• Corpus ID: 22038250

Business Model of Botnets

  title={Business Model of Botnets},
  author={C. G. J. Putman},
Botnets continue to be an active threat against institutions and individuals worldwide. Previous research regarding botnets has unveiled information on how the system and their stakeholders operate, but an insight on the economic structure behind these stakeholders is lacking. The objective of this research is to build the business model and determine the structure of the underground botnet economy. This means determining the botnet life-cycle, revenue streams and overall economic impact on… 

Figures and Tables from this paper


The Botnet Revenue Model
The purpose of this paper is to describe the pillars of the supply chain of botnets, in order to highlight that the criminal market behind their spread is mature enough to prefer a revenue model based on service rentals, instead of direct monolithic implementation.
Analysis of botnets through life-cycle
It is deducted that the interruption of any of the stages makes it possible to thwart a botnet purpose and, thus, make it useless.
Measuring Pay-per-Install: The Commoditization of Malware Distribution
It is found that of the world's top 20 most prevalent families of malware, 12 employ PPI services to buy infections, and the duration of malware distribution is analyzed.
Measuring the Cost of Cybercrime
The figures suggest that the UK should spend less in anticipation of cybercrime and more in response – that is, on the prosaic business of hunting down cyber-criminals and throwing them in jail.
Booted : An Analysis of a Payment Intervention on a DDoS-for-Hire Service
In this case study, leaked fine-grain “ground truth” data from a larger booter service, VDoS, is analyzed and it is found that VDoS’s revenue and subscriber base were growing before this payment intervention and began to decline afterwards.
Business Model Generation
The Business Model Canvas provides a flexible template for capturing the nine essential parts of a business model, which can best be described through nine basic building blocks that show the logic of how a company intends to make money.
What drives cybercrime? Empirical evidence from DDoS attacks
This paper is one of the first to explore possible determinants of cybercrime at an aggregate level and estimate an econometric model with economic and technological variables in order to explain observed DDoS patterns.
Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets
The anatomy of the IoT botnets and their basic mode of operations are outlined, some of the major DDoS incidents using IoTBotnets in recent times along with the corresponding exploited vulnerabilities will be discussed.
Defeating DDoS attacks by fixing the incentive chain
This article discusses two components of the technological solutions to DDoS attacks: cooperative filtering and cooperative traffic smoothing by caching and proposes usage-based pricing and Capacity Provision Networks, which enable victims to disseminate enough incentive along attack paths to stimulate cooperation against DDoS attack.
Show Me the Money: Characterizing Spam-advertised Revenue
Two inference techniques for peering inside the business operations of spam-advertised enterprises are described: purchase pair and basket inference, which provide informed estimates on order volumes, product sales distribution, customer makeup and total revenues for a range of spam -advertised programs.