SlideShare a Scribd company logo
A STUDY ON BOTNET
ARCHITECTURE
Seminar Guide,
SHIBU V.S
Asst.Professor

By,

BINI B.S
M1,CSE

1
Overview
Introduction
How Botnet Works
Botnet Life Cycle

Botnet Architecture
Centralized Botnet Architecture.
Peer to Peer Botnet Architecture (P2P).

Hybrid Botnet Architecture.
Hyper Text Transfer Protocol with Peer to Peer (HttP2P)
Botnet Architecture.

Self-healing system Architecture.
Conclusion
References

2
Introduction
 BOTNET or Robot Network is the biggest network security
threats faced by home users, organizations, and governments.
 A “BOTNET” is a network of compromised computers (“bots”)
connected to the Internet that is controlled by a remote
attacker (“botmaster”).
 Created by intelligent and up to date hackers.
3
4
Botnet Life Cycle
• Once botnet infects a computer, A bot usually
steals something such as personal information,
Authentication credentials or Credit card data.
• The machine then becomes part of the botnet,
ready to perform designated malicious tasks.
• Common functions in most botnets include
DDoS attacks, Click fraud ,spam, phishing etc.

5
6

Botnet Life Cycle
Botnet Architecture
 Different types of BOTNET architectures:

i.
ii.
iii.
iv.

Centralized Botnet Architecture.
Peer to Peer Botnet Architecture (P2P).
Hybrid Botnet Architecture
Hyper Text Transfer Protocol with Peer
to Peer Botnet Architecture.
7
I. Centralized Botnet Architecture
• Oldest and easiest architecture to manage and
control botnets.
• All the zombie computers is being supervised
from a center point, which makes them easy to
manage.
• The disadvantage : Entire botnet can be
shutdown if the defender captures the C&C
server.
• Examples: AgoBot, SDBot, SpyBot, GTBot etc.

8
9
II.Peer to Peer Botnet Architecture
• Used to remove the drawbacks of centralized
architecture.
• P2P based n/w is much harder to shutdown.
• In this architecture a node can act as a client(soldier
bot) as well as a server(supervisor bot) and there is
no centralized point as C&C server.
• Examples : Phatbot and Peacomm.

10
11
III. Hybrid Botnet Architecture
• It is harder to be shut down, monitored, and hijacked.
• A botmaster could easily monitor the entire botnet by
issuing a report command , and make it harder from
detecting bots.

12
13
IV. Hyper Text Transfer Protocol with Peer to Peer:
• The Supervisor-Bot cipher the message.
• It continuously search for Soldier-Bot, and when
found deliver message to it.
• While the Soldier-Bot does not contact
dynamically to Supervisor-Bot rather it waits for
a call from its supervisor.
14
Self healing System Architecture
• Concept is inspired by the way organisms adapt
to their environment by developing immunity
against harmful viruses, bacteria and toxins.
• It is based on a study of two HTTP-based
botnets, Zeus and Black energy, and two P2P
botnets , Waledac and Storm.

15
Self healing System Architecture (cont..)
• It enables networked systems to look
continuously for any alteration of “normal
behavior” and apply appropriate corrective
actions.
• It can recognize when it is not operating
correctly and, with little or no human
intervention occurs.
16
V. Self healing System Architecture
(cont..)
• It is optimized for a domain controlled network
that connects to a large geographic region.
• Application is mainly in Defense-in-depth security
solution for domain-controlled enterprise
networks.
17
18

Self-healing System Architecture
Conclusion
• Botnets have a direct influence on the number of
cybercrimes committed. We have to be well
prepared for future botnets. It is an ongoing war
between botnet attacks and defenses.

19
Reference
• [1] Ihsan Ullah, Naveed Khan, Hatim A.Aboalsamh,“ SURVEY
ON BOTNET: ITS ARCHITECTURE, DETECTION, PREVENTION
AND MITIGATION”, 978-1-4673-5200-0/13/$31.00 ©2013 IEEE.
• [2]Bhagath Singh Jayaprakasam,” MODELING BOTNET IN PEER
TO PEER SYSTEMSPRESENTED” Apr 28, 2011.
• [3] Adeeb Alhomoud and Irfan Awan ,Jules Ferdinand Pagna
Disso, Muhammad Younas,“A Next- Generation Approach to
Combating Botnets” 0018-9162/13/$31.00 © 2013 IEEE.

20
21

More Related Content

PPT
Botnet Detection Techniques
PPT
Botnet
PDF
A review botnet detection and suppression in clouds
PDF
A Survey of Botnet Detection Techniques
PPT
BotNet Attacks
PPTX
Botnet Detection in Online-social Network
PPTX
PPTX
Botnet Detection Techniques
Botnet
A review botnet detection and suppression in clouds
A Survey of Botnet Detection Techniques
BotNet Attacks
Botnet Detection in Online-social Network

What's hot (20)

PDF
BOTNET
PPTX
Botnet Architecture
PPTX
Botnets 101
PDF
What is botnet?
PPTX
introduction to Botnet
PDF
about botnets
PPTX
Botnets presentation
PPT
Botnets
PDF
Global Botnet Detector
PDF
A Brief Incursion into Botnet Detection
PPTX
Botnet
PPTX
Botnets
PPTX
Botnets In Cyber Security
PPTX
PPTX
Bots and Botnet
PPTX
Mcs2453 aniq mc101053-assignment1
DOCX
All you know about Botnet
PDF
A Dynamic Botnet Detection Model based on Behavior Analysis
PPTX
Study on Botnet Architecture
PDF
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
BOTNET
Botnet Architecture
Botnets 101
What is botnet?
introduction to Botnet
about botnets
Botnets presentation
Botnets
Global Botnet Detector
A Brief Incursion into Botnet Detection
Botnet
Botnets
Botnets In Cyber Security
Bots and Botnet
Mcs2453 aniq mc101053-assignment1
All you know about Botnet
A Dynamic Botnet Detection Model based on Behavior Analysis
Study on Botnet Architecture
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Ad

Viewers also liked (20)

PPT
evocative architecture_final
PPTX
Questions to ask your hearing specialist
PPT
Preparing the interviews 2
PDF
Social - Andreas Grasmo Johansen - Skill AS
PPTX
WHERE IS SINDH....A PETITION TO HON. PRIME MINISTER NARENDRA MODI
PPTX
как работать с тестами. инструкция для ученика
PPTX
CTR GUYS
PPTX
Questions that we are afraid to ask...
PPT
4.zitoplasma.organuluak.
PPTX
8 Reasons Hearing Loss is More Dangerous Than You Think
PPTX
Michelle
PPTX
Spotter 1
PPTX
Brazil
PPTX
Phonics ideas
PDF
Sand and Stone
PDF
Apostila anvisa01
PPTX
Educational technology and innovation report
PDF
Anp 1999
PDF
6 Ways Your Brain Transforms Sound into Emotion
evocative architecture_final
Questions to ask your hearing specialist
Preparing the interviews 2
Social - Andreas Grasmo Johansen - Skill AS
WHERE IS SINDH....A PETITION TO HON. PRIME MINISTER NARENDRA MODI
как работать с тестами. инструкция для ученика
CTR GUYS
Questions that we are afraid to ask...
4.zitoplasma.organuluak.
8 Reasons Hearing Loss is More Dangerous Than You Think
Michelle
Spotter 1
Brazil
Phonics ideas
Sand and Stone
Apostila anvisa01
Educational technology and innovation report
Anp 1999
6 Ways Your Brain Transforms Sound into Emotion
Ad

Similar to Study on Botnet Architecture (20)

PDF
Detection of Botnets using Honeypots and P2P Botnets
PDF
Understanding the Botnet Phenomenon
DOC
Botnets And Alife
PDF
How To Protect Your Website From Bot Attacks
PPTX
Detecting and Confronting Flash Attacks from IoT Botnets
PDF
Detecting HTTP Botnet using Artificial Immune System (AIS)
PDF
New Botnets Trends and Threats (BH Europe 2007)
PPTX
unit cyber security BOTNETS Documents.pptx
PPTX
paper review about botnet
PPTX
BOTLAB excersise
PDF
IoT Honeypots: State of the Art
PDF
Untitled document.pdf
PDF
Botnet Attacks How They Work and How to Defend Against Them.pdf
PDF
Tracing Back The Botmaster
PPT
Fight fire with fire draft
PPTX
Botnet and its Detection Techniques
PDF
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
PDF
Botnet detection by Imitation method
PDF
Bot net detection by using ssl encryption
PPTX
Cyber Security Terms
Detection of Botnets using Honeypots and P2P Botnets
Understanding the Botnet Phenomenon
Botnets And Alife
How To Protect Your Website From Bot Attacks
Detecting and Confronting Flash Attacks from IoT Botnets
Detecting HTTP Botnet using Artificial Immune System (AIS)
New Botnets Trends and Threats (BH Europe 2007)
unit cyber security BOTNETS Documents.pptx
paper review about botnet
BOTLAB excersise
IoT Honeypots: State of the Art
Untitled document.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdf
Tracing Back The Botmaster
Fight fire with fire draft
Botnet and its Detection Techniques
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
Botnet detection by Imitation method
Bot net detection by using ssl encryption
Cyber Security Terms

Recently uploaded (20)

PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Cell Structure & Organelles in detailed.
PDF
Computing-Curriculum for Schools in Ghana
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Insiders guide to clinical Medicine.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
PPH.pptx obstetrics and gynecology in nursing
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Renaissance Architecture: A Journey from Faith to Humanism
Cell Structure & Organelles in detailed.
Computing-Curriculum for Schools in Ghana
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Microbial disease of the cardiovascular and lymphatic systems
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Anesthesia in Laparoscopic Surgery in India
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Pharma ospi slides which help in ospi learning
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Insiders guide to clinical Medicine.pdf
GDM (1) (1).pptx small presentation for students
PPH.pptx obstetrics and gynecology in nursing

Study on Botnet Architecture

  • 1. A STUDY ON BOTNET ARCHITECTURE Seminar Guide, SHIBU V.S Asst.Professor By, BINI B.S M1,CSE 1
  • 2. Overview Introduction How Botnet Works Botnet Life Cycle Botnet Architecture Centralized Botnet Architecture. Peer to Peer Botnet Architecture (P2P). Hybrid Botnet Architecture. Hyper Text Transfer Protocol with Peer to Peer (HttP2P) Botnet Architecture. Self-healing system Architecture. Conclusion References 2
  • 3. Introduction  BOTNET or Robot Network is the biggest network security threats faced by home users, organizations, and governments.  A “BOTNET” is a network of compromised computers (“bots”) connected to the Internet that is controlled by a remote attacker (“botmaster”).  Created by intelligent and up to date hackers. 3
  • 4. 4
  • 5. Botnet Life Cycle • Once botnet infects a computer, A bot usually steals something such as personal information, Authentication credentials or Credit card data. • The machine then becomes part of the botnet, ready to perform designated malicious tasks. • Common functions in most botnets include DDoS attacks, Click fraud ,spam, phishing etc. 5
  • 7. Botnet Architecture  Different types of BOTNET architectures: i. ii. iii. iv. Centralized Botnet Architecture. Peer to Peer Botnet Architecture (P2P). Hybrid Botnet Architecture Hyper Text Transfer Protocol with Peer to Peer Botnet Architecture. 7
  • 8. I. Centralized Botnet Architecture • Oldest and easiest architecture to manage and control botnets. • All the zombie computers is being supervised from a center point, which makes them easy to manage. • The disadvantage : Entire botnet can be shutdown if the defender captures the C&C server. • Examples: AgoBot, SDBot, SpyBot, GTBot etc. 8
  • 9. 9
  • 10. II.Peer to Peer Botnet Architecture • Used to remove the drawbacks of centralized architecture. • P2P based n/w is much harder to shutdown. • In this architecture a node can act as a client(soldier bot) as well as a server(supervisor bot) and there is no centralized point as C&C server. • Examples : Phatbot and Peacomm. 10
  • 11. 11
  • 12. III. Hybrid Botnet Architecture • It is harder to be shut down, monitored, and hijacked. • A botmaster could easily monitor the entire botnet by issuing a report command , and make it harder from detecting bots. 12
  • 13. 13
  • 14. IV. Hyper Text Transfer Protocol with Peer to Peer: • The Supervisor-Bot cipher the message. • It continuously search for Soldier-Bot, and when found deliver message to it. • While the Soldier-Bot does not contact dynamically to Supervisor-Bot rather it waits for a call from its supervisor. 14
  • 15. Self healing System Architecture • Concept is inspired by the way organisms adapt to their environment by developing immunity against harmful viruses, bacteria and toxins. • It is based on a study of two HTTP-based botnets, Zeus and Black energy, and two P2P botnets , Waledac and Storm. 15
  • 16. Self healing System Architecture (cont..) • It enables networked systems to look continuously for any alteration of “normal behavior” and apply appropriate corrective actions. • It can recognize when it is not operating correctly and, with little or no human intervention occurs. 16
  • 17. V. Self healing System Architecture (cont..) • It is optimized for a domain controlled network that connects to a large geographic region. • Application is mainly in Defense-in-depth security solution for domain-controlled enterprise networks. 17
  • 19. Conclusion • Botnets have a direct influence on the number of cybercrimes committed. We have to be well prepared for future botnets. It is an ongoing war between botnet attacks and defenses. 19
  • 20. Reference • [1] Ihsan Ullah, Naveed Khan, Hatim A.Aboalsamh,“ SURVEY ON BOTNET: ITS ARCHITECTURE, DETECTION, PREVENTION AND MITIGATION”, 978-1-4673-5200-0/13/$31.00 ©2013 IEEE. • [2]Bhagath Singh Jayaprakasam,” MODELING BOTNET IN PEER TO PEER SYSTEMSPRESENTED” Apr 28, 2011. • [3] Adeeb Alhomoud and Irfan Awan ,Jules Ferdinand Pagna Disso, Muhammad Younas,“A Next- Generation Approach to Combating Botnets” 0018-9162/13/$31.00 © 2013 IEEE. 20
  • 21. 21