Chapter 14: The Botnet Problem

Nailah A. Mims     Bright Horizons, Burlington, MA, United States

Abstract

The spread of computer technology and electronic data has expanded the use of software programs and applications in cyberspace. Software is used to generate, manipulate, and store information, and billions of connected devices rely on software for key functionality. While much of the software programs in cyberspace are written to support beneficial uses, malicious actors also use software in cyber attacks. These programs written by bad actors are called malware. Botnets are a type of malware that involves a network of hosts that have been infected with bots, small malicious programs, that are created and controlled by an attacker. Botnets can ...

Get Computer and Information Security Handbook, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.