Global Internet threats have undergone a profound transformation from attacks designed solely to disable infrastructure to those that also target people and organizations. At the center of many of these attacks are collections of compromised computers, or Botnets, remotely controlled by the attackers, and whose members are located in homes, schools, businesses, and governments around the world.This paper provides a brief look at how existing botnet research, the evolution and future of botnets, as well as a comparative analysis of the various bot communication methods and investigate their associated benefits and weaknesses. We propose a contemporary Multi Server Cnc topology in which only bots with static global IP addresses are eligible as candidates for being in the peer list. This design ensures that the peer list in each bot has long life time making it geographically optimized. II. RELATED WORKBotnets are emerging as the most significant threat facing online ecosystems and computing assets. Malicious botnets are distributed computing platforms predominantly used for illegal activities such as launching Distributed Denial of Service (DDoS) attacks, sending spam, trojan and phishing emails, illegally distributing pirated media and software, force distribution, stealing information and computing resource, ebussiness [35,36] The defining characteristic of botnets is the use of command and control (C&C) channels through which they can be updated and directed. The multi-tier C&C architecture of botnets provides anonymity for the botmaster. C&C channels can operate over a wide range of logical network topologies and use different communication protocols. Botnets are usually classified according to their command and control architecture [37]. According to their command and control architecture, botnets can be classified as IRC-based, HTTP-based, DNS based or Peer to Peer (P2P) botnets. P2P botnets use the recent P2P protocol to avoid single point of failure. Moreover, P2P botnets are harder to locate, shutdown, monitor, and hijack. However, according to the analysis in [38] the most prevalent botnets are based on Internet Relay Chat (IRC) protocol with a
Cyber-squatting is fast becoming a threat to the future viability of Internet commerce. Fraudulent abuse of domain name registration is at the core of cybersquatting. By registering domain names similar to famous brands, cybersquatters lure consumers into purchasing counterfeit products, cause them to reveal their personally identifiable information, and expose themselves to spyware.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.