BOTNET
BOTNET
A bot is a piece of malware that infects a computer to carry out commands under
the remote control of the attacker.
BOTNET:
A botnet (short for “robot network”) is a network of computers infected by
malware that are under the control of a single attacking party, known as the “bot-
herder.” Each individual machine under the control of the bot-herder is known as a
bot. From one central point, the attacking party can command every computer on
its botnet to simultaneously carry out a coordinated criminal action. The scale of a
botnet (many comprised of millions of bots) enable the attacker to perform large-
scale actions that were previously impossible with malware. Since botnets remain
under control of a remote attacker, infected machines can receive updates and
change their behavior on the fly.
Botnets are created when the bot-herder sends the bot from his command and
control servers to an unknowing recipient using file sharing, email, or social media
application protocols or other bots as an intermediary. Once the recipient opens the
malicious file on his computer, the bot reports back to command and control where
the bot-herder can dictate commands to infected computers.
A number of unique functional traits of bots and botnets make them well suited for
long-term intrusions. Bots can be updated by the bot-herder to change their entire
functionality based on what he/she would like for them to do and to adapt to
changes and countermeasures by the target system. Bots can also utilize other
infected computers on the botnet as communication channels, providing the bot-
herder a near infinite number of communication paths to adapt to changing options
and deliver updates. This highlights that infection is the most important step,
because functionality and communication methods can always be changed later on
as needed.
In the client-server botnet structure, a basic network is established with one server
acting as a botmaster. The botmaster controls the transmission of information from
each client to establish command and control (C&C) of the client devices. The
client-server model works with the help of special software and allows the
botmaster to maintain control. This model has a few drawbacks such as it can be
located easily and has only one control point. In this model, if the server is
destroyed, the botnet perishes.
Peer-to-peer
To overcome the drawback of relying on one centralized server, botnets have
evolved. New botnets are interconnected in the form of peer-to-peer structure. In
the P2P botnet model, each connected device works independently as a client and a
server, coordinating among each other to update and transmit information between
them. The P2P botnet structure is stronger because of the absence of a single
centralized control.
From a high level, a DDoS attack is like an unexpected traffic jam clogging up the
highway, preventing regular traffic from arriving at its destination.