Professional Documents
Culture Documents
By Apurba Dhungana
Outline
- Introduction
- History
- LifeCycle
- Security Threat
- Prevention Techniques
- Detection Techniques
- Conclusion
Botnets
-It is collection of compromised system/computers
That is taken by malicious software.
2) Infection Phase
4) Attack Phase
Botnet Lifecycle
- Spamming
- Click Fraud
- Identity Theft
Prevention Technique
- High level of awareness about on line security and
privacy.
- Use of Honeypot.
- Initialization Phase
- Dormant Phase
Initialization Phase
- Attack Sub-Phase
- Worms try to take control of the identified
host.
- Successful attack will lead to intializatiton
phase in target machine.
- Dormant Phase
- Data Damage