Professional Documents
Culture Documents
1) What is a botnet?
In the term "botnet" as used here, the "bot" is short for robot. A single bot is a software
program that can, when surreptitiously installed on a person's computer, execute certain
specified commands. Botnet is a network of autonomous malicious software agent there are
under the control of a bot commander. The network is created by installing malware that
exploits the vulnerabilities of Web servers, operating systems, or application to take control
of the infected computers. A botnet also refer to the collection of internet connected programs in
order to perform task. This can be as mundane as keeping control of an internet relay chat (IRC)
channel, or it could be used to send spam email or participate in distributed denial-of-service attacks.
The world botnet is a portmanteau of robot and network.
ii.
Vulnerability: some part of the system that the attacker can take advantage of or
manipulate
iii.
Payload: the purpose of the attack, namely, what exactly is the target and how
significant will the damage
Malware, known as Stuxnet is a shorthand term that encompasses all types of malicious
software. This includes viruses, worms, Trojan horses, spyware, and all other types of
software that get put onto your computer without you knowing it. Malware may exploit
weakness to initially infiltrate a system or to gain additional privileges on an alreadycompromised machine. The weaknesses may be exploiting automatically by malware authors
creations or manually by attempt will be generically called attackers. Weaknesses fall into
two broad categories, based on where the weakness lies. Technical weakness involves
tricking people. The malware, hidden in shortcuts to executable programs (files with
extension .ink) was executed automatically when the content of an infected USB drive was
displayed. Employing this same technique, the worms were capable of installing other
malware.
Data gathered later by other experts indicates that the worms was actually looking for some
specific programmable Logic Controllers(PLC) devices used in a specific industrial plants. A
fact that points to the possibility that malware was part of the sites infected with sabotage.
The significance that such a sophisticated treat represents to the industrial recourses in
Europe and others parts of the world cannot be underestimated.