Chapter 17

Responding to cyber crime and cyber terrorism—botnets an insidious threat

Giovanni Bottazzi; Gianluigi Me

Abstract

One of the most insidious cyber threats for security community is represented today by the diffusion of infected computers (bots or zombies) representing a part of a completely managed network (botnet). The use of botnets is very frequent to target attacks, such as a DDoS or cyber-espionage campaigns and their managers try to involve the largest number of machines, hiding the activities of the malicious architecture.

This chapter focuses on the implemented architecture, the network protocol used or the technology of the botnet, although multiple different classifications appear on the literature: the aforementioned ...

Get Cyber Crime and Cyber Terrorism Investigator's Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.