dc.contributor.author | Juknius, Jonas | |
dc.contributor.author | Čenys, Antanas | |
dc.date.accessioned | 2023-09-18T18:39:07Z | |
dc.date.available | 2023-09-18T18:39:07Z | |
dc.date.issued | 2009 | |
dc.identifier.issn | 2029-0055 | |
dc.identifier.other | (BIS)VGT02-000022666 | |
dc.identifier.uri | https://etalpykla.vilniustech.lt/handle/123456789/130253 | |
dc.description.abstract | Botnets, networks of compromised and remotely controlled computers (bots) are widely used in many internet attacks. Botnets are the main reason of growing number of unsolicited emails (SPAM), identity and confidential data theft attacks and many other internet criminal and evil-minded activities. It is a main weapon used on targeted computers and also a significant threat even on a whole country scale, when botnets are used in cyber warfare as brute force army performing Distributed Denial of Service (DDoS) attacks. Brute force gives enormous power to bot masters, but also makes botnet traffic visible and some countermeasures might be applied in early stages. Although those threats nowadays are more or less obvious, there is no single method which could guarantee effective contra measures against botnets, only a combination of many approaches can reduce impact of this malicious power. In this paper we discuss what and why makes this little piece of code to become such a powerful weapon. Our study includes evolution of botnets starting from spreading malicious code, organizing into large modern controlled networks and using them in demolishing action. We have tried to organize known methods of organizing botnets and have analyzed variety of botnet masters tactics and scale of attacks.Using analytic methods we try to predict what cyberspace can expect in the nearest future if botnets will evolve to to silent and intelligent weapons. | eng |
dc.format.extent | p. 39-42 | |
dc.format.medium | tekstas / txt | |
dc.language.iso | eng | |
dc.source.uri | http://isd.ktu.lt/it2009//material/Research/HW/HW_bendras.pdf | |
dc.title | Intelligent botnet attacks in modern information warfare | |
dc.type | Straipsnis konferencijos darbų leidinyje kitoje DB / Paper in conference publication in other DB | |
dcterms.references | 11 | |
dc.type.pubtype | P1c - Straipsnis konferencijos darbų leidinyje kitoje DB / Article in conference proceedings in other DB | |
dc.contributor.institution | Vilniaus Gedimino technikos universitetas | |
dc.contributor.faculty | Fundamentinių mokslų fakultetas / Faculty of Fundamental Sciences | |
dc.subject.researchfield | T 007 - Informatikos inžinerija / Informatics engineering | |
dc.subject.en | Malicious networks | |
dc.subject.en | Botnet | |
dc.subject.en | Distributed denial of service | |
dc.subject.en | DDoS | |
dc.subject.en | Cyber war | |
dcterms.sourcetitle | Information technologies'2009 : 15th international conference on information and software technologies, IT 2009 : research communications. Kaunas, Lithuania, April 23-24, 2009 / Kaunas University of Technology | |
dc.publisher.name | Technologija | |
dc.publisher.city | Kaunas | |
dc.identifier.elaba | 3941360 | |