SlideShare a Scribd company logo
WHAT IS BOTNET?
Milan Petrásek
21/5/2014
What is botnet?
Content
• Introduction
• Star and multiserver topology botnets
• Hierarchical topology botnets
• Random topology botnets
• Types of attacks
• Famous botnets through history
• Summary
Intro - terms
BOT or „zombie“. Short for roBOT.
NET short for interNET
Botnet a lot of infected computers
Bot Herder or „bot master“ can control
the botnet remotely
C&C Server command-and-control centre
for botnet managing

Recommended for you

Botnets In Cyber Security
Botnets In Cyber SecurityBotnets In Cyber Security
Botnets In Cyber Security

Botnets are networks of compromised computers called zombies or bots that are controlled remotely by an attacker known as a bot herder. Originally bots were useful tools but now are used for malicious purposes. A botnet has four main components: the bot herder who installs bot software on vulnerable systems, the bots or zombies, an IRC server for communication, and a command and control server to issue instructions. The bot herder builds their botnet army by infecting home and small business computers. Once installed, bots communicate secretly with the C&C server to receive tasks like DDoS attacks, spamming, phishing and stealing information.

botnetsbotnets attackddos
Chapter 15 Presentation
Chapter 15 PresentationChapter 15 Presentation
Chapter 15 Presentation

The document discusses vulnerability assessment and tools used in the assessment process. It defines vulnerability assessment as a systematic evaluation of asset exposure to threats, and describes the key aspects of identification, threat evaluation, vulnerability appraisal, risk assessment, and risk mitigation. It then outlines various tools that can be used in assessment, including port scanners, protocol analyzers, vulnerability scanners, and software development assessment techniques.

Dos n d dos
Dos n d dosDos n d dos
Dos n d dos

This document discusses denial of service (DoS) and distributed denial of service (DDoS) attacks. It defines DoS as an attack that seeks to oversaturate a targeted machine's capacity to disrupt authorized use, while a DDoS uses multiple compromised systems to flood the target. The document describes how DDoS attacks work by flooding the victim from many sources, making it hard to block. It lists common DoS attacks like buffer overflow and ICMP floods, and DDoS attack types like traffic floods and application attacks. The document also covers typical attacker motivations and recommendations to prevent attacks like buying more bandwidth and building redundancy.

Star and multiserver
topology
Hierarchical topology
Random topology
Types of attacks
• Distributed denial-of-service (DDoS)
• Adware advertises
• Spyware
• E-mail
• Click fraud
• Fast flux
• Brute-forcing remote machines services
• Worms
• Scareware
• Exploiting systems

Recommended for you

introduction to Botnet
introduction to Botnetintroduction to Botnet
introduction to Botnet

This document outlines a presentation on botnets. It begins with introducing key botnet terminology like bot herder, bot, and command and control channel. It then covers the botnet lifecycle before discussing how botnets pose a threat to network security. The document outlines how botnets are used for DDoS attacks, spam, and other crimes. It discusses approaches for botnet detection including using honeynets and traffic monitoring. The document concludes by emphasizing the growing threat of botnets to cybersecurity.

introduction to botnetbotnet
Destributed denial of service attack ppt
Destributed denial of service attack pptDestributed denial of service attack ppt
Destributed denial of service attack ppt

This document provides an overview of distributed denial of service (DDoS) attacks. It discusses the components and architecture of DDoS attacks and classifies them into four categories: flood attacks, amplification attacks, TCP SYN attacks, and malformed packet attacks. Specific attack types like UDP floods, ICMP floods, Smurf attacks and Fraggle attacks are described. The document also covers DDoS defense problems and classifications such as intrusion prevention, detection, tolerance and response. It concludes that DDoS attacks are difficult to prevent due to readily available tools and the ability to target any internet host, and that the best defense involves vigilant system administration.

dos
Denial of service
Denial of serviceDenial of service
Denial of service

This document discusses denial of service (DoS) and distributed denial of service (DDoS) attacks. It defines DoS attacks as attempts to render a system unusable or slow it down for legitimate users by overloading its resources. DDoS attacks multiply the effectiveness of DoS by using multiple compromised computers to launch attacks simultaneously. Common DoS attack types like SYN floods, Smurf attacks, and ping of death are described. The rise of botnets, which are networks of compromised computers controlled remotely, enabled more powerful DDoS attacks. Mitigation strategies include load balancing, throttling traffic, and using honeypots to gather attacker information.

Famous botnets through history
• 2001 – First Botnet
(http://www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?p
age=all)
• 2005 Torpig
• 2006 Virut
• 2007 Zeus – one of the biggest (compromised U.S. computers: 3.6
million)
• 2007 Storm
• 2008 Conficker
• 2008 Grum
• 2008 Lethic
• 2008 Mariposa
• 2009 SpyEye
• 2010 Waledac
• 2011 ZeroAccess
• 2012 FlashFake (Mac OS X)
• 2012 Jeef
• 2012 Smoke
Summary
• Botnets are serious problem today
– Malware as a Service
• Bleak future awaiting us
– Mobile botnets on the rise
– Internet of Things botnets
IoT BotnetInternet of Things botnets
In December 2013 a researcher at Proofpoint noticed that hundreds of thousands of malicious
emails logged through a security gateway had originated from botnet that included not only
computers, but also other devices – including SmartTV, a refrigerator and other household
appliances.
IoT worm used to mine cryptocurrency – worm Linux.Darlloz
http://www.symantec.com/connect/blogs/iot-worm-used-mine-
cryptocurrency
Infecting DVRs with Bitcoin-mining malware even easier than you
suspected
http://arstechnica.com/security/2014/05/infecting-dvrs-with-
bitcoin-mining-malware-even-easier-you-suspected/
QUESTIONS?

Recommended for you

Port Scanning
Port ScanningPort Scanning
Port Scanning

Port scanning involves sending packets to ports on a target system to discover which ports are open and may be exploited. There are several common port scanning techniques like TCP connect scanning, SYN scanning, FIN scanning, and UDP scanning. Port scanners try to avoid detection by scanning slowly, spoofing packets, or fragmenting packets. Systems can detect port scans through signatures like many connections to different ports from the same source in a short time.

Ransomware
RansomwareRansomware
Ransomware

This presentation is about Ransomware. It tells you about how ransomware creates problem and how it can be removed. It also describes different types of Ransomware.

ransomwarecybersecurityinternet
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)

The presentation covers information about basic and advanced ddos attacks; the tools, techniques and methods to perform them and how to prevent them using the methods present in TCP/IP. Given the different network and application protocols for tcp/ip; we tried to describe where ddos attacks are made possible in the communication process . Each attack is seperately analyzed and described and defense technique is described using the same analogy. Our motto: If there is a ddos case, there was a way to defend it.

akamaiarborbotnet
Resources
• http://en.wikipedia.org/wiki/Botnet
• http://www.welivesecurity.com/2011/06/27/tdl-tracking-peer-pressure/
• http://www.abuse.ch/?p=3499
• http://www.securelist.com/en/analysis/204792227/The_anatomy_of_Fl
ashfake_Part_1
• http://www.networkworld.com/news/2009/072209-botnets.html
• Fortinet – White Paper: „Anatomy of a Botnet“
• Fortinet – 2013 Cybercrime Report
• Gunter Ollmann, VP of Research, Damballa Inc. – Botnet Communication
Topologies

More Related Content

What's hot

Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
Gaurav Sharma
 
Botnet
BotnetBotnet
Botnet
lokenra
 
Ddos attacks
Ddos attacksDdos attacks
Ddos attacks
communication-eg
 
Botnets In Cyber Security
Botnets In Cyber SecurityBotnets In Cyber Security
Botnets In Cyber Security
sumit saurav
 
Chapter 15 Presentation
Chapter 15 PresentationChapter 15 Presentation
Chapter 15 Presentation
Amy McMullin
 
Dos n d dos
Dos n d dosDos n d dos
Dos n d dos
sadhana21297
 
introduction to Botnet
introduction to Botnetintroduction to Botnet
introduction to Botnet
yogendra singh chahar
 
Destributed denial of service attack ppt
Destributed denial of service attack pptDestributed denial of service attack ppt
Destributed denial of service attack ppt
OECLIB Odisha Electronics Control Library
 
Denial of service
Denial of serviceDenial of service
Denial of service
garishma bhatia
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
amiable_indian
 
Ransomware
RansomwareRansomware
Ransomware
Chaitali Sharma
 
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)
btpsec
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
Nitin Bisht
 
Man in the middle
Man in the middleMan in the middle
Man in the middle
AhmadThaqifAimanAhma
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
Ramiro Cid
 
Denail of Service
Denail of ServiceDenail of Service
Denail of Service
Ramasubbu .P
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
Amna
 
Firewall
FirewallFirewall
Firewall
Saurabh Chauhan
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
Pascal Flöschel
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 

What's hot (20)

Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
 
Botnet
BotnetBotnet
Botnet
 
Ddos attacks
Ddos attacksDdos attacks
Ddos attacks
 
Botnets In Cyber Security
Botnets In Cyber SecurityBotnets In Cyber Security
Botnets In Cyber Security
 
Chapter 15 Presentation
Chapter 15 PresentationChapter 15 Presentation
Chapter 15 Presentation
 
Dos n d dos
Dos n d dosDos n d dos
Dos n d dos
 
introduction to Botnet
introduction to Botnetintroduction to Botnet
introduction to Botnet
 
Destributed denial of service attack ppt
Destributed denial of service attack pptDestributed denial of service attack ppt
Destributed denial of service attack ppt
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
 
Ransomware
RansomwareRansomware
Ransomware
 
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
 
Man in the middle
Man in the middleMan in the middle
Man in the middle
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Denail of Service
Denail of ServiceDenail of Service
Denail of Service
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
Firewall
FirewallFirewall
Firewall
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 

Similar to What is botnet?

Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
OWASP Delhi
 
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
[2010 CodeEngn Conference 04] Max - Fighting against Botnet[2010 CodeEngn Conference 04] Max - Fighting against Botnet
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
GangSeok Lee
 
Fear, Uncertainty and Doubt
Fear, Uncertainty and DoubtFear, Uncertainty and Doubt
Fear, Uncertainty and Doubt
Manuel Schmalstieg
 
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Julia Yu-Chin Cheng
 
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)
André Fucs de Miranda
 
BOTLAB excersise
BOTLAB excersiseBOTLAB excersise
BOTLAB excersise
Anthony Stamm
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
Suryaprakash Nehra
 
BotNet Attacks
BotNet AttacksBotNet Attacks
BotNet Attacks
Rangana lakmal
 
Botnet
BotnetBotnet
Bots and Botnet
Bots and BotnetBots and Botnet
Bots and Botnet
Hicube Infosec
 
All you know about Botnet
All you know about BotnetAll you know about Botnet
All you know about Botnet
Naveen Titare
 
Botnet.pptx
Botnet.pptxBotnet.pptx
Botnet.pptx
Chetanmalviya8
 
botnet.ppt
botnet.pptbotnet.ppt
botnet.ppt
KiranKumar24546
 
098
098098
A short visit to the bot zoo
A short visit to the bot zooA short visit to the bot zoo
A short visit to the bot zoo
UltraUploader
 
News Bytes - May 2015
News Bytes - May 2015News Bytes - May 2015
News Bytes - May 2015
n|u - The Open Security Community
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
b coatesworth
 
PyMultitor
PyMultitorPyMultitor
PyMultitor
Tomer Zait
 
Aleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS AttacksAleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS Attacks
Dipesh Karade
 
Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet Architecture
Bini Bs
 

Similar to What is botnet? (20)

Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
 
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
[2010 CodeEngn Conference 04] Max - Fighting against Botnet[2010 CodeEngn Conference 04] Max - Fighting against Botnet
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
 
Fear, Uncertainty and Doubt
Fear, Uncertainty and DoubtFear, Uncertainty and Doubt
Fear, Uncertainty and Doubt
 
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
 
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)
 
BOTLAB excersise
BOTLAB excersiseBOTLAB excersise
BOTLAB excersise
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
BotNet Attacks
BotNet AttacksBotNet Attacks
BotNet Attacks
 
Botnet
BotnetBotnet
Botnet
 
Bots and Botnet
Bots and BotnetBots and Botnet
Bots and Botnet
 
All you know about Botnet
All you know about BotnetAll you know about Botnet
All you know about Botnet
 
Botnet.pptx
Botnet.pptxBotnet.pptx
Botnet.pptx
 
botnet.ppt
botnet.pptbotnet.ppt
botnet.ppt
 
098
098098
098
 
A short visit to the bot zoo
A short visit to the bot zooA short visit to the bot zoo
A short visit to the bot zoo
 
News Bytes - May 2015
News Bytes - May 2015News Bytes - May 2015
News Bytes - May 2015
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
PyMultitor
PyMultitorPyMultitor
PyMultitor
 
Aleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS AttacksAleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS Attacks
 
Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet Architecture
 

More from Milan Petrásek

O2 Firewally nové generace
O2 Firewally nové generaceO2 Firewally nové generace
O2 Firewally nové generace
Milan Petrásek
 
Bezpečná firma - koncepce GTS
Bezpečná firma - koncepce GTSBezpečná firma - koncepce GTS
Bezpečná firma - koncepce GTS
Milan Petrásek
 
HighEnd a Mainframe procesory Itanium, SPARC, POWER
HighEnd a Mainframe procesory Itanium, SPARC, POWERHighEnd a Mainframe procesory Itanium, SPARC, POWER
HighEnd a Mainframe procesory Itanium, SPARC, POWER
Milan Petrásek
 
DDoS ochrana pro setkání CSIRT.CZ
DDoS ochrana pro setkání CSIRT.CZDDoS ochrana pro setkání CSIRT.CZ
DDoS ochrana pro setkání CSIRT.CZ
Milan Petrásek
 
DDoS
DDoSDDoS
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
Milan Petrásek
 
High Frequency Trading
High Frequency TradingHigh Frequency Trading
High Frequency Trading
Milan Petrásek
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
Milan Petrásek
 
GTS platforma pro vyvojáře webexpo 2012
GTS platforma pro vyvojáře webexpo 2012GTS platforma pro vyvojáře webexpo 2012
GTS platforma pro vyvojáře webexpo 2012
Milan Petrásek
 
Cloudové služby GTS
Cloudové služby GTSCloudové služby GTS
Cloudové služby GTS
Milan Petrásek
 
Gts produkty pro Business Continuity Mgmt.
Gts produkty pro Business Continuity Mgmt.Gts produkty pro Business Continuity Mgmt.
Gts produkty pro Business Continuity Mgmt.
Milan Petrásek
 
Článek z CIO Business World
Článek z CIO Business WorldČlánek z CIO Business World
Článek z CIO Business World
Milan Petrásek
 
GTS Data Storage CZ
GTS Data Storage CZGTS Data Storage CZ
GTS Data Storage CZ
Milan Petrásek
 
TCO for a cloud
TCO for a cloudTCO for a cloud
TCO for a cloud
Milan Petrásek
 

More from Milan Petrásek (14)

O2 Firewally nové generace
O2 Firewally nové generaceO2 Firewally nové generace
O2 Firewally nové generace
 
Bezpečná firma - koncepce GTS
Bezpečná firma - koncepce GTSBezpečná firma - koncepce GTS
Bezpečná firma - koncepce GTS
 
HighEnd a Mainframe procesory Itanium, SPARC, POWER
HighEnd a Mainframe procesory Itanium, SPARC, POWERHighEnd a Mainframe procesory Itanium, SPARC, POWER
HighEnd a Mainframe procesory Itanium, SPARC, POWER
 
DDoS ochrana pro setkání CSIRT.CZ
DDoS ochrana pro setkání CSIRT.CZDDoS ochrana pro setkání CSIRT.CZ
DDoS ochrana pro setkání CSIRT.CZ
 
DDoS
DDoSDDoS
DDoS
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
 
High Frequency Trading
High Frequency TradingHigh Frequency Trading
High Frequency Trading
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
GTS platforma pro vyvojáře webexpo 2012
GTS platforma pro vyvojáře webexpo 2012GTS platforma pro vyvojáře webexpo 2012
GTS platforma pro vyvojáře webexpo 2012
 
Cloudové služby GTS
Cloudové služby GTSCloudové služby GTS
Cloudové služby GTS
 
Gts produkty pro Business Continuity Mgmt.
Gts produkty pro Business Continuity Mgmt.Gts produkty pro Business Continuity Mgmt.
Gts produkty pro Business Continuity Mgmt.
 
Článek z CIO Business World
Článek z CIO Business WorldČlánek z CIO Business World
Článek z CIO Business World
 
GTS Data Storage CZ
GTS Data Storage CZGTS Data Storage CZ
GTS Data Storage CZ
 
TCO for a cloud
TCO for a cloudTCO for a cloud
TCO for a cloud
 

Recently uploaded

Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
Vijayananda Mohire
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
Lidia A.
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
welrejdoall
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
UiPathCommunity
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
ishalveerrandhawa1
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 

Recently uploaded (20)

Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 

What is botnet?

  • 1. WHAT IS BOTNET? Milan Petrásek 21/5/2014
  • 3. Content • Introduction • Star and multiserver topology botnets • Hierarchical topology botnets • Random topology botnets • Types of attacks • Famous botnets through history • Summary
  • 4. Intro - terms BOT or „zombie“. Short for roBOT. NET short for interNET Botnet a lot of infected computers Bot Herder or „bot master“ can control the botnet remotely C&C Server command-and-control centre for botnet managing
  • 8. Types of attacks • Distributed denial-of-service (DDoS) • Adware advertises • Spyware • E-mail • Click fraud • Fast flux • Brute-forcing remote machines services • Worms • Scareware • Exploiting systems
  • 9. Famous botnets through history • 2001 – First Botnet (http://www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?p age=all) • 2005 Torpig • 2006 Virut • 2007 Zeus – one of the biggest (compromised U.S. computers: 3.6 million) • 2007 Storm • 2008 Conficker • 2008 Grum • 2008 Lethic • 2008 Mariposa • 2009 SpyEye • 2010 Waledac • 2011 ZeroAccess • 2012 FlashFake (Mac OS X) • 2012 Jeef • 2012 Smoke
  • 10. Summary • Botnets are serious problem today – Malware as a Service • Bleak future awaiting us – Mobile botnets on the rise – Internet of Things botnets
  • 11. IoT BotnetInternet of Things botnets In December 2013 a researcher at Proofpoint noticed that hundreds of thousands of malicious emails logged through a security gateway had originated from botnet that included not only computers, but also other devices – including SmartTV, a refrigerator and other household appliances. IoT worm used to mine cryptocurrency – worm Linux.Darlloz http://www.symantec.com/connect/blogs/iot-worm-used-mine- cryptocurrency Infecting DVRs with Bitcoin-mining malware even easier than you suspected http://arstechnica.com/security/2014/05/infecting-dvrs-with- bitcoin-mining-malware-even-easier-you-suspected/
  • 13. Resources • http://en.wikipedia.org/wiki/Botnet • http://www.welivesecurity.com/2011/06/27/tdl-tracking-peer-pressure/ • http://www.abuse.ch/?p=3499 • http://www.securelist.com/en/analysis/204792227/The_anatomy_of_Fl ashfake_Part_1 • http://www.networkworld.com/news/2009/072209-botnets.html • Fortinet – White Paper: „Anatomy of a Botnet“ • Fortinet – 2013 Cybercrime Report • Gunter Ollmann, VP of Research, Damballa Inc. – Botnet Communication Topologies