Robot network or BOT NET is also known as a ‘Zombie army’ and is considered as a group of computers that are compromised and controlled by the hacker to attack a specific target (Botnet.2011). Likewise, these group of compromised computers will broadcast spam, relay unwanted…
Moreover, Trojan is operational by initiating an Internet Relay Chat (IRC) that waits for any action from the hacker who has full control over the botnet (Rapoza, 2008). Apart from IRC, hackers utilize rootkits to compromise weak system with no updated security patches and have security loop holes that facilitate hacker’s objectives. As there are countless computers connected to the Internet, they use tools to capture and identify vulnerable systems and uses IP spoofing for (Spoofing.2011) manipulating the original IP addresses for gaining access in to the system. Furthermore, these compromised systems are from different geographical locations, it is difficult to identity suspicious traffic, as it represents different time zones. As botnets are considered as a major player in a Denial of Service attacks, it can be prevented by honey pots and bastion hosts that will identify suspicious broadcast at the initial level.
As mentioned previously, that a zombie army initiates flooding and broadcasting attacks from various locations to the specific target. The characteristic of this attack encompasses threats from distributed source and is known as distributed denial of service attacks (DDoS). Computer network encyclopedia describes it, as the incorporation of hundreds or even thousands of computers that were previously compromised used for transmitting huge volume of unwanted traffic to the target. DDoS attacks are considered to be lethal in the world of Internet has imposes significant risks for businesses, governmental organizations, army networks etc. (Ghazali & Hassan, 2011) research on DDoS attacks has revealed vulnerabilities not only in the network architecture or infrastructure, but also in the protocol specifications along with Internet. Exhibit 1.1 demonstrates types of flooding DDoS attacks along with protocols:
High rate flood attacks: This type of attack is achieved by traffic generation from many machines that may be in total of ...
Cite this document
(“Botnet Paper Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.net/information-technology/491114-botnet-paper
(Botnet Paper Essay Example | Topics and Well Written Essays - 750 Words)
“Botnet Paper Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.net/information-technology/491114-botnet-paper.
This paper presents an overview of DoS attacks. This paper will discuss different types of DoS attacks. This paper will also outline the ways to deal with this threat. Denial of Service Attacks DoS attack (denial of service) can be defined as an event that prevents un-authorized access to the resources or make interruption in those operations that are critical with time factor.
The compromised zombie army is invaded by a Trojan, which is known as a remote application that installs itself within the system memory or kernel and provides data or connectivity to the hacker. Moreover, Trojan is operational by initiating an Internet Relay Chat (IRC) that waits for any action from the hacker who has full control over the botnet (Rapoza, 2008).
IS Security Name: Tutor: Course: Date: University: IS Security Introduction Security in both operating 1systems and applications is extremely crucial due to the increased threat of outside or inside attack. An exploit of the operating system or application allows hackers to access operating systems and steal data or worse still destroy the hardware or software.
The spectacular growth of internet and network system has lead to an increased awareness of, and keen interest in, various security issues that are affecting the entire virtual spectrum. Though most of the internet and networking protocols are designed with utmost security in mind, many other applications and programs have been designed or being planned to designed, with very little attention paid, towards the basic issues of privacy, confidentiality and security.
It is crucial to swiftly preserve digital evidence and conduct forensic analysis that any useful evidence is seized soon after the cybercrime has been committed. Furthermore, there are two phases of digital forensic analysis to retrieve useful evidence when facing a cybercrime attack in our scheme.
should clear off its rising inventories by introducing a new low-priced brand (that will be half the price) “Neptune Silver” in the market to entice maximum customers. Indeed, the major reason behind that new strategy was that Neptune Seafood’s inventories had risen to an
The author of the essay highlights that in the process, the editor in charge of revision may consider adding or deleting contents by word at least, phrase, sentence, or a number of paragraphs at most in which statement reconstruction is intended. So as to give the main concept a new shape and impression or another perspective of looking at it.
Therefore, manufacturers have come up with security systems that protect the operating system and application from attackers, but this system do not ensure 100 percent security guarantee. However, those produced for operating system are proving more effective than those
According to the author most viruses are normally attached to an executable file in which they cannot become activated unless a user runs the host program. A worm is much similar to a virus as it replicates in numerous copies. Worms have the ability to cause damage just as the viruses. A virus requires a host in which it can attach itself.
11 Pages(2750 words)Essay
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Essay on topic Botnet Paper for FREE!