By Mason Hall And Zeb Fross
Attacker Command & Control Zombies
DDos Attacks Spamming Traffic Sniffing Keylogging Identity Theft
Started with IRCs Notable Bots Pretty Park (1999) Global Threat bot (2000) Agobot (2002) Polybot (2004) Phatbot (2004) Mariposa (2009)
Layered Firewalls and Diversionary Paths Full Security Suite Workable Patch Management System Shutting Down External Access Monitoring Traffic Flux Disrupting Attacks and Isolating Infected Machines Patching to Prevent Similar Repeated Attacks
s Status Sends Spam Monitors System Resources
The Botnet-For-Hire
Anderson, NA. (2007). Vint cerf: one quarter of all computers part of a botnet. ars technica, Retrieved from Corrons, LC. (2010). Mariposa botnet. Pandalabs, Retrieved from botnet/ botnet/ distributed denial-of-service attack (ddos). (2001, June 03). Retrieved from Ferguson, RF. (2010, September 27). The history of the botnet: part 1. Retrieved from hakin9, h9. (2005, October 20). Robot wars – how botnets work. Retrieved from Work.htmlearch/threats/phatbot/?threat=phatbot Work.htmlearch/threats/phatbot/?threat=phatbot Irc clients and servers. (2000). Retrieved from Kiran.Kola, MK. (2008). Botnets: overview and case study. Unpublished manuscript, Department of Mathematics and Computer Information Science, Mercy College, Dobbs Ferry, New York. Retrieved from Possible defenses against botnet attacks. (n.d.). Retrieved from botnet-attacks.html botnet-attacks.html Stewart, JS. (2004, March 15). Phatbot trojan analysis. Retrieved from Weber, TW. (2007, January 25). Criminals 'may overwhelm the web'. BBC News, Retrieved from X, X. (2008, March 3). Gt bot (global threat), info things. Retrieved from