Dynamic DNS: Working the botnet: how dynamic DNS is revitalising the zombie army

  • Authors:
  • Simon Heron

  • Affiliations:
  • Managing Director, Network Box (UK)

  • Venue:
  • Network Security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Botnet operators are the Svengalis of the PC world, enslaving desktop PCs and then making them do their bidding. Thanks to worms and Trojan horses, a grandmother in Arizona could end up hosting illegal content on an FTP site without ever realising it. But what happens when she turns her PC off, or her ISP allocates another IP address? Thanks to dynamic DNS services, botnet operators can hop around to different addresses and create new bot controllers or malicious content hosters at will. It makes it even more difficult for law enforcers and security professionals to deal with a phenomenon that was already challenging enough. Is there any way to deal with the problem? Years ago hackers were little more than script kiddies who busied themselves in their bedrooms writing malicious code. They caused disruption for kicks, and their reward was kudos from the hacking community.