![]() The following is a nonexhaustive list of known botnets, with a short description of each: Since their appearance around the year 2000, there have emerged a large number of botnets. Botnets typically use different malware to perform each of their actions. This is why the software used by botnets is called malware (from “ malicious soft ware”). Most of the work done by a botnet relies on malicious actions to operate. The third is based on the attacks performed: sending spam emails, doing click fraud, or stealing users and passwords, among others. The second is based on their topology: hierarchical, centralized, or P2P. The first one is based on their main protocol for communication: hyphertext transfer protocol (http), https (secured http), peer-to-peer (P2P) protocol, IRC protocol, or custom protocol. There are three common classification criteria. These components are highly interrelated and interdependent. Botnets are usually composed of bots (victim computers that were attacked to be part of the botnet), command-and-control (C&C) servers (computers that control the bots), intermediate servers (computers that hide the owners), C&C channels (communication channels using different protocols), encryption algorithms, and the people controlling the botnet. It is very difficult to classify malicious botnets into categories because their infrastructures are a complex, layered, and interwoven mixture of components.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |