Tuesday, October 29, 2019

An analyzed look into current botnet controls Thesis Proposal

An analyzed look into current botnet controls - Thesis Proposal Example Practically speaking one botnet could be made up of ten thousand machines.It is quite difficult to identify since they are vigorous in nature. This is in order to escape the security measures put in place. This is done through the download ofsoftware called a â€Å"bot† for example AgoBot. The download comes along with afixed payload incurred by an un-suspecting user. This download is executed through the clicking of email attachments that have been infected ordownloading infected files from malicious websites. The bot software can also be transmitted as freeway in peer to peer networks. After the installation of the bot with the fixed payload in the computer, the machine makes contact with a public server set up by the botmaster. This server is the control panel that is used to give commands to the botnet. A popular procedure involves using public (IRC) Internet Relay Chat servers. The control panels are frequently changed to avoid being detected. They are managed by machines and proxies that are not owned by the botmaster. The botmaster uses the control panel to send new exploit-code to the bots or to modify the bot-code so as to avoid detection through signature methods. This code is also used to insert new commands and attack victims (Patrick Lee, 2009). The botmaster’s main objective is to enlist new nodes into the botnet. A node is any computer that is connected to the internet hence making it a target for attack. Each node is commanded to search for other potential hosts. This pattern follows for every other machine that is recruited into the botnet. Therefore the machines that were in the botnet before and the new continuously carry out the search. Within a few hours, a botnet can become very large with a composition of millions of PCs on different network throughout the world. Given the large number of zombies distributed

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.