作者: Son T. , Mohammed S.
DOI: 10.5772/15401
关键词: The Internet 、 Credit card 、 Phishing 、 Denial-of-service attack 、 Bot herder 、 Botnet 、 Intrusion detection system 、 Computer security 、 Login 、 Computer science
摘要: Today, our dependence on the internet has grown manifold. So need to protect vast personal information accessible via web interfaces such as online passwords, corporate secrets, banking accounts, and social networking accounts like Facebook. The appearance of botnets in scene over last decade, their ever changing behavior caused real challenges that cannot be easily remedied. According literature, a botnet is defined set infected hosts (also called bots or zombies) run autonomously automatically, controlled by botmaster (bot herder) who can co-ordinate his/her malicious intentions using bots. Some prominent tasks credited include DDoS (Distributed denialof-service), spam, phishing, ransomwares identity theft. In attack, command all its attack particular server (example: update.microsoft.com) at date, time for duration anonymous proxy used stepping-stone hide actual commanding node. spam campaign, nodes form bot network are responsible sending behaving relay points, delivering mails list intended victim email addresses selected botmaster. For example: node which part could sent day with payload mailed. These messages advertise pharmaceutical products may also deliver further infection executables links attachments recruit more bots, done Storm Waledac. phishing scam, acting proxies servers hoax site content benign users gather e-banking credit card credentials. example, sites host looks requesting login details credentials when entered user, access legitimate sites. Eventually funds transferred leave no trails (Nazario & Holz, 2008). Botnets have been known infect 2 million while Conficker 9 according some estimates. As seen, far reaching effects masters threat. This chapter will cover concise survey detection systems well provide novel mobile-agent based method adapted from intrusion systems, handling botnets. We necessary background needed understand offensive techniques utilized botnets; defensive