Module 12: AdaBoost; SGD and security application Flashcards

(8 cards)

1
Q

Botnet

A

Network made up of computers controlled remotely by third party, OR network of hijacked computers used to carry out scams and cyberattacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of botnet attacks

A

DDoS (Distributed Denial of Service) attacks
Sending spam, viruses, spyware
Phishing
Stealing
Click fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do botmasters use to hide commands?

A

DNS services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

C&C (Command and Control) server

A

Server used by cybercriminals to send orders and receive reports from bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Centralized client-server botnet model

A

Provides botmaster direct access. Weakness: when traced, all botnets become useless. Uses IRC and HTTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Decentralized P2P (peer to peer) botnet model

A

Any bot can act as client or server or both simultaneously. Difficult to capture or shut down. Each bot has its own encryption design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Botnet steps

A

Infection
Command and Control (C&C)
Task Assignment
Execution of Tasks
Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ways to find botnets

A

Network Traffic Analysis
Signature-Based Detection
Behavior-Based Detection
Honeypots
Machine-Learning-Based Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly