SlideShare ist ein Scribd-Unternehmen logo
1 von 21
A STUDY ON BOTNET
ARCHITECTURE
Seminar Guide,
SHIBU V.S
Asst.Professor

By,

BINI B.S
M1,CSE

1
Overview
Introduction
How Botnet Works
Botnet Life Cycle

Botnet Architecture
Centralized Botnet Architecture.
Peer to Peer Botnet Architecture (P2P).

Hybrid Botnet Architecture.
Hyper Text Transfer Protocol with Peer to Peer (HttP2P)
Botnet Architecture.

Self-healing system Architecture.
Conclusion
References

2
Introduction
 BOTNET or Robot Network is the biggest network security
threats faced by home users, organizations, and governments.
 A “BOTNET” is a network of compromised computers (“bots”)
connected to the Internet that is controlled by a remote
attacker (“botmaster”).
 Created by intelligent and up to date hackers.
3
4
Botnet Life Cycle
• Once botnet infects a computer, A bot usually
steals something such as personal information,
Authentication credentials or Credit card data.
• The machine then becomes part of the botnet,
ready to perform designated malicious tasks.
• Common functions in most botnets include
DDoS attacks, Click fraud ,spam, phishing etc.

5
6

Botnet Life Cycle
Botnet Architecture
 Different types of BOTNET architectures:

i.
ii.
iii.
iv.

Centralized Botnet Architecture.
Peer to Peer Botnet Architecture (P2P).
Hybrid Botnet Architecture
Hyper Text Transfer Protocol with Peer
to Peer Botnet Architecture.
7
I. Centralized Botnet Architecture
• Oldest and easiest architecture to manage and
control botnets.
• All the zombie computers is being supervised
from a center point, which makes them easy to
manage.
• The disadvantage : Entire botnet can be
shutdown if the defender captures the C&C
server.
• Examples: AgoBot, SDBot, SpyBot, GTBot etc.

8
9
II.Peer to Peer Botnet Architecture
• Used to remove the drawbacks of centralized
architecture.
• P2P based n/w is much harder to shutdown.
• In this architecture a node can act as a client(soldier
bot) as well as a server(supervisor bot) and there is
no centralized point as C&C server.
• Examples : Phatbot and Peacomm.

10
11
III. Hybrid Botnet Architecture
• It is harder to be shut down, monitored, and hijacked.
• A botmaster could easily monitor the entire botnet by
issuing a report command , and make it harder from
detecting bots.

12
13
IV. Hyper Text Transfer Protocol with Peer to Peer:
• The Supervisor-Bot cipher the message.
• It continuously search for Soldier-Bot, and when
found deliver message to it.
• While the Soldier-Bot does not contact
dynamically to Supervisor-Bot rather it waits for
a call from its supervisor.
14
Self healing System Architecture
• Concept is inspired by the way organisms adapt
to their environment by developing immunity
against harmful viruses, bacteria and toxins.
• It is based on a study of two HTTP-based
botnets, Zeus and Black energy, and two P2P
botnets , Waledac and Storm.

15
Self healing System Architecture (cont..)
• It enables networked systems to look
continuously for any alteration of “normal
behavior” and apply appropriate corrective
actions.
• It can recognize when it is not operating
correctly and, with little or no human
intervention occurs.
16
V. Self healing System Architecture
(cont..)
• It is optimized for a domain controlled network
that connects to a large geographic region.
• Application is mainly in Defense-in-depth security
solution for domain-controlled enterprise
networks.
17
18

Self-healing System Architecture
Conclusion
• Botnets have a direct influence on the number of
cybercrimes committed. We have to be well
prepared for future botnets. It is an ongoing war
between botnet attacks and defenses.

19
Reference
• [1] Ihsan Ullah, Naveed Khan, Hatim A.Aboalsamh,“ SURVEY
ON BOTNET: ITS ARCHITECTURE, DETECTION, PREVENTION
AND MITIGATION”, 978-1-4673-5200-0/13/$31.00 ©2013 IEEE.
• [2]Bhagath Singh Jayaprakasam,” MODELING BOTNET IN PEER
TO PEER SYSTEMSPRESENTED” Apr 28, 2011.
• [3] Adeeb Alhomoud and Irfan Awan ,Jules Ferdinand Pagna
Disso, Muhammad Younas,“A Next- Generation Approach to
Combating Botnets” 0018-9162/13/$31.00 © 2013 IEEE.

20
21

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

BOTNET
BOTNETBOTNET
BOTNET
 
Botnet Architecture
Botnet ArchitectureBotnet Architecture
Botnet Architecture
 
Botnets 101
Botnets 101Botnets 101
Botnets 101
 
What is botnet?
What is botnet?What is botnet?
What is botnet?
 
introduction to Botnet
introduction to Botnetintroduction to Botnet
introduction to Botnet
 
about botnets
about botnetsabout botnets
about botnets
 
Botnets presentation
Botnets presentationBotnets presentation
Botnets presentation
 
Botnets
BotnetsBotnets
Botnets
 
Global Botnet Detector
Global Botnet DetectorGlobal Botnet Detector
Global Botnet Detector
 
A Brief Incursion into Botnet Detection
A Brief Incursion into Botnet DetectionA Brief Incursion into Botnet Detection
A Brief Incursion into Botnet Detection
 
Botnet
BotnetBotnet
Botnet
 
Botnets
BotnetsBotnets
Botnets
 
Botnets In Cyber Security
Botnets In Cyber SecurityBotnets In Cyber Security
Botnets In Cyber Security
 
Botnet
BotnetBotnet
Botnet
 
Bots and Botnet
Bots and BotnetBots and Botnet
Bots and Botnet
 
Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1
 
All you know about Botnet
All you know about BotnetAll you know about Botnet
All you know about Botnet
 
A Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior AnalysisA Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior Analysis
 
Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet Architecture
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
 

Andere mochten auch

как работать с тестами. инструкция для ученика
как работать с тестами. инструкция для ученикакак работать с тестами. инструкция для ученика
как работать с тестами. инструкция для ученика
ukraina07
 
Sand and Stone
Sand and StoneSand and Stone
Sand and Stone
TezLaguna
 

Andere mochten auch (20)

evocative architecture_final
evocative architecture_finalevocative architecture_final
evocative architecture_final
 
Questions to ask your hearing specialist
Questions to ask your hearing specialistQuestions to ask your hearing specialist
Questions to ask your hearing specialist
 
Preparing the interviews 2
Preparing the interviews 2Preparing the interviews 2
Preparing the interviews 2
 
Social - Andreas Grasmo Johansen - Skill AS
Social - Andreas Grasmo Johansen - Skill ASSocial - Andreas Grasmo Johansen - Skill AS
Social - Andreas Grasmo Johansen - Skill AS
 
WHERE IS SINDH....A PETITION TO HON. PRIME MINISTER NARENDRA MODI
WHERE IS SINDH....A PETITION TO HON. PRIME MINISTER NARENDRA MODIWHERE IS SINDH....A PETITION TO HON. PRIME MINISTER NARENDRA MODI
WHERE IS SINDH....A PETITION TO HON. PRIME MINISTER NARENDRA MODI
 
как работать с тестами. инструкция для ученика
как работать с тестами. инструкция для ученикакак работать с тестами. инструкция для ученика
как работать с тестами. инструкция для ученика
 
CTR GUYS
CTR GUYSCTR GUYS
CTR GUYS
 
Questions that we are afraid to ask...
Questions that we are afraid to ask... Questions that we are afraid to ask...
Questions that we are afraid to ask...
 
4.zitoplasma.organuluak.
4.zitoplasma.organuluak.4.zitoplasma.organuluak.
4.zitoplasma.organuluak.
 
8 Reasons Hearing Loss is More Dangerous Than You Think
8 Reasons Hearing Loss is More Dangerous Than You Think8 Reasons Hearing Loss is More Dangerous Than You Think
8 Reasons Hearing Loss is More Dangerous Than You Think
 
Michelle
MichelleMichelle
Michelle
 
Spotter 1
Spotter 1Spotter 1
Spotter 1
 
Skill
SkillSkill
Skill
 
Brazil
BrazilBrazil
Brazil
 
Phonics ideas
Phonics ideasPhonics ideas
Phonics ideas
 
Sand and Stone
Sand and StoneSand and Stone
Sand and Stone
 
Apostila anvisa01
Apostila anvisa01Apostila anvisa01
Apostila anvisa01
 
Educational technology and innovation report
Educational technology and innovation reportEducational technology and innovation report
Educational technology and innovation report
 
Anp 1999
Anp 1999Anp 1999
Anp 1999
 
6 Ways Your Brain Transforms Sound into Emotion
6 Ways Your Brain Transforms Sound into Emotion6 Ways Your Brain Transforms Sound into Emotion
6 Ways Your Brain Transforms Sound into Emotion
 

Ähnlich wie Study on Botnet Architecture

Botnets And Alife
Botnets And AlifeBotnets And Alife
Botnets And Alife
Zotronix
 
Untitled document.pdf
Untitled document.pdfUntitled document.pdf
Untitled document.pdf
google
 
Botnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdfBotnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdf
uzair
 

Ähnlich wie Study on Botnet Architecture (20)

Detection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P BotnetsDetection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P Botnets
 
Understanding the Botnet Phenomenon
Understanding the Botnet PhenomenonUnderstanding the Botnet Phenomenon
Understanding the Botnet Phenomenon
 
Botnets And Alife
Botnets And AlifeBotnets And Alife
Botnets And Alife
 
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
 
Detecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT BotnetsDetecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT Botnets
 
Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)
 
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)
 
paper review about botnet
paper review about botnetpaper review about botnet
paper review about botnet
 
BOTLAB excersise
BOTLAB excersiseBOTLAB excersise
BOTLAB excersise
 
IoT Honeypots: State of the Art
IoT Honeypots: State of the ArtIoT Honeypots: State of the Art
IoT Honeypots: State of the Art
 
Untitled document.pdf
Untitled document.pdfUntitled document.pdf
Untitled document.pdf
 
Botnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdfBotnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdf
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The Botmaster
 
Fight fire with fire draft
Fight fire with fire draftFight fire with fire draft
Fight fire with fire draft
 
Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques
 
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
[2010 CodeEngn Conference 04] Max - Fighting against Botnet[2010 CodeEngn Conference 04] Max - Fighting against Botnet
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
 
Botnet detection by Imitation method
Botnet detection  by Imitation methodBotnet detection  by Imitation method
Botnet detection by Imitation method
 
Bot net detection by using ssl encryption
Bot net detection by using ssl encryptionBot net detection by using ssl encryption
Bot net detection by using ssl encryption
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”
 

Kürzlich hochgeladen

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Kürzlich hochgeladen (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

Study on Botnet Architecture

  • 1. A STUDY ON BOTNET ARCHITECTURE Seminar Guide, SHIBU V.S Asst.Professor By, BINI B.S M1,CSE 1
  • 2. Overview Introduction How Botnet Works Botnet Life Cycle Botnet Architecture Centralized Botnet Architecture. Peer to Peer Botnet Architecture (P2P). Hybrid Botnet Architecture. Hyper Text Transfer Protocol with Peer to Peer (HttP2P) Botnet Architecture. Self-healing system Architecture. Conclusion References 2
  • 3. Introduction  BOTNET or Robot Network is the biggest network security threats faced by home users, organizations, and governments.  A “BOTNET” is a network of compromised computers (“bots”) connected to the Internet that is controlled by a remote attacker (“botmaster”).  Created by intelligent and up to date hackers. 3
  • 4. 4
  • 5. Botnet Life Cycle • Once botnet infects a computer, A bot usually steals something such as personal information, Authentication credentials or Credit card data. • The machine then becomes part of the botnet, ready to perform designated malicious tasks. • Common functions in most botnets include DDoS attacks, Click fraud ,spam, phishing etc. 5
  • 7. Botnet Architecture  Different types of BOTNET architectures: i. ii. iii. iv. Centralized Botnet Architecture. Peer to Peer Botnet Architecture (P2P). Hybrid Botnet Architecture Hyper Text Transfer Protocol with Peer to Peer Botnet Architecture. 7
  • 8. I. Centralized Botnet Architecture • Oldest and easiest architecture to manage and control botnets. • All the zombie computers is being supervised from a center point, which makes them easy to manage. • The disadvantage : Entire botnet can be shutdown if the defender captures the C&C server. • Examples: AgoBot, SDBot, SpyBot, GTBot etc. 8
  • 9. 9
  • 10. II.Peer to Peer Botnet Architecture • Used to remove the drawbacks of centralized architecture. • P2P based n/w is much harder to shutdown. • In this architecture a node can act as a client(soldier bot) as well as a server(supervisor bot) and there is no centralized point as C&C server. • Examples : Phatbot and Peacomm. 10
  • 11. 11
  • 12. III. Hybrid Botnet Architecture • It is harder to be shut down, monitored, and hijacked. • A botmaster could easily monitor the entire botnet by issuing a report command , and make it harder from detecting bots. 12
  • 13. 13
  • 14. IV. Hyper Text Transfer Protocol with Peer to Peer: • The Supervisor-Bot cipher the message. • It continuously search for Soldier-Bot, and when found deliver message to it. • While the Soldier-Bot does not contact dynamically to Supervisor-Bot rather it waits for a call from its supervisor. 14
  • 15. Self healing System Architecture • Concept is inspired by the way organisms adapt to their environment by developing immunity against harmful viruses, bacteria and toxins. • It is based on a study of two HTTP-based botnets, Zeus and Black energy, and two P2P botnets , Waledac and Storm. 15
  • 16. Self healing System Architecture (cont..) • It enables networked systems to look continuously for any alteration of “normal behavior” and apply appropriate corrective actions. • It can recognize when it is not operating correctly and, with little or no human intervention occurs. 16
  • 17. V. Self healing System Architecture (cont..) • It is optimized for a domain controlled network that connects to a large geographic region. • Application is mainly in Defense-in-depth security solution for domain-controlled enterprise networks. 17
  • 19. Conclusion • Botnets have a direct influence on the number of cybercrimes committed. We have to be well prepared for future botnets. It is an ongoing war between botnet attacks and defenses. 19
  • 20. Reference • [1] Ihsan Ullah, Naveed Khan, Hatim A.Aboalsamh,“ SURVEY ON BOTNET: ITS ARCHITECTURE, DETECTION, PREVENTION AND MITIGATION”, 978-1-4673-5200-0/13/$31.00 ©2013 IEEE. • [2]Bhagath Singh Jayaprakasam,” MODELING BOTNET IN PEER TO PEER SYSTEMSPRESENTED” Apr 28, 2011. • [3] Adeeb Alhomoud and Irfan Awan ,Jules Ferdinand Pagna Disso, Muhammad Younas,“A Next- Generation Approach to Combating Botnets” 0018-9162/13/$31.00 © 2013 IEEE. 20
  • 21. 21