SlideShare a Scribd company logo
2
Most read
10
Most read
16
Most read
AungThu Rha Hein (g5536871)
1
 What is a botnet?
 History of Botnet
 What are they used for?
 How do they work?
 Infection Procedure
 CommandTopologies
 Communication Methods
 Propagation Methods
 Defense
 Detection methods
 Defense Strategy
 Conclusion
2
 A botnet is a collection of internet-connected
programs communicating with other similar
programs in order to perform tasks.
 Wikipedia
 A collection of compromised computers that
is slowly built up then unleashed as a DDOS
attack or used to send very large quantities of
spam.
 WolframAlpha
3
 Bots originally used to automate tasks
 IRC,IM, MUDS, online-games
 Evolved into a way to automate malicious
attacks
 Spam, control a pc, propagate etc…
 Botnets started with DOS against servers
 Stacheldraht,Trinoo, Kelihos
4
 DOS attacks
 Spam
 Phishing
 Identity theft
 Click Fraud
 Others….
5
1. Botmaster infected victims with bot
botmaster victim
C&C server
6
2.bot connects to the C&C
server using HTTP,IRC or
other protocol
victim
C&C server
botmaster
7
3.Botmaster sends
commands
through C&C server to
zombie
botmaster victim
C&C server
8
4.Repeat these process and
botmaster have bot army to
Control from a single point
botmaster
Victims, zombies
C&C server
9
10
 Star
 Bots tied to centralized C&C server
 Multi-Server
 Same as Star but with multiple C&C server
 Hierarchical
 Parent bot control child bots
 Random
 Full P2P support
11
 HTTP
 Easy for attacker to blend in
 IRC
 Harder to hide compared with HTTP
 Custom
 Makes use of new application protocols
12
 E-Mail attachments; Social Engineering
 Trojan horses
 Drive-by downloads
 Scanning
 Horizontal: Single port
 Vertical :Single IP address
13
 Three Main Issues
 How to Detect them?
 How to Response them?
 How to Negate the threat?
14
 No single method
 “Defense in depth” principle
 Methods
 Network traffic analysis (NetFlow)
 Packet analysis(IDS)
 Analysis of application log files (Antivirus, firewall)
 Honeypots
 Others…
15
 DefenseAgainst infection by bot (DAIBB)
 Prevent from entering into the system
 Updates and patches, security levels
 Defense against attacks by bot (DAABB)
 Prevent from being victim of botnet attacks
 IPS,TLS, SSL
 Monitoring, detection & studying of Bot (MDSBB)
 Detection methods, monitoring log files
16
 Education of users (EOU)
 Raise the security awareness of users
 Legislative protection (LP)
 legislative-punishment policies
THANKYOU!
17

More Related Content

PPTX
Mobile security
PDF
BOTNET
PPTX
PPTX
Botnets
PPTX
Man in the middle attack .pptx
PPTX
PPTX
Cyber Security 03
PPTX
introduction to Botnet
Mobile security
BOTNET
Botnets
Man in the middle attack .pptx
Cyber Security 03
introduction to Botnet

What's hot (20)

PPT
Botnet Detection Techniques
PPTX
Les usages du Dark Web
PPTX
Cyber security
PPT
Ethical hacking
PPT
Ethical hacking a licence to hack
DOCX
Final report ethical hacking
PPTX
Botnet Detection in Online-social Network
PDF
Cyber attacks
PPTX
Cybersecurity Basics.pptx
PPTX
Cyber Security in Society
PPTX
Phishing ppt
PPTX
Ethical hacking
PDF
Ceh v5 module 04 enumeration
PPTX
Cross Site Request Forgery (CSRF) Scripting Explained
PPTX
Botnets In Cyber Security
DOCX
ethical hacking report
PPTX
Honeypots
PPTX
Cyber Law And Ethics
PPT
Browser Security
PPT
presentation on cyber crime and security
Botnet Detection Techniques
Les usages du Dark Web
Cyber security
Ethical hacking
Ethical hacking a licence to hack
Final report ethical hacking
Botnet Detection in Online-social Network
Cyber attacks
Cybersecurity Basics.pptx
Cyber Security in Society
Phishing ppt
Ethical hacking
Ceh v5 module 04 enumeration
Cross Site Request Forgery (CSRF) Scripting Explained
Botnets In Cyber Security
ethical hacking report
Honeypots
Cyber Law And Ethics
Browser Security
presentation on cyber crime and security
Ad

Similar to Botnets 101 (20)

PPT
botnet.ppt
PPT
PPT
Botnet
PPTX
PPTX
Mcs2453 aniq mc101053-assignment1
PDF
Botnetsand applications
PPT
Botnets
PPTX
Botnet communication patterns 2
PPTX
Bots and Botnet
PDF
New Botnets Trends and Threats (BH Europe 2007)
PPTX
Botnet-short form for "robot network".pptx
PPTX
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
PPTX
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
PPTX
unit cyber security BOTNETS Documents.pptx
PPTX
BOTLAB excersise
PDF
A taxonomy of botnet detection approaches
PPTX
Botnets presentation
PDF
A review botnet detection and suppression in clouds
PPTX
Botnet and its Detection Techniques
PPT
Defending Against Botnets
botnet.ppt
Botnet
Mcs2453 aniq mc101053-assignment1
Botnetsand applications
Botnets
Botnet communication patterns 2
Bots and Botnet
New Botnets Trends and Threats (BH Europe 2007)
Botnet-short form for "robot network".pptx
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
unit cyber security BOTNETS Documents.pptx
BOTLAB excersise
A taxonomy of botnet detection approaches
Botnets presentation
A review botnet detection and suppression in clouds
Botnet and its Detection Techniques
Defending Against Botnets
Ad

More from Aung Thu Rha Hein (19)

PPTX
Writing with ease
PDF
Bioinformatics for Computer Scientists
PPTX
Analysis of hybrid image with FFT (Fast Fourier Transform)
PPTX
Introduction to Common Weakness Enumeration (CWE)
PDF
Private Browsing: A Window of Forensic Opportunity
PDF
Network switching
PDF
Digital Forensic: Brief Intro & Research Challenge
PDF
Survey & Review of Digital Forensic
PPTX
Partitioned Based Regression Verification
PDF
CRAXweb: Automatic Exploit Generation for Web Applications
PPTX
Session initiation protocol
PPTX
TPC-H in MongoDB
PPTX
Web application security: Threats & Countermeasures
PPTX
Cloud computing security
PPTX
Can the elephants handle the no sql onslaught
PPTX
Fuzzy logic based students’ learning assessment
PPTX
Link state routing protocol
PPTX
Chat bot analysis
PDF
Data mining & column stores
Writing with ease
Bioinformatics for Computer Scientists
Analysis of hybrid image with FFT (Fast Fourier Transform)
Introduction to Common Weakness Enumeration (CWE)
Private Browsing: A Window of Forensic Opportunity
Network switching
Digital Forensic: Brief Intro & Research Challenge
Survey & Review of Digital Forensic
Partitioned Based Regression Verification
CRAXweb: Automatic Exploit Generation for Web Applications
Session initiation protocol
TPC-H in MongoDB
Web application security: Threats & Countermeasures
Cloud computing security
Can the elephants handle the no sql onslaught
Fuzzy logic based students’ learning assessment
Link state routing protocol
Chat bot analysis
Data mining & column stores

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
1. Introduction to Computer Programming.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Machine Learning_overview_presentation.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Encapsulation theory and applications.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Electronic commerce courselecture one. Pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Per capita expenditure prediction using model stacking based on satellite ima...
Big Data Technologies - Introduction.pptx
1. Introduction to Computer Programming.pptx
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Advanced methodologies resolving dimensionality complications for autism neur...
Machine Learning_overview_presentation.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Unlocking AI with Model Context Protocol (MCP)
Encapsulation theory and applications.pdf
Spectroscopy.pptx food analysis technology
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Empathic Computing: Creating Shared Understanding
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
NewMind AI Weekly Chronicles - August'25-Week II
Encapsulation_ Review paper, used for researhc scholars
Electronic commerce courselecture one. Pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing

Botnets 101

  • 1. AungThu Rha Hein (g5536871) 1
  • 2.  What is a botnet?  History of Botnet  What are they used for?  How do they work?  Infection Procedure  CommandTopologies  Communication Methods  Propagation Methods  Defense  Detection methods  Defense Strategy  Conclusion 2
  • 3.  A botnet is a collection of internet-connected programs communicating with other similar programs in order to perform tasks.  Wikipedia  A collection of compromised computers that is slowly built up then unleashed as a DDOS attack or used to send very large quantities of spam.  WolframAlpha 3
  • 4.  Bots originally used to automate tasks  IRC,IM, MUDS, online-games  Evolved into a way to automate malicious attacks  Spam, control a pc, propagate etc…  Botnets started with DOS against servers  Stacheldraht,Trinoo, Kelihos 4
  • 5.  DOS attacks  Spam  Phishing  Identity theft  Click Fraud  Others…. 5
  • 6. 1. Botmaster infected victims with bot botmaster victim C&C server 6
  • 7. 2.bot connects to the C&C server using HTTP,IRC or other protocol victim C&C server botmaster 7
  • 8. 3.Botmaster sends commands through C&C server to zombie botmaster victim C&C server 8
  • 9. 4.Repeat these process and botmaster have bot army to Control from a single point botmaster Victims, zombies C&C server 9
  • 10. 10
  • 11.  Star  Bots tied to centralized C&C server  Multi-Server  Same as Star but with multiple C&C server  Hierarchical  Parent bot control child bots  Random  Full P2P support 11
  • 12.  HTTP  Easy for attacker to blend in  IRC  Harder to hide compared with HTTP  Custom  Makes use of new application protocols 12
  • 13.  E-Mail attachments; Social Engineering  Trojan horses  Drive-by downloads  Scanning  Horizontal: Single port  Vertical :Single IP address 13
  • 14.  Three Main Issues  How to Detect them?  How to Response them?  How to Negate the threat? 14
  • 15.  No single method  “Defense in depth” principle  Methods  Network traffic analysis (NetFlow)  Packet analysis(IDS)  Analysis of application log files (Antivirus, firewall)  Honeypots  Others… 15
  • 16.  DefenseAgainst infection by bot (DAIBB)  Prevent from entering into the system  Updates and patches, security levels  Defense against attacks by bot (DAABB)  Prevent from being victim of botnet attacks  IPS,TLS, SSL  Monitoring, detection & studying of Bot (MDSBB)  Detection methods, monitoring log files 16
  • 17.  Education of users (EOU)  Raise the security awareness of users  Legislative protection (LP)  legislative-punishment policies THANKYOU! 17