Business Model of Botnets
نویسنده
چکیده
Botnets continue to be an active threat against institutions and individuals worldwide. Previous research regarding botnets has unveiled information on how the system and their stakeholders operate, but an insight on the economic structure behind these stakeholders is lacking. The objective of this research is to build the business model and determine the structure of the underground botnet economy. This means determining the botnet life-cycle, revenue streams and overall economic impact on institutions and stakeholders. Compared to other botnet related research, this paper focuses on the financial aspects, breaking down the components of the botnet life-cycle and estimating the money flow to the different actors involved. What can be concluded is that building a full scale cyber army from scratch can only be done by large institutions or governments, as it is too costly. In contrast, by outsourcing different tasks and making use of existing malware packages, costs are reduced to a minimum and reachable for the average person. Applying this method to earlier researched botnets, in every case the botnet resulted in being profitable for the botmaster. Initial setupand monthly costs were minimal compared to total revenue.
منابع مشابه
Software Vulnerabilities, Banking Threats, Botnets and Malware Self-Protection Technologies
Information security is the protection of information from a wide range of threats in order to ensure success business continuity by minimizing risks and maximizing the return of investments and business opportunities. In this paper, we study and discuss the software vulnerabilities, banking threats, botnets and propose the malware self-protection technologies.
متن کاملBlack Market Botnets
Botnets have yet to be exploited to their full potential, because they have yet to take advantage of all the information available to them. A botmaster who controls a botnet can use technology that exists now to create an infrastructure for selling information to third parties in a new way, exploiting the so-called “Long Tail.” This results in not one, not two, but three new markets and untappe...
متن کاملBotOnus: an online unsupervised method for Botnet detection
Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...
متن کاملP2PWNED: Modeling and Evaluating the Resilience of Peer-to-Peer Botnets
Centralized botnets are easy targets for takedown efforts by computer security researchers and law enforcement. Thus, botnet controllers have sought new ways to harden the infrastructures of their botnets. In order to meet this objective, some botnet operators have (re)designed their botnets to use Peer-to-Peer (P2P) infrastructures. Many P2P botnets are far more resilient to takedown attempts ...
متن کاملBotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle
Nowadays, botnets are considered as essential tools for planning serious cyberattacks. Botnets are used to perform various malicious activities such as DDoSattacks and sending spam emails. Different approaches are presented to detectbotnets; however most of them may be ineffective when there are only a fewinfected hosts in monitored network, as they rely on similarity in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017