Download presentation
Presentation is loading. Please wait.
Published byArron Lyons Modified over 9 years ago
1
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET
2
A Quick Glance Introduction History How do they work ? Protocols What are they used for ? Types of BOTS Prevention Conclusion
3
INTRODUCTION Botnets are networks of computers taken hostage by malware that controls them and makes them to act in other nefarious ways. A "botnet" is a collection of computers that have been infected with remote-control software. Runs autonomously and automatically. User unaware
4
History Originally used in IRC as a way to allow automated tasks to be done Protect a channel, kick a user out of a channel etc.Protect a channel, kick a user out of a channel etc. Eventually evolved into a way to automate malicious tasks Started with DoS/DDoS against servers TFN, stacheldraht, trinoo (1999)TFN, stacheldraht, trinoo (1999)
5
How do they work? Worm/Trojan program that's usually transmitted through a spam. 2. Bot connects to IRC C&C channel 4. Repeat. Soon the botmaster has an army of bots to control from a single point 3. Botmaster sends commands through IRC C&C channel to bots Botmaster Victim IRC Server
6
PROTOCOLS IRC HTTP P2P
7
Some Important points Size of Botnets: 50,000 or more BOTS in a single botnet. 1000 new bots each day. IRC hides IP’S. Different botnets can be connected through IRC Botnets can be rented Botnet controller is always unidentified.
8
Malicious activities Distributed Denial-of-Service (DDoS) attacks. DDoS Spamming Sniffing Keylogging Spreading new malware Mass identity theft (Phishing)
9
GOOD APPLICATIONS Online games/Polling Instant Messenger Search Engines
10
EXAMPLE DDoS attack on an Asian e- commerce company in Nov. 2011 According to security company Prolexic it was the largest DDoS attacks in 2011 Prolexic refused to tell name of cpmpany because of a trust agreement with the company. The 15,000 requests per second were performed by a botnet of 250,000 PCs in total, which together peaked at 45Gbps DDoS traffic.
11
TYPES OF BOTS Agobot: Most sophisticated. Most sophisticated. 20,000 lines c/c++ code 20,000 lines c/c++ code IRC based command/control. IRC based command/control. Capable of many DoS attack types. Capable of many DoS attack types. Traffic sniffers/key logging. Traffic sniffers/key logging. SDBot: Simpler than Agobot, 2,000 lines C code. Simpler than Agobot, 2,000 lines C code. Non-malicious at base. Non-malicious at base. Easily extended for malicious purposes. Easily extended for malicious purposes. ScanningScanning DoS AttacksDoS Attacks SniffersSniffers
12
SpyBot: <3,000 lines C code. <3,000 lines C code. Possibly evolved from SDBot. Possibly evolved from SDBot. Similar command/control engine. Similar command/control engine. No attempts to hide malicious purposes. No attempts to hide malicious purposes. GT Bot: Functions based on mIRC scripting capabilities. HideWindow program hides bot on local system. HideWindow program hides bot on local system. Port scanning, DoS attacks, exploits for RPC. Port scanning, DoS attacks, exploits for RPC. TYPES OF BOTS
13
PREVENTION Using anti-virus and anti-spyware software and keeping it up to date. Setting your operating system software to download and install security patches automatically. Being cautious about opening any attachments or downloading files from emails you receive. Using a firewall to protect your computer from hacking attacks while it is connected to the Internet. Cont…
14
Disconnecting from the Internet when you're away from your computer. Downloading free software only from sites you know and trust. Taking action immediately if your computer is infected. PREVENTION
15
CONCLUSION Botnet a large army of networked computers. Used in many malicious activities. Works automatically and autonomously. Hence biggest threat to INTERNET
16
THANK YOU
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.