CFP last date
22 April 2024
Reseach Article

On the Internal Workings of Botnets: A Review

by Emmanuel C. Ogu, Nikos Vrakas, Ogu Chiemela, Ajose-Ismail B. M.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 138 - Number 4
Year of Publication: 2016
Authors: Emmanuel C. Ogu, Nikos Vrakas, Ogu Chiemela, Ajose-Ismail B. M.
10.5120/ijca2016908797

Emmanuel C. Ogu, Nikos Vrakas, Ogu Chiemela, Ajose-Ismail B. M. . On the Internal Workings of Botnets: A Review. International Journal of Computer Applications. 138, 4 ( March 2016), 39-43. DOI=10.5120/ijca2016908797

@article{ 10.5120/ijca2016908797,
author = { Emmanuel C. Ogu, Nikos Vrakas, Ogu Chiemela, Ajose-Ismail B. M. },
title = { On the Internal Workings of Botnets: A Review },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 138 },
number = { 4 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 39-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume138/number4/24370-2016908797/ },
doi = { 10.5120/ijca2016908797 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:38:48.566245+05:30
%A Emmanuel C. Ogu
%A Nikos Vrakas
%A Ogu Chiemela
%A Ajose-Ismail B. M.
%T On the Internal Workings of Botnets: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 138
%N 4
%P 39-43
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Denial of Service and Distributed Denial of Service Attacks have significantly shackled the development of computer networks and the internet, and masked their innumerable benefits behind many hours of service unavailability. These attacks are fostered, especially in their distributed variant, by networks of compromised machines (known as botnets, that is, a network of bots) that are taken over by a hacker / attacker, and coordinated in such a way as to channel overwhelming loads of malicious or useless traffic towards resource-providing / request-servicing servers. In the long run, a sufficient load of these traffic, overwhelm target servers and constitute them unable to service the requests of legitimate users that have subscribed legally to use these resources. This army of compromised systems have also been recently linked to various malicious and nefarious activities that have been taking place on computer networks and the internet in recent times; such activities relate to malware injection / infiltration, fraud, espionage, amongst others. This paper reviews the operations and coordination of botnets and the interactions that take place within the botnet during such malicious activities. New, valuable insights are provided towards the detection of such malicious networks through the introduction of the reverse life cycle of botnets.

References
  1. Banks, S., & Martin, S. (2007). Bot Armies: An Introduction.
  2. Cooke, E., Farnam, J., & Danny, M. (2005). The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. Proceedings of the USENIX SRUTI Workshop, 39, p. 44.
  3. Hanafy, I. M., Salama, A. A., Abdelfattah, M., & Wazery, Y. M. (2013). AIS Model for Botnet Detection in MANET using Fuzzy Function. International Journal for Computer Networking, Wireless and Mobile Communications (IJCNWMC), 3(1).
  4. Geneiatakis, D., Vrakas, N., & Lambrinoudakis, C. (2009). Utilizing bloom filters for detecting flooding attacks against SIP based services. Computers and Security, 28(7).
  5. Garip, T. M., Gursoy, E. M., Reiher, P., & Gerla, M. (2015). Congestion Attacks to Autonomous Cars Using Vehicular Botnets.
  6. Allen, H., & Roman, D. (2003). Increased Activity Targeting Windows Shares. CERT Advisory CA-2003-08.
  7. Laurianne, M. (2004). Bot Software Spreads, Causes New Worries. IEEE Distributed Systems Online, 5(6).
  8. FORTINET. (2012). Anatomy of a Botnet. Carlifornia: Fortinet®.
  9. Egg Development Team. (1993). Eggdrop: Open source IRC bot. Retrieved from http://www.eggheads.org/
  10. Ianelli, N., & Hackworth, A. (2005). Botnets as a vehicle for online crime. FORENSIC COMPUTER SCIENCE IJoFCS, 19.
  11. Honeynet Project and Research Alliance. (2005). Know your enemy: Tracking Botnets. Honeynet Project and Research Alliance. Retrieved from http://www. honeynet.org/papers/bots/
  12. Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., . . . Vigna, G. (2009). Your botnet is my botnet: analysis of a botnet takeover. Proceedings of the 16th ACM conference on Computer and communications security (pp. 635-647). ACM.
  13. Maryam, F., Alireza, S., & Sureswaran, R. (2009). A Survey of Botnet and Botnet Detection. Proceedings of the Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE'09 (pp. 268-273). IEEE.
  14. SOPHOS. (2014). Security Threat Report 2014. Oxford, UK: SOPHOS.
  15. Eslahi, M., Salleh, R., & Anuar, N. (2012). Bots and botnets: An overview of characteristics, detection and challenges. Proceedings of the International Conference on Control System, Computing and Engineering (ICCSCE), 2012 (pp. 349-354). IEEE Press.
  16. The Honeynet Project. (2007). Know Your Enemy: Fast-Flux Service Networks. Retrieved from http://www.honeynet.org/papers/ff
  17. Zhao, S., Lee, P. P., Lui, J., Guan, X., Ma, X., & & Tao, J. (2012). Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service. Proceedings of the 28th Annual Computer Security Applications Conference (pp. 119-128). Association for Computing Machinery (ACM).
  18. Pieterse, H., & Olivier, M. S. (2012, August). Android botnets on the rise: Trends and characteristics. Information Security for South Africa (ISSA), 2012, 1-5.
  19. Rossow, C., Andriesse, D., Werner, T., Stone-Gross, B., Plohmann, D., Dietrich, C. J., & Bos, H. (2013). Sok: P2pwned-modeling and evaluating the resilience of peer-to-peer botnets. IEEE Symposium on Security and Privacy (SP), 2013 (pp. 97-111). IEEE.
  20. Banks, S. B., & Stytz, M. R. (2008). Challenges of modeling botnets for military and security simulations. Proceeding of SimTecT (Vol. 2008).
  21. Paxson, V. (2001, July). An analysis of using reflectors for distributed denial-of-service attacks. ACM SIGCOMM Computer Communication Review, 31(3), 38-47. doi:10.1145/505659.505664
Index Terms

Computer Science
Information Sciences

Keywords

Botnets Cybercrimes Information Security Malware.