Abstract

Botnets have carved a niche in contemporary networking and cybersecurity due to the impact of their operations. The botnet threat continues to evolve and adapt to countermeasures as the security landscape continues to shift. As research efforts attempt to seek a deeper and robust understanding of the nature of the threat for more effective solutions, it becomes necessary to again traverse the threat landscape, and consolidate what is known so far about botnets, that future research directions could be more easily visualised. This research uses the general exploratory approach of the qualitative methodology to survey the current botnet threat landscape: Covering the typology of botnets and their owners, the structure and lifecycle of botnets, botnet attack modes and control architectures, existing countermeasure solutions and limitations, as well as the prospects of a botnet threat. The product is a consolidation of knowledge pertaining the nature of the botnet threat; which also informs future research directions into aspects of the threat landscape where work still needs to be done.

Highlights

  • IntroductionBotnets (or, a network of bots) are an army of compromised machines that are often under the control and coordination of a single source of (direct/indirect) influence via a remote secure channel

  • Botnets are an army of compromised machines that are often under the control and coordination of a single source of influence via a remote secure channel.They are generally able to propagate themselves on a network and infect vulnerable machines

  • One other technique proposed in the work by Hangxia et al [103] takes advantage of the experimented with the Zeus botnet, and involved the use of fuzzy logic to discover vulnerabilities in vulnerability posed by the fact that nodes can join a P2P botnet without any way of confirming its Command and Control (C&C) mechanism

Read more

Summary

Introduction

Botnets (or, a network of bots) are an army of compromised machines that are often under the control and coordination of a single source of (direct/indirect) influence via a remote secure channel They are generally able to propagate themselves on a network and infect vulnerable machines. Attack of involves useBandwidth of compromised machines (known making it impossible for clients who have legitimately subscribed to use these resources to have as “zombies”) to orchestrate a DoS attack. This class of attacks aims at incapacitating service-based access to them. (DDoS) over attack of compromised infrastructures thatAdeliver various services to subscribers theinvolves This class of attacks aims atrequests incapacitating servers with(known useless as or “zombies”).

United
Internet
Known command
Lifecycle
Typology of Existing Botnets
Botnet Countermeasures
Analysis-Based
A basic deployment
Botnets in Mobile and Cloud Environments
The Botnets of the Future
Summary
Future Research Directions
Findings
10. Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call