Bot armies as threats to network security

被引:0
|
作者
Banks, Sheila B. [1 ]
Stytz, Martin R. [2 ]
机构
[1] Calculated Insight, Orlando, FL 32828 USA
[2] Inst Def Anal, Washington, DC USA
关键词
botnet; bot army; botherder; malware; information assurance; virus; worm; trojan;
D O I
10.1117/12.724246
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Botnets, or "bot armies", are large groups of remotely controlled malicious software. Bot armies pose one of the most serious security threats to all networks. Botnets, remotely controlled and operated by botmasters or botherders, can launch massive denial of service attacks, multiple penetration attacks, or any other malicious network activity on a massive scale. While bot army activity has, in the past, been limited to fraud, blackmail, and other forms of criminal activity, their potential for causing large-scale damage to the entire internet; for launching large-scale, coordinated attacks on government computers and networks; and for large-scale, coordinated data gathering from thousands of users and computers on any network has been underestimated. This paper will not discuss how to build bots but the threats they pose. In a "botnet" or "bot army", computers can be used to spread spam, launch denial-of-service attacks against Web sites, conduct fraudulent activities, and prevent authorized network traffic from traversing the network. In this paper we discuss botnets and the technologies that underlie this threat to network and computer security. The first section motivates the need for improved protection against botnets, their technologies, and for further research about botnets. The second contains background information about bot armies and their key underlying technologies. The third section presents a discussion of the types of attacks that botnets can conduct and potential defenses against them. The fourth section contains a summary and suggestions for future research and development.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Problem of Network Security Threats
    Mendyk-Krajewska, Teresa
    Mazur, Zygmunt
    [J]. 3RD INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION, 2010, : 436 - 443
  • [2] Protecting against threats to enterprise network security
    Department of Accounting and Information Technology, York College, City University of New York, United States
    [J]. Software World, 2006, 2 (14-15):
  • [3] Virtual network security: threats, countermeasures, and challenges
    Bays, Leonardo Richter
    Oliveira, Rodrigo Ruas
    Barcellos, Marinho Pilla
    Gaspary, Luciano Paschoal
    Mauro Madeira, Edmundo Roberto
    [J]. JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2015, 6
  • [4] Wireless network security: Vulnerabilities, threats and countermeasures
    Choi, Min-Kyu
    Robles, Rosslin John
    Hong, Chang-Hwa
    Kim, Tai-Hoon
    [J]. International Journal of Multimedia and Ubiquitous Engineering, 2008, 3 (03): : 77 - 86
  • [5] Security and privacy threats in RFID traceability network
    Chu Chao-Hsien
    [J]. Journal of Southeast University(English Edition), 2008, (English Edition) : 132 - 135
  • [6] Cognitive Radio Network Security Threats: A Review
    Mishra, Nikita
    Srivastava, Sumit
    Sharan, Shivendra Nath
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMMUNICATION AND COMPUTATIONAL TECHNIQUES (ICCT), 2019, : 333 - 338
  • [8] Network mobility (NEMO) security: Threats and solutions
    Dinakaran, M.
    Balasubramanie, P.
    [J]. Journal of Theoretical and Applied Information Technology, 2012, 35 (01) : 77 - 82
  • [9] A Survey of Network Traffic Visualization in Detecting Network Security Threats
    Liu, Xiaomei
    Sun, Yong
    Fang, Liang
    Liu, Junpeng
    Yu, Lingjing
    [J]. TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 91 - 98
  • [10] The Investigation of Network Security, Including Penetrating Threats and Potential Security Measures
    Lincy, N. L.
    Midhunchakkaravarthy
    [J]. SOFT COMPUTING FOR SECURITY APPLICATIONS, ICSCS 2022, 2023, 1428 : 107 - 117