O'Reilly logo

Crimeware by Zulfikar Ramzan, Markus Jakobsson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Bot Networks

James Hoagland, Zulfikar Ramzan, and Sourabh Satish

Bot networks are an emerging threat area with a wide variety of malicious applications including spam, phishing, distributed denial of service, click fraud, data harvesting, password cracking, online reputation inflation, and adware installation, among others. In this chapter, we explore botnets in detail. First, we cover what botnets are, why they are important, and how prevalent they seem to be. Next, we describe how botnets work, including the protocols over which botnets communicate, the techniques they use to remain resilient, and the kinds of features that typical bots possess. We then delve into applications of botnets related to online malicious activity. Finally, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required