2011
DOI: 10.1108/17440081111125635
|View full text |Cite
|
Sign up to set email alerts
|

Botnets: threats and responses

Abstract: PurposeA botnet is a network of computers on the internet infected with software robots (or bots). There are numerous botnets, and some of them control millions of computers. Cyber criminals use botnets to launch spam e‐mails and denial of service attacks; and commit click fraud and data theft. Governments use botnets for political purposes or to wage cyber warfare. The purpose of this paper is to review the botnet threats and the responses to the botnet threats.Design/methodology/approachThe paper describes h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…Within the variation, the botnet can conduct brute force attacks to access the SSH sessions as exploiting cases where weak passwords have been used [12][13][14]. Botnets can use dictionary-based attacks to be able to gain access to the sessions and allow for the infection to be performed [15]. Feily et al [16] elaborates that botnets are like Trojan-based malware as both botnets and Trojans may penetrate networks via phishing.…”
Section: Infection Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…Within the variation, the botnet can conduct brute force attacks to access the SSH sessions as exploiting cases where weak passwords have been used [12][13][14]. Botnets can use dictionary-based attacks to be able to gain access to the sessions and allow for the infection to be performed [15]. Feily et al [16] elaborates that botnets are like Trojan-based malware as both botnets and Trojans may penetrate networks via phishing.…”
Section: Infection Methodsmentioning
confidence: 99%
“…Phishing emails commonly present an urgent threat to users, informing them that they only have a certain period to open the link, causing the user to panic and respond, thus executing the malware. Bot-masters are responsible for sending phishing emails that have been weaponized to trigger the botnets [7,15,17]. The phishing emails persuade users to open the infected attachments.…”
Section: Infection Methodsmentioning
confidence: 99%
See 3 more Smart Citations