• DocumentCode
    833097
  • Title

    A short visit to the bot zoo [malicious bots software]

  • Author

    Holz, Thorsten

  • Author_Institution
    Rheinisch-Westfalische Tech. Hochschule, Germany
  • Volume
    3
  • Issue
    3
  • fYear
    2005
  • Firstpage
    76
  • Lastpage
    79
  • Abstract
    The past year (2004-5) has seen, a new attack trend emerge: bots. After a successful compromise, the attacker installs a bot (also called a zombie or drone) on the system; this small program enables a remote control mechanism to then command the victim. Attackers use this technique repeatedly to form networks of compromised machines (botnets) to further enhance the effectiveness of their attacks. In recent years, malicious bots have become commonplace, with botnets in particular posing a severe threat to the Internet community. Attackers primarily use them for distributed denial-of-service (DDoS) attacks, mass identity theft, or sending spam.
  • Keywords
    Internet; invasive software; unsolicited e-mail; Internet community; botnets; distributed denial-of-service attacks; drone; malicious bots software; mass identity theft; remote control mechanism; spam; zombie; Computer crime; Computer security; Computer worms; Control systems; File servers; Multiuser detection; Peer to peer computing; Privacy; Protocols; Robots;
  • fLanguage
    English
  • Journal_Title
    Security & Privacy, IEEE
  • Publisher
    ieee
  • ISSN
    1540-7993
  • Type

    jour

  • DOI
    10.1109/MSP.2005.58
  • Filename
    1439508