Top-Rated Free Essay
Preview

Botnet Paper

Good Essays
1014 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Botnet Paper
Botnets
William Jones
68.510 Data Networking
27 Feb 2013
Professor Tomsic
Executive Summary
This paper will define botnets and how they are developed, used and controlled. The malicious attacks such as distributed denial of service (DDoS) will be discussed along with recent DDoS attacks and the likely perpetrators and their motives. Finally, I will describe what protocols and systems are used by attackers use to control and update botnets today.

In terms of today’s cyber world the term bot which was originally derived from the work robot, refers to end systems (desktops, laptops, servers) that have been infected by malicious software. Once compromised the end system is turned into a bot that is under the command and control of the criminal identity theft. Criminal organizations utilize malicious software to infect large numbers of systems to create botnets to perpetrate large scale attacks like those we have seen against our financial organizations.
Malware is malicious software intended to cause harm. It usually refers to viruses, worms, trojans, or other forms of malicious code that is used to compromise the integrity of the target system with the intent to disrupt systems, spy on users and steal their credentials and /or identify, or take control of the system. Systems can be infected in multiple ways including physical contact such as sharing files on portable storage media such as CD’s or flash drives. However, today malware more commonly arrives in electronic mail messages, either in an infected file attached to the email or through a Web link within the message. Malware can also be embedded in a downloaded file such as a jpg or a music file. In addition, malware can enter through an open network connection, without any human intervention due to poor configuration, or the lack of security patching processes. Once infected the end system is under the command and control of the criminal organization to conduct illicit activities.
The trend and sophistication of attacks using botnets has been increasing and recently has been taking the form of DDoS attacks. There are several reasons for the increase in the numbers and sophistication in the attacks namely the emergence of crime as a service (CaaS) and hactivism. CaaS has emerged as a threat due to the growth in low-cost highly available attack software that allows novice hackers the ability to unleash attacks. Secondly, hactivism or the use of cyber attacks to make political or social statements like we have recently seen emanating from the Cyber Fighters of Izz ad-Din al-Qassam (Cyber Fighters), Anonymous or the Occupy movement.
Recent data shows that nearly 51% of observed attack traffic has originated in the Asia Pacific region, while just over 23% has originated in North and South America. Targets of recent DDoS activity include U.S. Bancorp, JPMorgan Chase, Bank of America, PNC Financial Services Group, SunTrust, HSBC, Ally Bank, BB&T, Wells Fargo and Capital One. However, a recent announcement by the Cyber Fighters indicates that they are going to be targeting regional and community banks.
The methodology that is evidenced during recent attacks is that virtual private servers have been compromised with a per node attack rate that is one hundred times greater than the normal bot. In addition, the command and control of the botnet is much tighter and able to modify attack methods and shift between targets in as little as twenty minutes whereas it used to take hours or days.
Some interesting examples of recent DDoS attacks using Botnets are as follows:
Case #1 The London Olympics was the target of DDoS attacks from 25 July through 9 September. The first significant attack occurred five hours prior to the opening ceremony and used twenty-three different attack vectors with 234M requests over an hour and twenty minute period. The second significant event took place during the first full day of competition and over a twelve hour period there were 5.6 B requests.
Case #2 A large East Coast financial services company was targeted during Hurricane Sandy and DNS requests peaked at 158K per second and totaled 19B in five days compared to 30M hits per week.
Case #3 – A leading US financial institution (FI) with millions of customers was the target of a massive DDoS attack with peak attack traffic of 30 Gbps which is 30 times the normal daily high traffic volume. Because of mitigating controls in place the attack was unsuccessful and the attackers gave up after fifteen minutes. Then twenty-five minutes later another large US based FI underwent a DDoS attack whose peak attack traffic volume of 8,491 MBit/sec with a duration of approximately two hours and forty minutes. Despite existing mitigating controls there was a degradation of service.
In conclusion, the use and sophistication of Botnets is increasing and recent trends indicate thus type of activity will continue to increase. Lessons learned include after a short probe of defenses the attacks begin in earnest and can last from minutes up to several days. Current attack methodologies are against Layer 7 of the protocol stack and attack SSL as opposed to the old attack methods that targeted Layer 4. Organizations need to develop and implement appropriate business continuity plans including preparing for dramatic increases of inbound network traffic, develop and implement incident response plans, and consider engaging service providers that specialize in real-time monitoring DDoS mitigation services.

References

1. Kurose, James F., and Keith W. Ross. Computer Networking: A Top-down Approach. Boston: Pearson, 2013. Print.

2. "2011 DDoS Attacks." Neustar. N.p., n.d. Web. 26 Feb. 2013.

3. "Akamai.com." State of the Internet. N.p., n.d. Web. 26 Feb. 2013.

4. "News & Updates." 2012 Cost of Cyber Crime Study: United States. N.p., n.d. Web. 26 Feb. 2013. <http://www.ponemon.org/news-2/44>.

5. "Cyber Crime." FBI. N.p., n.d. Web. 26 Feb. 2013. <http://www.fbi.gov/about-us/investigate/cyber>.

6. "Al-Qassam Cyber Fighters Threaten There 's Not Much Time Until They Resume Attacks." - Softpedia. N.p., n.d. Web. 26 Feb. 2013. <http://news.softpedia.com/news/al-Qassam-Cyber-Fighters-Threaten-There-s-Not-Much-Time-Until-They-Resume-Attacks-330763.shtml>.

References: 1. Kurose, James F., and Keith W. Ross. Computer Networking: A Top-down Approach. Boston: Pearson, 2013. Print. 2. "2011 DDoS Attacks." Neustar. N.p., n.d. Web. 26 Feb. 2013. 3. "Akamai.com." State of the Internet. N.p., n.d. Web. 26 Feb. 2013. 4. "News & Updates." 2012 Cost of Cyber Crime Study: United States. N.p., n.d. Web. 26 Feb. 2013. <http://www.ponemon.org/news-2/44>. 5. "Cyber Crime." FBI. N.p., n.d. Web. 26 Feb. 2013. <http://www.fbi.gov/about-us/investigate/cyber>. 6. "Al-Qassam Cyber Fighters Threaten There 's Not Much Time Until They Resume Attacks." - Softpedia. N.p., n.d. Web. 26 Feb. 2013. <http://news.softpedia.com/news/al-Qassam-Cyber-Fighters-Threaten-There-s-Not-Much-Time-Until-They-Resume-Attacks-330763.shtml>.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 454 Lab 4 Essay

    • 457 Words
    • 2 Pages

    The method to foul network is that one country is controlling the rest of the bots computer which looks like the attacks are from all over the countries.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The university network was a victim of a DDoS attack. Whereby a cyber criminal first acquired administrator access. We suspect that the attacker gained access to the network from an internal computer, most likely from a student PC in one of the labs. The attacker likely used keylogger software to discover administrator credentials.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Us Vs Arabo Case Study

    • 459 Words
    • 2 Pages

    In 2004, 18 year old Jason Salah Arabo from Michigan was arrested and pleaded guilty with conspiracy to order destructive computer attacks on business competitor’s websites from his home by remotely controlling them with a computer program called, “Bot”. Bots can be easily disguised as MP3 music files or pictures that unaware users download from public websites. Once they are downloaded, Bots will cause the virus to overload the website’s hosting computer server that result in crashing the entire system. Arabo wasn’t alone in this process. He and former 16 year old “Jasmine” Signh from New Jersey, creator of the Bot, had met Arabo on an instant messenger chat, and had agreed to help takedown Arabo’s competitor websites in exchange for Arabo’s merchandise, including designer sneakers. Arabo was running two business companies that sold throwback sports apparel such as team jerseys over the internet. Together, Arabo and Signh had designed the program in what they thought would help Arabo’s business by stopping customers from visiting and using other services.…

    • 459 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Ponemon Institute. (2013, May 28). Cost of Data Breach: Global Analysis. Retrieved April 29, 2015, from Ponemon Institute:…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It230 Wk1 Checkpoint

    • 576 Words
    • 3 Pages

    References: Hallberg, B.A. (2010). Networking: A beginner’s guide (5th ed.). New York, NY: McGraw-Hill. https://portal.phoenix.edu/classroom/coursematerials/it_230/20130715/OSIRIS:45023271…

    • 576 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Networking plays a vital part in business today. It provides the tool to link people, software and hardware together. It is not bound by time differences, and it provides businesses the opportunity to work together in ways that would not have been possible 20 years ago. More and more corporations depend on networking within different faucets of their organization. With…

    • 1138 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Mansfield, k. and atonakos, j., 2009.computer networking from lans to wans hardware, software, and security. (online). USA: Cengage Learning…

    • 442 Words
    • 2 Pages
    Good Essays
  • Better Essays

    A piece of unwanted computer software or code introduced into another program, attached to a document or exists on its own, for malicious purposes.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Botnets represent a huge and developing danger against digital security as they give a dispersed stage to numerous digital wrongdoings, for example, Distributed Denial of Service (DDoS) assaults against basic targets, malware scattering, phishing, and click fraud[3][4]. Botnet…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    • CYBERCRIME is formally defined as any criminal action perpetrated primarily through the use of a computer. • CYBERCRIMINALS are individuals who use computers, networks, and the Internet to perpetrate crime. • The existence of cybercrime means that computer users must take precautions to protect themselves.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Better Essays

    The Stuxnet Virus

    • 1719 Words
    • 7 Pages

    4. Masters, J. (2011, May 23). Confronting the cyber threat. Council on Foreign Relations Website. Retrieved August 3rd 2011, from:…

    • 1719 Words
    • 7 Pages
    Better Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    In this section I needed to add a statement like your problem is... I recommend that you... Other than that and some proof reading Dr. Cross didn't have any other comments.…

    • 1712 Words
    • 6 Pages
    Satisfactory Essays

Related Topics