Abstract
Botnets are a serious threat to internet security. Botnets consist of networked
collections of compromised machines called robots or ‘bots’ for short. Bots are also
called ‘zombies,’ and botnets are also called ‘zombie armies.’ Bots are controlled by
nodes called ‘botmasters’ or ‘botherders.’ Bots are infected with malicious code that
performs work on behalf of the botmaster or botherder.
Botnets are used to conduct cyber warfare, perform massive identity theft, store
and disseminate malware and pornography, execute massive spam campaigns, and
implement distributed Denial of Service attacks.
Botnets today can provide the processing power of a supercomputer and perform
a sustained Denial of Service attack powerful enough to take a country off line.
This paper will discuss botnet detection tools and techniques, organization and
architectures, protocols, and lifecycle.
more here................http://www.sans.org/reading-room/whitepapers/detection/botnet-tracking-tools-35347
Botnets are a serious threat to internet security. Botnets consist of networked
collections of compromised machines called robots or ‘bots’ for short. Bots are also
called ‘zombies,’ and botnets are also called ‘zombie armies.’ Bots are controlled by
nodes called ‘botmasters’ or ‘botherders.’ Bots are infected with malicious code that
performs work on behalf of the botmaster or botherder.
Botnets are used to conduct cyber warfare, perform massive identity theft, store
and disseminate malware and pornography, execute massive spam campaigns, and
implement distributed Denial of Service attacks.
Botnets today can provide the processing power of a supercomputer and perform
a sustained Denial of Service attack powerful enough to take a country off line.
This paper will discuss botnet detection tools and techniques, organization and
architectures, protocols, and lifecycle.
more here................http://www.sans.org/reading-room/whitepapers/detection/botnet-tracking-tools-35347