Module 12: AdaBoost; SGD and security application Flashcards
(8 cards)
Botnet
Network made up of computers controlled remotely by third party, OR network of hijacked computers used to carry out scams and cyberattacks
Types of botnet attacks
DDoS (Distributed Denial of Service) attacks
Sending spam, viruses, spyware
Phishing
Stealing
Click fraud
What do botmasters use to hide commands?
DNS services
C&C (Command and Control) server
Server used by cybercriminals to send orders and receive reports from bots
Centralized client-server botnet model
Provides botmaster direct access. Weakness: when traced, all botnets become useless. Uses IRC and HTTP.
Decentralized P2P (peer to peer) botnet model
Any bot can act as client or server or both simultaneously. Difficult to capture or shut down. Each bot has its own encryption design.
Botnet steps
Infection
Command and Control (C&C)
Task Assignment
Execution of Tasks
Reporting
Ways to find botnets
Network Traffic Analysis
Signature-Based Detection
Behavior-Based Detection
Honeypots
Machine-Learning-Based Detection