A Short Visit to the Bot Zoo

  • Authors:
  • Thorsten Holz

  • Affiliations:
  • RWTH Aachen University

  • Venue:
  • IEEE Security and Privacy
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

This past year has seen a new attack trend emerge: bots. After a successful compromise, the attacker installs a bot (also called a zombie or drone) on the system; this small program enables a remote control mechanism to then command the victim. Attackers use this technique repeatedly to form networks of compromised machines (botnets) to further enhance the effectiveness of their attacks. The author examines several bots.