Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Botnet (2019-CH-424)

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

BOTNET

SUBMITTED TO:

MUHAMMAD YASIR
LECTURER OF COMPUTING FUNDAMENTALS

SUBMITTED BY:
ASMA MARYAM
CHEMICAL ENGINEERING

REG.NO:424

SESSION 2019-23

Page 1 of 5
BOTNET:
The Internet is replete with threats to online security. Many of these
threats are just beneficial, positive technologies turned to evil use. The
botnets is an example of using good technologies for malevolence. A
botnet is nothing more than a string of connected computers coordinated
together to perform a task. That can be maintaining a chat room, or it
can be taking control of your computer. Botnets are just one of the many
perils out there on the Internet.
BOTNET ACCESS THE COMPUTER:
In some cases, your machine is directly hacked, while other times what
is known as a “spider” (a program that crawl the Internet looking for
holes in security to exploit) does the hacking automatically.
More often than not, what botnets are looking to do is to add your
computer to their web. That usually happens through a driven-by
download or jesting you to install torjan horse on your computer.
What happens if botnets get access to your machine?
Once the software is downloaded, the botnet will now contact its
master computer and let it know that everything is ready to go. Now
your computer, phone or tablet is entirely under the control of the person
who created the botnet.
BOTNET’S OWNER CONTROLS YOUR PC:
They usually use your machine to carry out other nefarious tasks,
common tasks executed by botnets include:

 Using your machine’s power to assist in distributed denial-of-


service (DDoS) attacks to shut down websites.
 Emailing spam out to millions of Internet users.
 Generating fake Internet traffic on a third-party website for
financial gain.

Page 2 of 5
 Replacing banner ads in your web browser specifically targeted at
you.
Pop-ups ads designed to get you to pay for the removal of the botnet
through a phony anti-spyware package
The short answer is that a botnet is hijacking your computer to do what
botnets do, carry out mundane tasks, faster and better.
PROTECT THE COMPUTER FROM BOTNET:
Most people who are infected with botnets aren’t even aware that their
computer’s security has become compromised. However, taking simple,
common-sense precautions when using the Internet can not only remove
botnets that have been installed, it can also prevent them from being
installed on your computer, tablet and phone in the first place.

 Good security begins with an Internet security suite that detects


malware that has been installed, removes what’s present on your
machine and prevents future attacks.
 Always update your computer’s operating system as early as
possible. Hackers often utilize known flaws in operating system
security to install botnets. You can even set your computer to
install updates automatically.
 The same is true of applications on your computer, phone and
tablet. Once weakness are found and announced by software
companies, hackers rush to create programs to exploit those
weaknesses.
 Don’t download attachments or click on links from email
addresses you don’t recognize. This is one of the most common
vectors for all forms of malware.
 Use a firewall when browsing the Internet. This is easy to do with
Mac computers, as they come with Firewall software pre-installed.

Page 3 of 5
If you’re using a Windows-based machine, you might need to
install third-party software.
 Don’t visit websites that are known distributors of malware. One

of the things that a full-service Internet security suite can do is


warn you when you’re visiting such sites. When in doubt, check
with Norton Safe Web.
In general, hackers tend to look for low-hanging fruit. If you can mount
even basic defenses, botnets and other forms of malware are going to
look for easier targets.

HONEYPOT:
“A honey pot is a network-attached system set up as a decoy to lure
cyber attackers and to detect, deflect or study hacking trails in order to
obtain unauthorized access to information systems.”
OBJECTIVES OF HONEYPOT:
The function of a honey pot is to represent itself on the internet as a
potential target for attackers, usually a server or other high-value target
to gather information and notify defenders of any attempts to access the
honey pot by unauthorized users.
USEAGE OF HONEYPOT:
Honey pots are most often used by large enterprises and by companies
involved in cyber security research, to identify and defend attacks from
advanced persistent threat actors. Honey pots can be an important tool
for large organizations to take an active defense stance against attackers,
or for cyber security researchers who want to learn more about the tools
and techniques that attackers use.
HONEYPOT ACTIONS:
Generally, a honey pot operation consists of a computer, applications
and data that simulate the behavior of a real system and appears as part
of a network; however, the honey pot is actually isolated and closely
Page 4 of 5
monitored. Because there is no reason for legitimate users to access a
honey pot, any attempts to communicate with a honey pot should be
considered hostile.
ADVANTAGES AND DISADVANTAGES:
Advantages Disadvantages
 Starting point is good  Detect the attacks that are known
 Analyzing and logging is quite simple  Limited logging abilities are available.
 Easy to install, deploy and maintain.  Only detect by a skilled attacker
 Encryption  experienced hackers can often
differentiate by using system
fingerprinting techniques

Page 5 of 5

You might also like