Paper
9 April 2007 Bot armies as threats to network security
Sheila B. Banks, Martin R. Stytz
Author Affiliations +
Abstract
"Botnets", or "bot armies", are large groups of remotely controlled malicious software. Bot armies pose one of the most serious security threats to all networks. Botnets, remotely controlled and operated by botmasters or botherders, can launch massive denial of service attacks, multiple penetration attacks, or any other malicious network activity on a massive scale. While bot army activity has, in the past, been limited to fraud, blackmail, and other forms of criminal activity, their potential for causing large-scale damage to the entire internet; for launching large-scale, coordinated attacks on government computers and networks; and for large-scale, coordinated data gathering from thousands of users and computers on any network has been underestimated. This paper will not discuss how to build bots but the threats they pose. In a "botnet" or "bot army", computers can be used to spread spam, launch denial-of-service attacks against Web sites, conduct fraudulent activities, and prevent authorized network traffic from traversing the network. In this paper we discuss botnets and the technologies that underlie this threat to network and computer security. The first section motivates the need for improved protection against botnets, their technologies, and for further research about botnets. The second contains background information about bot armies and their key underlying technologies. The third section presents a discussion of the types of attacks that botnets can conduct and potential defenses against them. The fourth section contains a summary and suggestions for future research and development.
© (2007) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Sheila B. Banks and Martin R. Stytz "Bot armies as threats to network security", Proc. SPIE 6570, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, 657002 (9 April 2007); https://doi.org/10.1117/12.724246
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computing systems

Network security

Internet

Computer networks

Control systems

Operating systems

Information security

RELATED CONTENT

Research on enterprise network security system
Proceedings of SPIE (May 06 2022)
Cyber defense through hardware security
Proceedings of SPIE (May 09 2018)
Considerations and foundations for Botnet simulation
Proceedings of SPIE (April 13 2009)
A case of reliable remote functionality
Proceedings of SPIE (July 15 2008)
Internet firewalls: questions and answers
Proceedings of SPIE (March 12 1996)

Back to Top