To read this content please select one of the options below:

Botnets: threats and responses

Ok‐Ran Jeong (Kyungwon University, Seongnam, South Korea)
Chulyun Kim (Kyungwon University, Seongnam, South Korea)
Won Kim (Kyungwon University, Seongnam, South Korea)
and
Jungmin So (Kyungwon University, Seongnam, South Korea)

International Journal of Web Information Systems

ISSN: 1744-0084

Article publication date: 5 April 2011

1465

Abstract

Purpose

A botnet is a network of computers on the internet infected with software robots (or bots). There are numerous botnets, and some of them control millions of computers. Cyber criminals use botnets to launch spam e‐mails and denial of service attacks; and commit click fraud and data theft. Governments use botnets for political purposes or to wage cyber warfare. The purpose of this paper is to review the botnet threats and the responses to the botnet threats.

Design/methodology/approach

The paper describes how botnets are created and operated. Then, the paper discusses botnets in terms of architecture, attacking behaviors, communication protocols, observable botnet activities, rally mechanisms, and evasion techniques. Finally, the paper reviews state‐of‐the‐art techniques for detecting and counteracting botnets, and also legal responses to botnet threats.

Findings

Botnets have become the platform for many online threats such as spam, denial of service attacks, phishing, data thefts, and online frauds. Security researchers must develop technology to detect and take down botnets, and governments must develop capacity to crack down on botmasters and botnets. Individual computer owners must diligently take measures to keep their computers from becoming members of botnets.

Originality/value

The paper provides a review of current status of botnets and a summary of up‐to‐date responses to botnets in both technical and legal aspects, which can be used as a stepping stone for further research.

Keywords

Citation

Jeong, O., Kim, C., Kim, W. and So, J. (2011), "Botnets: threats and responses", International Journal of Web Information Systems, Vol. 7 No. 1, pp. 6-17. https://doi.org/10.1108/17440081111125635

Publisher

:

Emerald Group Publishing Limited

Copyright © 2011, Emerald Group Publishing Limited

Related articles