Download presentation
Presentation is loading. Please wait.
Published byFerdinand Blake Modified over 9 years ago
1
By Mason Hall And Zeb Fross
2
Attacker Command & Control Zombies
3
DDos Attacks Spamming Traffic Sniffing Keylogging Identity Theft
4
Started with IRCs Notable Bots Pretty Park (1999) Global Threat bot (2000) Agobot (2002) Polybot (2004) Phatbot (2004) Mariposa (2009)
5
Layered Firewalls and Diversionary Paths Full Security Suite Workable Patch Management System Shutting Down External Access Monitoring Traffic Flux Disrupting Attacks and Isolating Infected Machines Patching to Prevent Similar Repeated Attacks
6
Emails Status Sends Spam Monitors System Resources
7
The Botnet-For-Hire
9
Anderson, NA. (2007). Vint cerf: one quarter of all computers part of a botnet. ars technica, Retrieved from http://arstechnica.com/old/content/2007/01/8707.ars http://arstechnica.com/old/content/2007/01/8707.ars Corrons, LC. (2010). Mariposa botnet. Pandalabs, Retrieved from http://pandalabs.pandasecurity.com/mariposa- botnet/http://pandalabs.pandasecurity.com/mariposa- botnet/ distributed denial-of-service attack (ddos). (2001, June 03). Retrieved from http://searchsecurity.techtarget.com/definition/distributed-denial-of-service-attack http://searchsecurity.techtarget.com/definition/distributed-denial-of-service-attack Ferguson, RF. (2010, September 27). The history of the botnet: part 1. Retrieved from http://www.businesscomputingworld.co.uk/the-history-of-the-botnet-part-i/ http://www.businesscomputingworld.co.uk/the-history-of-the-botnet-part-i/ hakin9, h9. (2005, October 20). Robot wars – how botnets work. Retrieved from http://www.windowsecurity.com/articles/Robot-Wars-How-Botnets- Work.htmlearch/threats/phatbot/?threat=phatbot http://www.windowsecurity.com/articles/Robot-Wars-How-Botnets- Work.htmlearch/threats/phatbot/?threat=phatbot Irc clients and servers. (2000). Retrieved from http://www.livinginternet.com/r/rw_apps.htm http://www.livinginternet.com/r/rw_apps.htm Kiran.Kola, MK. (2008). Botnets: overview and case study. Unpublished manuscript, Department of Mathematics and Computer Information Science, Mercy College, Dobbs Ferry, New York. Retrieved from https://www.mercy.edu/ias/kola.pdf https://www.mercy.edu/ias/kola.pdf Possible defenses against botnet attacks. (n.d.). Retrieved from http://www.tech-faq.com/possible-defenses-against- botnet-attacks.html http://www.tech-faq.com/possible-defenses-against- botnet-attacks.html Stewart, JS. (2004, March 15). Phatbot trojan analysis. Retrieved from http://www.secureworks.com/research/threats/phatbot/?threat=phatbot http://www.secureworks.com/research/threats/phatbot/?threat=phatbot Weber, TW. (2007, January 25). Criminals 'may overwhelm the web'. BBC News, Retrieved from http://news.bbc.co.uk/2/hi/business/6298641.stm http://news.bbc.co.uk/2/hi/business/6298641.stm X, X. (2008, March 3). Gt bot (global threat), info things. Retrieved from http://w33ds.18.forumer.com/index.php?showtopic=36 http://w33ds.18.forumer.com/index.php?showtopic=36
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.