An overview over Botnets

Slides:



Advertisements
Similar presentations
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Advertisements

Introduction to Security Computer Networks Computer Networks Term B10.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Security for Seniors SeniorNet Help Desk
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Protecting Yourself Online (Information Assurance)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
COMP 2903 A27 – Why Spyware Poses Multiple Threats to Security Danny Silver JSOCS, Acadia University.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
 a crime committed on a computer network, esp. the Internet.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
What is Spam? d min.
Malicious Software.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Network System Security - Task 2. Russell Johnston.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Chapter 40 Internet Security.
Managing Windows Security
COMPUTER CRIMES Presented by THABO.
Three Things About Malware
MALWARE Autumn Mattis.
3.6 Fundamentals of cyber security
CYBER SECURITY...
Instructor Materials Chapter 7 Network Security
Backdoor Attacks.
Homeland Security: Computer Protection
VIRUS HOAX + BOTS. VIRUS HOAX + BOTS Group Members Aneeqa Ikram Fatima Ishaque Tufail Rana Anwar Amjad.
Cyber Security By: Pratik Gandhi.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
COMPUTER CRIME.
Computer Viruses.
Risk of the Internet At Home
Chap 10 Malicious Software.
Forensics Week 12.
Unit 1.6 Systems security Lesson 2
Malware CJ
Brute force attacks, DDOS, Botnet, Exploit, SQL injection
Faculty of Science IT Department By Raz Dara MA.
Networking for Home and Small Businesses – Chapter 8
Chap 10 Malicious Software.
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
The Internet: Encryption & Public Keys
Networking for Home and Small Businesses – Chapter 8
WJEC GCSE Computer Science
Technology Mrs. Huddleston
Networking for Home and Small Businesses – Chapter 8
Test 3 review FTP & Cybersecurity
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Marcial Quinones-Cardona
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Introduction to Internet Worm
Presentation transcript:

An overview over Botnets Contents: Short survey of Malware What is a Botnet and hoe does it work? Properties of a Botnet Applications of a Botnet Protection against Malware

1. Short survey of Malware Malware = artificial word out of malicious software = software which was developed to carry out unwanted or dangerous functions. Generic term for computer viruses, worms, trojan horses etc. Malware by categories With Malware infected computers Source: Wikipedia Source: http://www.was-ist-malware.de

2. What is a Botnet and how does it work? Source: http://www.was-ist-malware.de/allgemein/botnet/ Botnet = artificial word out of robot net = combination of many computers to one big Malware. backdoor software A trojan horse is a program which consists of a useful part and malicious part. The useful part disguises the malicious part. The latter installs the Malware on the infected computer. Each participating computer is infected e. g. by a trojan horse which installs a so called backdoor software, which is not recognised by the user and not noticed by the security means of the computer. The infection can be caused by using a “prepared website, email attachment etc.”. bot Botmaster The backdoor software allows a third party (so called Botmaster) unlimited access to all infected computers (so called bots)! This implies arbitrary misuse of the bots.

2. What is a Botnet and how does it work? Source: http://www.was-ist-malware.de/allgemein/botnet/ 3 The Botmaster sells the processing power of the Botnet to a (criminal) client. The Botmaster commands the bots e. g. to send spam mails from the clients.

4. Applications of a Botnet 3. Properties of a Botnet Source: http://www.was-ist-malware.de/allgemein/botnet/ One important property of a Botnet is the distribution of the resources. The installed backdoor malware must operate inconspicuously. Therefore this Malware runs with low priority so that the user will not notice it. Additionally maximal 15 % of the computer storage is allocated by the Malware. Furthermore the Malware reports to the Botmaster properties of its host computer so that the Botmaster can decide if the host computer can be used for the planned Botnet operations. 4. Applications of a Botnet Positive applications: Berkeley University: Use of a Botnet in research projects in order to decrease IT-costs. Search for intelligent life in space. Negative applications: Distribution of spam mails of commercial (criminal) users. This also includes pishing mails. The return address is disguised. Nearly 80% of the world wide spam mails origin from Botnets

4. Applications of a Botnet 5. Protection against malware Negative applications: Allocation of storage for criminal activities. Theft of sensitive data of the bots. DDoS (distributed denial of services) attacks of e. g. enterprise servers. Often these servers break down. Then the Botnet master may contact the enterprise for blackmailing reasons. 5. Protection against malware Always (automatically) actualize the operation system. Don´t open suspicious or unknown email attachments. Use an anti virus program. Always (automatically) actualize this program. Use a firewall which monitors the network traffic. A firewall protects a computer against unwanted network accesses.