniul Byrd. Botnets. What are bots?. Software that automates tasks Can network to share data and act in coordination. Deployment. “Drive-by-Downloads” Social Engineering Spread through network. Structure. Bots answer to Botmaster Centralized Structure Decentralized Structure. Uses.

Download Presentation

Botnets

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Daniul byrd

Daniul Byrd

Botnets


What are bots

What are bots?

  • Software that automates tasks

  • Can network to share data and act in coordination


Deployment

Deployment

  • “Drive-by-Downloads”

  • Social Engineering

  • Spread through network


Structure

Structure

  • Bots answer to Botmaster

  • Centralized Structure

  • Decentralized Structure


Botnets

Uses

  • Spam email

  • Distributed Denial of Service attacks (DDoS)

  • Harvesting information

    • Keyloggers

    • Email Addresses

    • Passwords

  • Click Fraud

  • Selling or Leasing their services


Detection

Detection

  • Can be difficult

  • Slow/non-responsive system or crashes

  • Monitor network traffic

  • Some will try to defend themselves


Prevention

Prevention

  • Similar to avoiding other types of malware

  • Avoid unknown emails or attachments

  • Avoid questionable sites

  • Be aware of social engineering tactics

There are bots for non-Windows platforms too!


Legality ethics

Legality & Ethics

  • CAN-SPAM Act (2003)

    • False header information

    • Inclusion of sender’s valid physical address

    • Use of other’s computers without permission

    • Harvesting email addresses

    • More…

  • Theft

    • Financial information, ID Theft

    • Passwords


How it relates

How It Relates

  • Awareness of malicious botnets can aid in avoiding them

    • Coworkers…

  • Botnets can be a powerful tool when used legally


References

References

  • “Botnet Sharing and Linking”. Eggheads.org. Web. Apr. 2014.

    <http://cvs.eggheads.org/viewvc/eggdrop1.6/doc/BOTNET?view=markup>

  • “About BotHunter”. BotHunter.net. Web. Apr. 2014

    <http://www.bothunter.net/about.html>

  • Mashevsky, Yuri. “The Bagle botnet”. SecureList. Web. Apr. 2014.

    <http://www.securelist.com/en/analysis/162656090/The_Bagle_botnet>

  • Namestnikov, Yury. “The Economics of Botnets”. SecureList. Web. Apr. 2014.

    <http://www.securelist.com/en/analysis/204792068/The_economics_of_Botnets>

  • “Spam Laws: The United States CAN-SPAM Act”. SpamLaws. Web. Apr. 2014.

    <http://www.spamlaws.com/spam-laws.html>

  • Liao, Qi, and Zhen Li. “Portfolio Optimization of Computer and Mobile Botnets”.

    International Journal of Information Security 13.1 (2014): 1-14. Academic Search

    Complete. Web. Apr. 2014

  • RODRÍGUEZ-GÓMEZ, RAFAEL A., GABRIEL MACIÁ -FERNÁNDEZ, and PEDRO GARCíA-

    TEODORO. "Survey And Taxonomy Of Botnet Research Through Life-Cycle." ACM

    Computing Surveys 45.4 (2013): 45-45:33. Academic Search Complete. Web. Apr. 2014

  • Davis, Lidja. “Is Your PC Part of a Botnet?”. Readwrite.com. Web. Apr 2014.

    <http://readwrite.com/2009/03/15/is_your_pc_part_of_a_botnet#awesm=~oCMKDXyIwi4FRc>


  • Login