You are on page 1of 2

CONTENTS

CH NO. NAME OF TOPIC

PAGE

CERTIFICATE ii
ACKNOWLEDGEMENT . Iii
ABSTRACT iv
CONTENTS .. . v
LIST OF FIGURES . .. vii

INTRODUCTION. .. 1-2
1.1

INTERNET .. .1

1.2

BOTNET ...1

BOTNETS:TYPES... 3-6
.. .. ... 3

2.1

KRAKEN BOTNET

2.2

STORM BOTNET.4

2.3

SRIZBI BOTNET......5

HOW BOTNETS WORKS?.. 7-9


3.1

VULNERABLE SYSTEM. .. .. ... 7

3.2

INFECTING THE SYSTEM.8

3.3

AUTHENTICATION OF IRC.......8

3.4

COMMAND AND CONTROL.....9

IRC SERVER.. 10-11


4.1

WHAT IS AN IRC... .... ..10

4.2

IRC BASED C&C11

4.3

IRC BASED BOTNET DETECTION........11

ILL EFFECTS OF BOTNETS.. 12-14


5.1

FINANCIAL USE... .... 12

5.2

DDOS....12

5.3

DDOS EXTORTION.............13

5.4

PHISHING..13

5.5

CLICK FRAUD14

BATTLING BOTNETS..15-18
6.1

SECURITY AGAINST BOTNETS. .. ...15

6.2

AVAILABILITY VIA DNS.15

6.3

AUTHENTICATION.................16

6.4

MODIFYING COMMAND LANG.......16

6.5

SSL...17

6.6

FOLLOW THE MONEY TRAIL..17

FUTURE OF BOTNETS .....19-20


7.1

BOTNETS OF TOMORROW.. ........ .19

7.2

COMMAND AND CONTROL........19

7.2.1

CENTRALIZED.....19

7.2.2

P2P.....20

7.2.3

RANDOM.20

CONCLUSION....21-22
8.1

BOTNET A GLOBAL PROBLEM.... .. 21

8.2

INFORMATION:NEED OF HOUR..22

REFERENCES..23

vi

You might also like