Difference between revisions of "Botnets"
Bob Zenith (talk | contribs) (Created page with 'A Botnet (also called a robot network) is a group of computers running an application controlled and manipulated only by the owner or the software source. Usually, when people re…') |
|||
(One intermediate revision by one other user not shown) | |||
Line 1: | Line 1: | ||
− | A Botnet | + | A Botnet, or robot network) is a group of computers running an application controlled and manipulated by the owner or the software source. Usually, when people refer to Botnets, they are talking about a group of computers infected with the malicious kind of robot software, (the bots), which present a security threat to the owner of the computer. Once the robot software (basically, [[Malware]]) has been successfully installed in a computer, this computer becomes a zombie or a drone, unable to resist the commands of the bot commander. There are small and large Botnets, ranging from 10,000 computers to 1,000 computers controlled. The difficult thing about Botnets is that the owner usually doesn't know about it, therefore s/he is powerless to stop it. [http://www.topbits.com/botnet.html] |
== Uses of Botnets == | == Uses of Botnets == | ||
− | There are many uses of Botnets, | + | There are many uses of Botnets, an example is: |
=== Denial of Service (DoS) Attacks === | === Denial of Service (DoS) Attacks === | ||
− | A Botnet can be used as a denial of service weapon. A Botnet attacks a network of computers for the purpose of disrupting service through the loss of connectivity or consumption of the victim network's bandwidth (by overloading the resources of the victim's computer system). | + | A Botnet can be used as a denial of service weapon. A Botnet attacks a network of computers for the purpose of disrupting service through the loss of connectivity or consumption of the victim network's bandwidth (by overloading the resources of the victim's computer system). Botnets may also used to damage or shut down a competitor's website or system of computers. |
+ | == Keylogging and Mass ID Theft == | ||
− | + | See main articles: [[Keylogger|Keylogging]] and [[Identity Theft]] | |
− | + | An encryption software within the victims' unit(s) can deter most bots from harvesting any useful, private information. However, some bots have adapted to this by installing a [[Keylogger]] program in the infected machines. With this program, the bot owner can use a filtering program to gather ''only'' the key sequence typed before or after interesting keywords, i.e. "PayPal", "Gmail", "Bank of America"... | |
− | An encryption software within the victims' unit(s) can deter most bots from harvesting any useful, private information. | ||
− | Bots can also be used as agents for mass [[Identity Theft]]. It does this through [[Phishing]] or pretending to be a legitimate company in order to convince the user to submit [[Personally Identifiable Information | personal information]] and passwords. | + | Bots can also be used as agents for mass [[Identity Theft]]. It does this through [[Phishing]] or pretending to be a legitimate company in order to convince the user to submit [[Personally Identifiable Information (PII)| personal information]] and passwords. Links in a [[Phishing]] email can also lead to fake websites to trick the user into typing in the login credentials. |
Latest revision as of 09:04, 2 February 2012
A Botnet, or robot network) is a group of computers running an application controlled and manipulated by the owner or the software source. Usually, when people refer to Botnets, they are talking about a group of computers infected with the malicious kind of robot software, (the bots), which present a security threat to the owner of the computer. Once the robot software (basically, Malware) has been successfully installed in a computer, this computer becomes a zombie or a drone, unable to resist the commands of the bot commander. There are small and large Botnets, ranging from 10,000 computers to 1,000 computers controlled. The difficult thing about Botnets is that the owner usually doesn't know about it, therefore s/he is powerless to stop it. [1]
Uses of Botnets
There are many uses of Botnets, an example is:
Denial of Service (DoS) Attacks
A Botnet can be used as a denial of service weapon. A Botnet attacks a network of computers for the purpose of disrupting service through the loss of connectivity or consumption of the victim network's bandwidth (by overloading the resources of the victim's computer system). Botnets may also used to damage or shut down a competitor's website or system of computers.
Keylogging and Mass ID Theft
See main articles: Keylogging and Identity Theft
An encryption software within the victims' unit(s) can deter most bots from harvesting any useful, private information. However, some bots have adapted to this by installing a Keylogger program in the infected machines. With this program, the bot owner can use a filtering program to gather only the key sequence typed before or after interesting keywords, i.e. "PayPal", "Gmail", "Bank of America"...
Bots can also be used as agents for mass Identity Theft. It does this through Phishing or pretending to be a legitimate company in order to convince the user to submit personal information and passwords. Links in a Phishing email can also lead to fake websites to trick the user into typing in the login credentials.