Skip to main content
Top

2013 | OriginalPaper | Chapter

Botnets: How to Fight the Ever-Growing Threat on a Technical Level

Authors : Heli Tiirmaa-Klaar, Jan Gassen, Elmar Gerhards-Padilla, Peter Martini

Published in: Botnets

Publisher: Springer London

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Today’s malware, short term for malicious software, poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic loss caused by different kinds of malware, which is estimated to be more than US$10 billion every year. This particularly applies for botnets, which are a special kind of malware. In contrast to other kinds of malware, botnets utilize a hidden communication channel to receive commands from their operator and communicate their current status. The ability to execute almost arbitrary commands on the infected machines makes botnets a general-purpose tool to perform malicious cyber-activities. In this context, botnets are used for example by individual perpetrators, organized crime as well as governmentally supported organizations, in order to achieve individual gains. This chapter gives a technical insight into current botnet techniques and discusses state of the art countermeasures to combat the botnet threat in detail. This includes new detection methods as well as different approaches to actively compromise running botnets. Different techniques as well as their impact on current botnets are discussed, considering individual involved stakeholders. In addition to the technical countermeasures, current initiatives countering botnets are introduced.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Symantec. (2011). Symantec Internet Security Threat Report, Volume 16. Symantec. (2011). Symantec Internet Security Threat Report, Volume 16.
5.
go back to reference Panda Security. (2010). The Cyber-Crime, Black Market: Uncovered. Panda Security. (2010). The Cyber-Crime, Black Market: Uncovered.
8.
go back to reference Deibert, R., & Rohozinski, R. (2009). Tracking GhostNet: Investigating a Cyber Espionage Network. Information Warfare Monitor. Deibert, R., & Rohozinski, R. (2009). Tracking GhostNet: Investigating a Cyber Espionage Network. Information Warfare Monitor.
10.
go back to reference Ottis, R. (2008). Analysis of the 2007 cyber attacks against estonia from the information warfare. Proceedings of the 7th European Conference on Information (pp. 163–168). Ottis, R. (2008). Analysis of the 2007 cyber attacks against estonia from the information warfare. Proceedings of the 7th European Conference on Information (pp. 163–168).
16.
17.
go back to reference Schauer, C. (2001). The Mechanisms and Effects of the Code Red Worm. Schauer, C. (2001). The Mechanisms and Effects of the Code Red Worm.
22.
go back to reference Paulson, R. A., & Weber, J. E. (2006). Cyberextortion: An overview of distributed denial of service attacks against online gaming companies. Issues in Information Systems, 7, 52–56. Paulson, R. A., & Weber, J. E. (2006). Cyberextortion: An overview of distributed denial of service attacks against online gaming companies. Issues in Information Systems, 7, 52–56.
23.
go back to reference M86 Security. (2010). Cybercriminals Target Online Banking Customers. M86 Security. (2010). Cybercriminals Target Online Banking Customers.
26.
go back to reference Symantec Corp. (2010). W32.Stuxnet Dossier v1.3. Symantec Corp. (2010). W32.Stuxnet Dossier v1.3.
30.
go back to reference MessageLabs. (2007). Messagelabs Intelligence: August 2007. MessageLabs. (2007). Messagelabs Intelligence: August 2007.
33.
go back to reference Holz T., Steiner M., Dahl F., Biersack E., & Freiling F. (2008). Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. Holz T., Steiner M., Dahl F., Biersack E., & Freiling F. (2008). Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm.
34.
go back to reference Leder,F., & Werner, T. (2009). Know Your Enemy: Containing Conficker. The Honeynet Project. Leder,F., & Werner, T. (2009). Know Your Enemy: Containing Conficker. The Honeynet Project.
42.
go back to reference Barford, P., & Yegneswaran, V. (2007). An inside look at botnets. Malware Detection (pp. 171–191). Barford, P., & Yegneswaran, V. (2007). An inside look at botnets. Malware Detection (pp. 171–191).
44.
go back to reference Damballa Inc. (2011). Top 10 Botnet Threat Report—2010. Damballa Inc. (2011). Top 10 Botnet Threat Report—2010.
46.
go back to reference Hogben, G., Plohmann, D., Gerhards-Padilla, E., & Leder, F. (2011). Botnets: Detection, Measurement, Disinfection & Defence. Hogben, G., Plohmann, D., Gerhards-Padilla, E., & Leder, F. (2011). Botnets: Detection, Measurement, Disinfection & Defence.
51.
go back to reference Microsoft. (2011). Microsoft Security Intelligence Report Volume 11. Microsoft. (2011). Microsoft Security Intelligence Report Volume 11.
53.
go back to reference Stone-Gross, B. et al. (2009). Your botnet is my botnet: Analysis of a botnet takeover. Proceedings of the 16th ACM conference on Computer and communications security (pp. 635–647). Stone-Gross, B. et al. (2009). Your botnet is my botnet: Analysis of a botnet takeover. Proceedings of the 16th ACM conference on Computer and communications security (pp. 635–647).
54.
go back to reference Kang, B. B. H. et al. (2009) Towards complete node enumeration in a peer-to-peer botnet. Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. Kang, B. B. H. et al. (2009) Towards complete node enumeration in a peer-to-peer botnet. Proceedings of the 4th International Symposium on Information, Computer, and Communications Security.
55.
go back to reference Dittrich, D., & Dietrich, S. (2008). “Discovery Techniques for P2P Botnets. Dittrich, D., & Dietrich, S. (2008). “Discovery Techniques for P2P Botnets.
56.
61.
go back to reference Tikk, E., Kaska, K., & Vihul, L. (2010). International cyber incidents—legal considerations. Cooperative Cyber Defence Centre of Excellence, Tallin, Estonia. Tikk, E., Kaska, K., & Vihul, L. (2010). International cyber incidents—legal considerations. Cooperative Cyber Defence Centre of Excellence, Tallin, Estonia.
62.
go back to reference Leder, F., Werner, T., & Martini, P. (2009). Proactive botnet countermeasures—an offensive approach. Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia. Leder, F., Werner, T., & Martini, P. (2009). Proactive botnet countermeasures—an offensive approach. Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia.
63.
go back to reference Ramachandran, A., Feamster, N., & Dagon, D. (2006). Revealing botnet membership using DNSBL counter-intelligence. Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet (Vol. 2). Ramachandran, A., Feamster, N., & Dagon, D. (2006). Revealing botnet membership using DNSBL counter-intelligence. Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet (Vol. 2).
64.
go back to reference Schmidt, J. E. (2006). Dynamic port 25 blocking to control spam zombies. Third Conference on Email and Anti-Spam. Schmidt, J. E. (2006). Dynamic port 25 blocking to control spam zombies. Third Conference on Email and Anti-Spam.
65.
go back to reference McAfee. (2011). Underground Economy—Intellectual Capital and Sensitive Corporate Data Now the Latest Cybercrime Currency. McAfee. (2011). Underground Economy—Intellectual Capital and Sensitive Corporate Data Now the Latest Cybercrime Currency.
66.
go back to reference Calvet, J., Davis, C. R., & Bureau, P.-M. (2009). Malware authors don’t learn, and that’s good! Malicious and Unwanted Software (MALWARE) (pp. 88–97). Calvet, J., Davis, C. R., & Bureau, P.-M. (2009). Malware authors don’t learn, and that’s good! Malicious and Unwanted Software (MALWARE) (pp. 88–97).
68.
go back to reference Benzmüller, R., & Berkenkopf, S. (2011). G Data Malware Report January–June 2011, G Data. Benzmüller, R., & Berkenkopf, S. (2011). G Data Malware Report January–June 2011, G Data.
Metadata
Title
Botnets: How to Fight the Ever-Growing Threat on a Technical Level
Authors
Heli Tiirmaa-Klaar
Jan Gassen
Elmar Gerhards-Padilla
Peter Martini
Copyright Year
2013
Publisher
Springer London
DOI
https://doi.org/10.1007/978-1-4471-5216-3_2

Premium Partner