We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Botnets - Essay Example

Comments (0)
Internet has made life convenient for mankind and has reduced the distances of the world by providing fast communication. Like many other things in the world, even Internet has two aspects regarding its usage…
Download full paper
Read TextPreview

Extract of sample

Download file to see previous pages... Botnets come under the category of such inventions and become a source of much distress for the computer user. Botnets pose different kinds of threats like denial of service, spamming, click fraud etc. Several techniques and mechanisms have been adapted to enhance the security measures of networks and avoid any damage by botnets.
‘Bot’ is defined as a single computer that possesses the malicious program to make it a part of a wider network of similar computer systems, which is known as ‘Botnet’. Botnets are defined as an autonomous set of programs that perform functions without the aid of any user. They are either controlled by one system or multiple systems, which are known as the botmaster. A distributed nature of botnets involves a set of distributed computers that communicate with each other over the internet and perform some tasks together (Banday et al, 2009). The communication between the bots and the botmaster can be a direct link but such communication can make the botmaster identifiable in the network. Therefore, such direct links are not used. On the contrary, command languages and control protocols (C&C) are used to manage the bots remotely (Banday et al, 2009). These set of programs were initially developed to automate tasks on a set of machines to minimize the need of the presence of a person and to enhance communication and resource sharing. But the concept of their usage changed drastically when they started being used for malicious purposes. Botnets started being developed for the purpose of financial gains and recognition. The hacker’s scale of goodness of a botnet is the degree of damage that it is able to cause.
Intruders and spammers can install the software (required for intrusion) in a number of ways. The user might not even be aware of the vulnerability of his system and may become a bot in the network of similarly compromised computers. The first step in this unpleasant activity is the identification of a computer on the ...Download file to see next pagesRead More
Comments (0)
Click to create a comment or rate a document
The existence of botnets is the most serious threat to the information security today
In the sense of malicious use of computing technology, a collection of bots or computers make up a botnet if they are being exploited by hackers to accomplish malicious duties according to Hudak (nd). A member of a botnet is formed when an infected file is downloaded on it usually from an email attachment.
4 Pages(1000 words)Essay
Botnets Essay
The compromised zombie army is invaded by a Trojan, which is known as a remote application that installs itself within the system memory or kernel and provides data or connectivity to the hacker. Moreover, Trojan is operational by initiating an Internet Relay Chat (IRC) that waits for any action from the hacker who has full control over the botnet (Rapoza, 2008).
3 Pages(750 words)Essay
Why Is It Said That Packet Switching Employs Statistical Multiplexing

According to the research, statistical multiplexing in a system of TDM requires that all bandwidths needed by the subchannels to surpass the bandwidth of the multiplex channel. In this statistical multiplexing, the maximum rate needed by any single channel is rarely used because of the transmission breaks and therefore, this system is workable in the well-thought-out usage of buffering.

3 Pages(750 words)Essay
Information Technology Essay
Usually, attackers utilize bots as a means to contaminate huge numbers of personal computers, which eventually form a large network, which is known as a botnet (Craig 2007). Botnets are more often used by attackers to multiply viruses on networks, to hit servers and computers and even to commit various criminal acts.
4 Pages(1000 words)Essay
Identify two reported court cases that have impacted the evidentiary process or analysis in digital forensic cases
Jeanson James Ancheta’ and ‘107 F3d 4 United States V. Fernandez Lee’. Both cases were summarized as well as analyzed to conclude its effects and significances. United States of America v. Jeanson James Ancheta Synopsis Jeanson James Ancheta (the defendant), a 21 year old boy of Downey, California was accused as per the Computer Fraud Abuse Act, for the abuse of CAN-SPAM Act and for accessing the protected computers of US governmental agencies for committing fraudulent crimes and causing damages to the computers of the Federal used for the purpose of national defense.
4 Pages(1000 words)Research Paper
Cybercrime - reading critique
In fact some of the organized cyber attacks which occurred in the recent times have surprised some of the highly technically skilled personnel. Even national economy and security can be destroyed by cyber attacks in the absence of
3 Pages(750 words)Essay
1.Appreciate important issues in computer system design such as speed and flexibility and be able to demonstrate an understanding of the organisational principles of current computer systems
Just like everything in the world has two aspects; computer usage has a dark side related to it as well. Ever since the inception of computers, some computer users pose to be a threat for the
6 Pages(1500 words)Essay
ISPs need to collaborate and fight the battle against botnets with mutual help. A guideline has been proposed regarding the appropriate actions that should be taken by ISPs to overcome the problem. The advent of
14 Pages(3500 words)Essay
An analyzed look into current botnet controls
The result is that millions of computers are infected with spyware and viruses, huge amounts of spam are sent andidentity theft greatly increases.Botnets are currently the major threat on the internet. This is because
7 Pages(1750 words)Thesis Proposal
The Changing nature of crime in the twenty-first century
Various cyber related crimes including: financial crimes such as online financial services infringement and online fraud; attacks on computer hardware or software such as network intrusion, malware, and botnets; intellectual property crimes; and abuse
1 Pages(250 words)Essay
Let us find you another Essay on topic Botnets for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us