Business Model of a Botnet

@article{Putman2018BusinessMO,
  title={Business Model of a Botnet},
  author={C. G. J. Putman and Abhishta Abhishta and Lambert J. M. Nieuwenhuis},
  journal={2018 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP)},
  year={2018},
  pages={441-445}
}
Botnets continue to be an active threat against firms or companies and individuals worldwide. Previous research regarding botnets has unveiled information on how the system and their stakeholders operate, but an insight on the economic structure that supports these stakeholders is lacking. The objective of this research is to analyse the business model and determine the revenue stream of a botnet owner. We also study the botnet life-cycle and determine the costs associated with it on the basis… Expand
Effects of botnets – a human-organisational approach
TLDR
A unified framework for the human-organisational classification of botnets is formed, which comprises people and technological attributes according to the BMIS model, providing the defender with a standard way of classification. Expand
On Security Threats of Botnets to Cyber Systems
  • T. Lange, H. Kettani
  • Computer Science
  • 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN)
  • 2019
TLDR
A review on botnet evolution, trends and mitigations is presented, and related examples and research are offered to provide the reader with quick access to a broad understanding of the issues at hand. Expand
On the Feasibility of Automating Stock Market Manipulation
TLDR
This work presents the first findings on the feasibility of using botnets to automate stock market manipulation, and consolidates the findings into a working proof-of-concept, man-in-the-browser malware, Bot2Stock, capable of controlling victim email and brokerage accounts to commit fraud. Expand
DUSTBot: A duplex and stealthy P2P-based botnet in the Bitcoin network
TLDR
A novel P2P botnet model based on Bitcoin transactions to prepare for new cyber threats and a covert, duplex, and low-cost command and control (C&C) channel in the Bitcoin network is presented in this work. Expand
Probability Analysis of Successful Cyber Attacks in SDN-based Networks
TLDR
A novel model is suggested which considers vulnerability severities, attack scenarios and various potential actors and their motivations and infer the most likely attack scenarios. Expand
The Maestro Attack: Orchestrating Malicious Flows with BGP
TLDR
The Maestro attack is presented, a novel Link Flooding Attack that leverages control-plane traffic engineering techniques to concentrate botnet-sourced Distributed Denial of Service flows on transit links and evaluates widespread Internet link vulnerability across several metrics, including BGP betweenness and botnet flow density. Expand
UMUDGA: A dataset for profiling DGA-based botnet
TLDR
This research focuses on the first critical step of the training phase, that is, the collection of data suitable for being analysed by algorithms, and advocates a thorough analysis of the cyber panorama in terms of botnets that make use of Domain Generation Algorithms (DGAs) as evasive techniques. Expand
An Efficient Botnet Detection Methodology using Hyper-parameter Optimization Trough Grid-Search Techniques
TLDR
Experimental results prove that by tuning algorithms trained models can outperform detection accuracy in an efficient manner. Expand
IoT-Botnet Detection and Isolation by Access Routers
TLDR
It is shown that the IoT botnet detection and isolation approach at the level of access routers helps to prevent the compromise of IoT devices without the need to have in-depth technical administration knowledge, and hence make it viable for customers and end users. Expand
REPEL: A Strategic Approach for Defending 5G Control Plane From DDoS Signalling Attacks
TLDR
This paper uses games theory to build up a defence front line, able to keep services availability and discourage the attacker, and proposes REPEL – an intelligent resource scaling strategy to mitigate DDoS signalling attacks preserving legitimate traffic. Expand
...
1
2
...

References

SHOWING 1-10 OF 34 REFERENCES
The Botnet Revenue Model
TLDR
The purpose of this paper is to describe the pillars of the supply chain of botnets, in order to highlight that the criminal market behind their spread is mature enough to prefer a revenue model based on service rentals, instead of direct monolithic implementation. Expand
Analysis of botnets through life-cycle
TLDR
It is deducted that the interruption of any of the stages makes it possible to thwart a botnet purpose and, thus, make it useless. Expand
Analysing the Impact of a DDoS Attack Announcement on Victim Stock Prices
TLDR
In most cases there is no significant impact on the stock returns but in cases where a DDoS attack creates an interruption in the services provided to the customer, it is found that a significant negative impact is found. Expand
Breaking the DDoS Attack Chain
Department of Defense (DoD) communications and data networks continue to be targets for adversaries to deny operational use of those networks. Distributed Denial of Service (DDoS) is one such attackExpand
Measuring the Cost of Cybercrime
TLDR
The figures suggest that the UK should spend less in anticipation of cybercrime and more in response – that is, on the prosaic business of hunting down cyber-criminals and throwing them in jail. Expand
Measuring Pay-per-Install: The Commoditization of Malware Distribution
TLDR
It is found that of the world's top 20 most prevalent families of malware, 12 employ PPI services to buy infections, and the duration of malware distribution is analyzed. Expand
Booted : An Analysis of a Payment Intervention on a DDoS-for-Hire Service
Distributed Denial of Service (DDoS) attacks have become a growing threat that, to a large extent, have become commoditized by DDoS-for-hire, or “booter”, services. In this case study, we analyzeExpand
Business Model Generation A Handbook For Visionaries Game Changers And Challengers
The book entitled “Business Model Generation: A Handbook for visionaries, game changers and challengers” though written by Osterwalder and Pigneur (2010) was also co-created by 470 practitioners fromExpand
Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices
TLDR
This article analyzes the impact of 45 different DDoS attack announcements on victim's stock prices using three different approaches and finds that the assumption of cumulative abnormal returns being normally distributed leads to overestimation/underestimation of the impact. Expand
DDoS-as-a-Service: Investigating Booter Websites
Why should you care about Distributed Denial of Service (DDoS) attacks? If your Internet home connection would be the target of a DDoS attack, then not only your connectivity is gone, but also yourExpand
...
1
2
3
4
...