Question

You are required to research Botnets and provide a one page summary of the following: 1....

You are required to research Botnets and provide a one page summary of the following:
1. What are Botnets?
2. What are some of the functions that Botnets can perform?
3. Statistics indicating the effects of major Botnet attacks in the past decade?
4. What are some of the different types of Botnets?
5. What are some of the ways to protect against Botnets?
Please list all references used.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. What are Botnets?

The word 'botnet' is derived from two words robot and network. It is a network of computers that are on-purpose infected with malware by cyber-criminals, hackers,etc. to perform tasks unethically on a victims device. It uses "standards-based network protocols" to communicate between the attacking and attacked devices. These internet-connected devices which make up botnet may include PC, servers, mobile and IOT devices which are infected and controlled by a common type of malware.

2. What are some of the functions that Botnets can perform?

Botnets are used to perform DDoS attacks, stealing of data, spams and allow the attacker to access devices and its connection total control. The main motive for using botnet is to infect as many connected devices as possible and use computing power and resources of these devices for automated tasks that remain hidden to the users of the devices. Using these acquired computational power botnets are used to mine many crypto-currencies (eg. Bitcoin, ethereum, Litcoin, EOS, etc.). They can also steal your digital wallets, generate fake Internet traffic on websites for financial gain, replacing banners and adds to target the specific consumer, pop-ups, etc. As they can control pop-ups and add banners they are also used to influence elections and other political campaigns.

3. Statistics indicating the effects of major Botnet attacks in the past decade?


Botnets have had some major attacks in the past. "Zeus". Malware of information security. It used Trojan Horse. It was used steal banking credentials and financial information from users of infected devices. In 2010, it was estimated that over 3.6 million devices were infected with this botnet. Similarly, "Kelihos" affected more than 300000 users. "Srizbi" in 2007 was estimated to be around affecting 450000 users. "Methbot" was estimated to be earning 3$-5$ million per day from fake adds revenue affecting around 1200 datacenters in US which affected more than 850000 IP addresses. Ramnit in 2011 afftected over 3 million users. A recent one, "Mirai", in 2016 was observed to be affecting 380000 devices doing DDoS attacks.

4. What are some of the different types of Botnets?

Botnets are mainly classified in four different types. They include IRC-->Internet Relay Chat botnet, P2P-->Peer-to-Peer botnet, HTTP botnet and hybrid botnet which is the combination of all these types of Botnet Structures. Nowdays, even mobile botnets are being created. Cloud Botnets are also implemented by cyber-criminals, they are known as cloud based botnet and bot cloud.

IRC bots can be used to monitor and prevent malicious interventions and perform some automated tasks. It was one of the first kind of bot developed for a beneficial purpose. Later, it can be used for demolition activities. P-2-P Botnet can be formed by using the P-2-P protocols and decentralized network of nodes. It is very difficult to shut down the P-2-P botnet due to its decentralized structure. Every P-2-P bot can be used as client and server. HTTP Botnet is centralized botnet, using HTTP protocol. Used to hide activities in normal web-traffic and escape from current detection methods like firewalls. Hybrid botnet is the combination of two or more botnet models such as IRC, P-2-P and HTTP botnets. It can be both centralized or decentralized structures. Mobile botnet can be formed by exploiting the SMS and Bluetooth features of the mobile phones.

5. What are some of the ways to protect against Botnets?

This has been established that Botnets are very dangerous. They can cause massive losses and failures. Preventing against them is very important. Although these Botnets are very sophisticated and hard to detect certain measures must be always followed. Always surf on good and trusted websites. Ensure that while entering sensitive information the website has https protocol. Have a good and trusted antivirus software which is updated. Ensure to install latest updates and security patches of the operating system you are using. Avoid spam emails and suspicious emails and sms as they tend to have virus, malware and botnets in their attachments. Never click on suspicious links and adds like winning lottery, free money, etc. They are most probably malicious. Avoid P-2-P file sharing as botnets can easily spread.

Please rate a THUMBS UP if you find it useful and Best of Luck :-)

Add a comment
Know the answer?
Add Answer to:
You are required to research Botnets and provide a one page summary of the following: 1....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Do some research and provide a 1 page double spaced summary (not including pictures) of your...

    Do some research and provide a 1 page double spaced summary (not including pictures) of your findings. What is FOG computing? Why do we need it? How will it impact our lives? Provide at least 1 source.

  • Prepare a 1-2 page summary showing research about the industry/economic sector, target market, and competitors for...

    Prepare a 1-2 page summary showing research about the industry/economic sector, target market, and competitors for your business. Your work should reflect understanding of the material See "Research Questions" on pages 68-70 for the type of information to include in the summary. There will be more assignments on target markets and competition in future sessions. You are expected to use online or other resources in preparing this assignment. Make sure that you use reliable sources and be sure to cite...

  • Using your reading and the Internet, provide a one-page response detailing the relevance of physical security...

    Using your reading and the Internet, provide a one-page response detailing the relevance of physical security in the cybersecurity arena. Write a few short paragraphs and feel free to use bullets. Part 1: Compile Cyber Investigation Guidelines (3 points) Using your reading and the Internet, provide a response detailing the chain of custody considerations to enable you to collect evidence that will useful for a legal prosecution. Write short paragraphs guiding IT employees regarding the need to protect evidence and...

  • Please read a one page 250 words Portfolio Overview Research and summarize the various roles of...

    Please read a one page 250 words Portfolio Overview Research and summarize the various roles of allied health professionals Portfolio Goal Write a one-page paper consisting of 250-words exploring the role of allied health professionals. Portfolio Details 1. Based on what you have learned from this lesson, write a one-page paper that summarizes the role of allied health professionals. In writing your summary, consider the following questions: . What do you see as the most critical role of an allied...

  • General guidelines for completing the Assignment-1 1. You are required to work independently on one of...

    General guidelines for completing the Assignment-1 1. You are required to work independently on one of the two cases listed for the assignment. 2. You may choose to search for the information online or in standard text books, research journals, online resources of biomedical research, pharmacogenomics knowledge base, etc. 3. You are required to list items of literature referred to at the end of the narrative under the subheading ‘References’. You are encouraged to refer to the original research publications...

  • Please answer the following question(s): You will need to perform research to answer one of the...

    Please answer the following question(s): You will need to perform research to answer one of the following questions. You must cite at least two sources. 1. Describe the procedures for correcting errors in accounting records. Provide an example. 2. How is the trial balance used to discover errors? Provide an example. 3. How would you find errors in recording transactions and what is the process to correct errors? Provide an example. Search entries or author Unread Reply Replies are only...

  • Before writing a research paper you should write The Methods. The methods is one of the...

    Before writing a research paper you should write The Methods. The methods is one of the briefest sections of a research paper. In the methods, you need to explain how and why you gathered and analyzed data in enough detail that the reader could easily replicate your study. At this stage, you are only proposing how you will do this but note that after you collect data (perform the methods), you will revise this section into past tense to reflect...

  • PLEASE HELP WITH ALL QUESTIONS QUESTION 1 Distinguish or explain the difference between the following: 1.1...

    PLEASE HELP WITH ALL QUESTIONS QUESTION 1 Distinguish or explain the difference between the following: 1.1 Primary and secondary growth 1.2 Heartwood and sapwood 1.3 Simple and multiple fruits 1.4 Bottleneck effect and genetic effect QUESTION 2 2.1 Distinguish between annual, biennial and perennial plants. 2.2 Provide THREE examples of ways that humans use roots. 2.3 Is the following structures a root, stem or leaf and what is its function? a. Haustoria b. Rhizome c. Stipule spine (3 x 2...

  • Assignment: Produce alone-to-two page summary that includes the following information about the fitness facility that you...

    Assignment: Produce alone-to-two page summary that includes the following information about the fitness facility that you have been assigned You will be presenting this information to the class. In addition to your presentation, you will need to provide everyone with a hard copy or electronic copy (via email) of your summary. The presentation does not need to be fancy or include any visuals as you will simply stand up and share this information with the class. 1. Name of fitness...

  • You are conducting a research to find out the negative effects that heath insurance have in...

    You are conducting a research to find out the negative effects that heath insurance have in patients. You will be using a survey for your research Abstract Medical health insurance is one of the most discussed topics in the media, bet patients, and healthcare providers. In fact, medical health insurance coverage plays a significant role in the outcome of a patient healthcare because it determines the quality of care and the type of treatments that a patient may receive. Although...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT