StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Defining the Botnet - Essay Example

Cite this document
Summary
This essay "Defining the Botnet" defines and demonstrates the botnet, how the botnet is created and infects the computer systems over the internet. A botnet is a collection of infected computers connected to the internet which are being controlled by the Bot herder and command center. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Defining the Botnet
Read Text Preview

Extract of sample "Defining the Botnet"

?The first part of the video lecture defines and demonstrates the botnet, how the botnet are created and infect the computer systems over the internet. A botnet is a collection of infected computers connected to the internet which are being controlled by the Bot herder and command center. It has been found in the video that a Bot client can easily be developed by a Trojan that installs a bot code on the victim’s PC through a compiled and executable source code that can be written in Microsoft Visual C++. It has been learnt from the video through a practical example to control and command the bots through IRC that can be installed on the private server machine and spreading the bots through e-mail attachment, downloading BitTorrent, etc. The second video explains the bot attacks; the first potential attack is Distributed Denial of Services (DDOS) can be activated by sending a huge amount of traffic b from many bots herders on the victim’s computer so that the customers cannot access the online server. The video explains the second attack named Command Line Control through an Rlogin server in easy to understand method. Further, the video talks about the third bot attack known as Spying on Zombies. The video makes you understand regarding spying the victim’s computer through a key-logger, packet sniff, capturing screenshots etc. The third part of the video emphasis on defenses your system from the potential threat of botnet by keeping bots out, mute bots and detecting the bots activities. The video explains to install firebox, upgrading patch promptly, using antivirus with auto-update, using firebox proxies and GAV, and training of the professionals and users for keeping bots out of your computer system. Organizations can mute and detect activities of bots as well by configuring the firebox appropriately as explained in the video. The article titled “Microsoft disrupts Nitol botnet spreading on counterfeit Windows PCs” written by Lee Mathews and published on 13th September, 2012. The article explains that the digital crime unit of the Microsoft identified enormous botnet and they have taken control of the domains as per instructions of the court order. The report from the Microsoft’s digital crime unit notifies a malicious attack of Nitol, the botnet. It classifies that the domain Nitol, 3322.org along with over 70,000 subdomains have been found to be affected by 500 different malware. Following the court orders, Peng Yong, a Chinese businessman surrendered, giving not only the DNS control of Nitol but also the effecting domains to Microsoft, allowing them to filter the incoming and outgoing traffic for the security of users from the suspected attack by Nitol, and other malware from 3322.org and other sub-domains. At this time, the action taken by Microsoft was not as vigorous as against Waledac, Kalihos or Rustock. Because the investigation teams vigilant the Microsoft while investigating the problems of illegal Windows Installation in China, that more than 20% of the systems have pre-installed unnecessary software including, but not limited to HP or Toshiba-style software bloat. It was the thing as Microsoft suspected from Nitol botnet, developed catastrophic malware that could not only able producing spam and redirect DNS requests but also proliferate through flash drives. http://www.geek.com/articles/news/microsoft-disrupts-nitol-botnet-spreading-on-counterfeit-windows-pcs-20120913/ The student has summarized the article titled “Botnet Masters Hide Command and Control Server inside the Tor Network”, by Lucian Constantin. The student has spectacularly discussed the article regarding research of Germans as they found a botnet that is hidden in the Tor secrecy network. The botnet can operate on an Internet Relay chat server and it has advantages as well as disadvantages. According to them, it is hard to find its specific location so that is very difficult to locate and shut down. A signal is sent to another computer from the user’s computer, when one uses Tor for internet access. Moreover, the researchers identified that it is not easy to block the traffic by intrusion detection systems, when infecting another computer. It could be harmful to detect malicious destination, as it is found in encrypted form and it has not a definite location. The student has described that overall the Tor can be abused easily, in spite of being developed for user’s privacy. The second article titled “Microsoft battles botnet pre-installed on systems” recapitulated by the student is similar to my article. The student stated that it was found during the investigation in China that 20 % of the new tested PCs had a built in botnet named Nitol. It was actually installed in the assembly line on the PCs. As shown in the video, the botnet automatically starts to find for other networks. Microsoft diagnosed it by closing the domain that acted as a hub for the botnet. It relates to my comment in the third video, Windows 7 can stop the installation of .exe extension files, but still, its complications can open ways for cyber criminals. In the third article, the student briefly explains the third largest Botnet named “Grum”. The bonnet is the basic reason of 18% spam on the World Wide Web. The Grum was detected by experts through blocking commands and controlling servers, and finally shut it down. Owing to the long durations, legal actions could take lead the experts to fight the Grum. Shutting down the Grum was a success, but still many botnets reappear in an altered form, and can inject in servers easily. Stuxnet is one of the exceedingly complicated computer worms that have capability of reconnoitering and re-programming the systems (especially industrialized) utilized to manage and supervise the business processes. It was discovered in 2010 by VirusBlokAda, a security organization in Belarus. As per the report of the Symantec Antivirus Inc, the worm has swabbed out approximately sixty (60) percent of the Iran’s computer network. It has been found that still the actual rationale and foundation of the virus is internationally unknown, but all are well aware that it is harmful. No matter what the purpose of its subsistence, the Stuxnet has the capability to obliterate the navigational systems, industrial systems, and medical facilities and encompasses implications for the business. Now it becomes necessary for organizations to connect with the World Wide Web that exposes them According to me, the Stuxnet worm can be malevolent hazardous to the organizations utilizing software systems over the internet. Therefore, it would be appropriate for the organizations prepare themselves to tackle such worms. In order to avoid such threatening, the organizations should develop proper Information Technology Security Policy to safeguard their digital information, fraud and intellectual property thefts. The organizations should recruit the IT security professionals and train them regularly. It is more suitable that the information may be stored on separate PCs that are not usually connected to the internet. As the businesses can only be successful by relying on the accurate and secured information, therefore, the businesses should apply security standards to avoid worms like Stuxnet. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Homework Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Homework Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/other/1401347-homework
(Homework Essay Example | Topics and Well Written Essays - 1000 Words)
Homework Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/other/1401347-homework.
“Homework Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/other/1401347-homework.
  • Cited: 0 times

CHECK THESE SAMPLES OF Defining the Botnet

United Nations Conventions on Contract

The present paper aims to discuss the business and trade deals conducted at international scale between SamCo with DeanCo on the one hand, and between SamCo and CastielCo on the other, in the light of 1980 United Nations Vienna Convention on international trade and business contracts.... .... ... ...
13 Pages (3250 words) Essay

Research Project : Information Security Management

Instructor Institution Date Information Security Introduction Information systems have increasingly come under attack from various security threats.... Some of the threats gain access through systems in conventional ways that can be prevented if adequate security measures are taken while others are very hard to control due to their ability to infiltrate in to the system unnoticed (Stephen, et al, 96)....
3 Pages (750 words) Research Paper

Secure Procedures for Certificate Delivery

A botnet infection may occur even through genuine Web sites.... With subtle delivery techniques, users do not have to do much, except loading a Web page, triggering a botnet infection.... With the imagination of the human mind, racing at the speed of light it is quite evident how it affects the field of technology....
2 Pages (500 words) Essay

Botnets Have Invaded the World of Internet

??Bot' is defined as a single computer that possesses the malicious program to make it a part of a wider network of similar computer systems, which is known as ‘botnet'.... The hacker's scale of goodness of a botnet is the degree of damage that it is able to cause....
7 Pages (1750 words) Essay

Advantages of Fiber Polymers over Metals

The essay "Advantages of Fiber Polymers over Metals" focuses on the critical analysis of the major advantages of fiber polymers over metals.... Fiber-reinforced polymers are increasingly used in the automotive industry and other industries due to their benefits over conventional metals.... ... ... ...
14 Pages (3500 words) Essay

Analysis of Hacking Attacks

The paper "Analysis of Hacking Attacks" states that Stuxnet has been proved to be able to control communication between PLC and Siemens programming station.... It hides changes made to PLC and it is rated as one of the most sophisticated engineered worms.... ... ... ... Stuxnet worm is one type that is believed to have been developed by the government for its development is considered to be a very complex and sophisticated one to be developed just by a private group (Holliday, 2010)....
24 Pages (6000 words) Coursework

Types of Hacking

The paper "Types of Hacking" discusses that recent years have seen the development of a number of interesting developments which detail how the techniques of cyber intrusions and attacks may be used on a national level, executing of host applications, and specific malicious actions.... ... ... ... Stuxnet may officially be the first know 'worm' ever designed that was purposefully geared to target 'real worlds' infrastructure, like water plants and power plants....
24 Pages (6000 words) Coursework

Network Attack and Defense

Due to the importance of understanding network security, it is essential to bring an insight into trending security engineering concepts.... Therefore, this writer of this paper 'Network Attack and Defense' decided to discuss network attack and defence mechanisms.... ... ... ... The evolution of technology and the internet has led to the emergence of interdependence in computer systems....
10 Pages (2500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us