Attrition defenses for a peer-to-peer digital preservation system
ATEC '05 Proceedings of the annual conference on USENIX Annual Technical Conference
Hardening Botnet by a Rational Botmaster
Information Security and Cryptology
A model for covert botnet communication in a private subnet
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
Improving users' security choices on home wireless networks
Proceedings of the Sixth Symposium on Usable Privacy and Security
Agents of responsibility--freelance web developers in web applications development
Information Systems Frontiers
Design of a secure packet processor
Proceedings of the 6th ACM/IEEE Symposium on Architectures for Networking and Communications Systems
Securing the data path of next-generation router systems
Computer Communications
Bot detection evasion: a case study on local-host alert correlation bot detection methods
Security and Communication Networks
High-performance hardware monitors to protect network processors from data plane attacks
Proceedings of the 50th Annual Design Automation Conference
Hi-index | 4.11 |
Viruses, worms, Trojan horses, and network intrusions are among the threats that security administrators worry about on a regular basis. However, there is a less familiar threat that many experts say could be just as dangerous: malicious bot software. A bot is a program that operates automatically as an agent for a user or another program. Hackers forward bots to victims by a number of means, and the software automatically infects vulnerable computers. The bots then wait for commands from a hacker, who can manipulate them and the infected systems without the user's knowledge. A hacker can install bots on multiple computers to set up botnets that they can use for massive distributed-denial-of-service (DDoS) attacks that overwhelm victimized systems' defenses. Botnets can also be used for mass spam mailings, installing key-logging software that can steal victims' passwords and data, and compromising computers to prepare them for infection by future viruses.