Botnets By: Brandon Sherman. What is a Botnet? Botnet is a term referring to a network of multiple computers being affected by software robots. These.

Slides:



Advertisements
Similar presentations
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Advertisements

© 2005 Convio, Inc. NTEN Webinar: Protecting your organization and donors from online scams February 23, 2006.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Significant Social & Ethical Issues. Significant Issues Year 2000 Y2K Problem Viruses Reliance on Software.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Slides to add  Botnet slides  Security regulations  Do we have similar laws for transportation?  Terrorism (look for some examples if possible)  Company.
CS682 – Network Management and Security Session 7.
Detecting Botnets Using Hidden Markov Models on Network Traces Wade Gobel Bio-Grid, Summer 2008.
Chapter 5 - TRANSPORT and NETWORK LAYERS - Part 2 - Static and Dynamic Addressing Address Resolution Dr. V.T. Raja Oregon State University.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
What Is A Web Page? An Introduction to the Internet.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
MIRAGE CPSC 620 Project By Neeraj Jain Hiranmayi Pai.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Botnets An Introduction Into the World of Botnets Tyler Hudak
Tyler’s Malware Jeopardy $100 VirusWormSpyware Trojan Horses Ransomware /Rootkits $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500.
Attacks on Computer Systems
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
BotNet Detection Techniques By Shreyas Sali
Safe Internet Use Mark Wheatley CSI Onsite
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
A Multifaceted Approach to Understanding the Botnet Phenomenon Authors : Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Computer Science.
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Daniul Byrd. What are bots?  Software that automates tasks  Can network to share data and act in coordination.
WAN the internet and protocol  Lesson Objective: Understand the main terminology about networks.  Learning Outcome: Understand the different types of.
1 After completing this lesson, you will be able to: Transfer your files to the Internet. Choose a method for posting your Web pages. Use Microsoft’s My.
Click your mouse to continue. Connecting to the Internet To connect to the Internet, your computer must have: A Web browser, such as Microsoft Internet.
Host and Application Security Lesson 17: Botnets.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
Advanced Persistent Threats (APT) Sasha Browning.
Security in Cloud Computing Zac Douglass Chris Kahn.
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
4/26/2017 HP Insight Managament Agents and RSM disabling Tape Storage Wei Jung Shih Hung July HP template.
CITA 310 Section 3 Additional Topics. Common IPv4 Classes ClassFirst numberSubnet maskNumber of networks Number of addresses Class A0 – ,777,216.
Applying Software Obfuscation to Malicious Code Teigh Berg.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
I2Coalition: How To Build Relationships And Save Money With Better Abuse Reporting Moderator: Michele Neylon CEO, Blacknight.
Dynamic Domain Name System
Detecting DGA Botnets Using DNS Traffic
Server Machines By Brett Gunder COSC 101.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Backdoor Attacks.
ISYM 540 Current Topics in Information System Management
Optimising Our Network
Internet LINGO.
Securing Information Systems
Information Technology Unit State Treasury Agency Ministry of Finance Azerbaijan Republic Elnur Aliev Baku April 11, 2018.
Risk of the Internet At Home
Forensics Week 12.
James Fox Brianna Sheftel
Slides for Chapter 1 Characterization of Distributed Systems
Botnet Detection by Monitoring Group Activities in DNS Traffic
Module 1: Overview of Systems Management Server 2003
Security in Cloud Computing
Marcial Quinones-Cardona
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
An overview over Botnets
Cybersecurity Simplified: Ransomware
Presentation transcript:

Botnets By: Brandon Sherman

What is a Botnet? Botnet is a term referring to a network of multiple computers being affected by software robots. These robots or bots as they are often referred to as are controlled remotely from the attacker’s computer. The attacker’s computer controls the command and control section of the victim’s computer.

What have Botnets done? Botnets are usually used for financial gain. Like the ZeroAccess botnet. This botnet is used for click fraud and bitcoin mining.

Prevention of Botnets Companies and agencies such as Microsoft and the FBI are diligently working on a solution for the Botnet problem. Microsoft took down 40% of ZeroAccess' infrastructure. 18 IP addresses 49 domain names

How to prevent Botnets Most of the best ways to prevent botnets are being done only on server and the ISP side of the problem as previously stated. But there are a few ways you can prevent them yourself. Keep all software up to date. Do not click on suspicious links. Try not to open any malicious attachments.

THANK-YOU