Abstract

Internet has become the harvesting ground for many Internet malware. Bots play an important role in Internet malware epidemic. Since the existence of a network the discovery of BotNet has become difficult as they are discovered only after they have spread widely. In a short period of time they make millions of people their victim. Attackers are attacking large network of compromised machines to carry the attacks by using BotNet under the control of a single attacker. BotNets are no new to the Internet. Most Internet users have become familiar with the constant barrage of attacks from all across the world in an attempt to leverage our system. BotNet attackers are in a constant search for new hosts, using any mean necessary to add one or more vulnerable server to the swarm, with motives ranging from childish revenge to high-level extortion schemes. Though the scientific community has acknowledged the existence of malicious BotNet but has not yet fully understood the behavior of these distributed computing platforms. A recent spark is there to understand the study of BotNets and developing detection technologies. This paper presents the results of the efforts done to address these questions. The paper also outlines the types of BotNets and some methods of identifying BotNet, and issues which arise when applying them. This paper also highlights the uses of BotNets, characteristics and detection techniques of BotNet from multiple view points. It is hoped that the information available in this paper will help the research community in the development of unique solution for BotNet detection and control.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.