Visible to the public On Security Threats of Botnets to Cyber Systems

TitleOn Security Threats of Botnets to Cyber Systems
Publication TypeConference Paper
Year of Publication2019
AuthorsLange, Thomas, Kettani, Houssain
Conference Name2019 6th International Conference on Signal Processing and Integrated Networks (SPIN)
KeywordsBotnet, botnets, botnets security threats, Computer crime, computer network security, cyber systems, cybersecurity, DDoS Attacks, Distributed Denial of Service (DDoS) attacks, distributed denial of service attacks, fraud, fully functional botnet, Internet, Internet connected hosts anonymously, Internet of Things, Internet of Things (IoT) devices, Internet of Things devices, invasive software, IoT devices, IP networks, launch mass financial fraud campaigns, learning (artificial intelligence), machine learning techniques, Network topology, pubcrawl, public opinion, Resiliency, Scalability, Security by Default, social media bots, social networking (online), sophisticated botnet, sophisticated intrusion detection systems, Task Analysis, undertake intricate spam campaigns
AbstractAs the dynamics of cyber warfare continue to change, it is very important to be aware of the issues currently confronting cyberspace. One threat which continues to grow in the danger it poses to cyber security are botnets. Botnets can launch massive Distributed Denial of Service (DDoS) attacks against internet connected hosts anonymously, undertake intricate spam campaigns, launch mass financial fraud campaigns, and even manipulate public opinion via social media bots. The network topology and technology undergirding each botnet varies greatly, as do the motivations commonly behind such networks. Furthermore, as botnets have continued to evolve, many newer ones demonstrate increased levels of anonymity and sophistication, making it more difficult to effectively counter them. Increases in the production of vulnerable Internet of Things (IoT) devices has made it easier for malicious actors to quickly assemble sizable botnets. Because of this, the steps necessary to stop botnets also vary, and in some cases, it may be extremely difficult to effectively defeat a fully functional and sophisticated botnet. While in some cases, the infrastructure supporting the botnet can be targeted and remotely disabled, other cases require the physical assistance of law enforcement to shut down the botnet. In the latter case, it is often a significant challenge to cheaply end a botnet. On the other hand, there are many steps and mitigations that can be taken by end-users to prevent their own devices from becoming part of a botnet. Many of these solutions involve implementing basic cybersecurity practices like installing firewalls and changing default passwords. More sophisticated botnets may require similarly sophisticated intrusion detection systems, to detect and remove malicious infections. Much research has gone into such systems and in recent years many researchers have begun to implement machine learning techniques to defeat botnets. This paper is intended present a review on botnet evolution, trends and mitigations, and offer related examples and research to provide the reader with quick access to a broad understanding of the issues at hand.
Citation Keylange_security_2019