• Corpus ID: 29718102

Study of Botnets and Their Threats to Internet Security

  title={Study of Botnets and Their Threats to Internet Security},
  author={M. Tariq Banday and Jameel A. Qadri and Nisar A. Shah},
Among all media of communications, Internet is most vulnerable to attacks owing to its public nature and virtually without centralized control. With the growing financial dealings and dependence of businesses on Internet, these attacks have even more increased. Whereas previously hackers would satisfy themselves by breaking into someone’s system, in today's world hackers' work under an organized crime plan to obtain illicit financial gains. Various attacks than include spamming, phishing… 

Threats of Botnet to Internet Security and Respective Defense Strategies

The paper presents a detailed study of technology involved in the command and control of botnets and threats posed by them, and offers several strategies for defense against Botnets.


In this paper a detailed study of botnet, their topologies, rallying mechanisms and communication protocols used and detection mechanisms both at the network and host level are presented.

Advance Persistent Threat: Botnet

Growth of internet era and corporate sector dealings communication online has introduced crucial security challenges in cyber space. Statistics of recent large scale attacks defined new class of


Botnets are becoming more elaborate and efficient over time and thus the use of botnets is growing at an exponential rate, threatening the average user and business alike.

Botnet Future Trend

This paper aims to review Botnet future trend and why industry-wide standard needs to developed to combat these threats and why standard approach towards Botnet confrontation is needed.

Tracing Back the Bot Master

A rational approach is brought for the live detection of the botmaster in the internal network, which works independent of the structure of theBotnet, and will be a better option for online detection ofThe botmaster.

Towards an enterprise self-healing system against botnets attacks

A self-healing architecture that was originally inspired from a nature paradigm and applied in the computer field is proposed to work within a network domain, based on the principles of self healing systems and the analysis of botnet behaviour.

A Dynamic Botnet Detection Model based on Behavior Analysis

Experimental results show that the proposed approach detects more number of bots with high accuracy, and the P2P-decentralized based botnets are more dangerous than centralized botnets.

Effects of botnets – a human-organisational approach

A unified framework for the human-organisational classification of botnets is formed, which comprises people and technological attributes according to the BMIS model, providing the defender with a standard way of classification.

Design and Development of E-mail Security Protocols and Forensic Tools: A Research Proposal

The study would also lead to the design of new protocols and procedures for detection of e-mail date spoofing, filtering and forensics of terrorist e-mails, and filtering of contaminated multilingual e- mail message.



Bots & Botnet: An Overview

An overview of malicious bot, a remotely controlled trojan which infects internet hosts and is remotely controlled by attacker via private IRC channels is provided, which helps attackers to obscure their activities & evade detection in disguise of legitimate IRC traffic.

Examining the criminology of bot zoo

  • J. Govil
  • Computer Science
    2007 6th International Conference on Information, Communications & Signal Processing
  • 2007
The results of the efforts done to understand the study of BotNets and developing detection technologies are presented and it is hoped that the information available in this paper will help the research community in the development of unique solution for BotNet detection and control.

Botnets: Big and Bigger

This article describes an attack on a honeypot that occurred in March 2003 during the onset and peak activity of several worms that targeted vulnerable hosts running Windows file sharing and incorporated the compromised honeypot into a large botnet that attackers used to initiate distributed denial-of-service (DDOS) attacks against several Internet sites.

Zombies and botnets

This paper examines the activities and consequences associated with botnets and provides examples of existing incidents so that subscribers can be better informed of the risks.

An Inside Look at Botnets

A significant change in motivation for malicious activity has taken place over the past several years: from vandalism and recognition in the hacker community, to attacks and intrusions for financial gain, thereby escalating the network security arms race.

Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds

This work presents the design and implementation of Kill-Bots, a kernel extension to protect Web servers against DDoS attacks that masquerade as flash crowds, and improves performance, regardless of whether the server overload is caused by DDoS or a true Flash Crowd.

Army of Botnets

This work examines the possibility of “super-botnets,” networks of independent botnets that can be coordinated for attacks of unprecedented scale, and sheds light on the feasibility and structure of super-botsnets and some properties of their command-and-control mechanism.

Automated Identity Theft

Honeynet intruders often use Internet Relay Chat (IRC) to communicate with their peers, which could disclose their attack and intrusion tactics, describe their motives, or otherwise shed light on their underground activities.

A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior

The experimental results reveal that the proposed metrics are applicable for detecting botnets, but further research is needed to refine their performance.

The Spread of the Witty Worm

A global view of the Witty worm's spread, with particular attention to its features.