Anatomy of a Botnet
October 16th, 2012 By: Bill Kleyman
There’s little debate that organizations are relying more and more on the use of the Internet. Business is evolving and using new technologies revolving around cloud computing. There is a greater need to deliver information to a new data-on-demand end-user. Without a true governing body, the Internet can be a great tool – with some serious security concerns. The increase in Internet usage has begun to see more identity fraud, spamming, malware distribution, bank fraud, and now growing more frequently – Distributed Denial of Service (DDoS) attacks.
In Anatomy of a Botnet, Arbor researchers take a deep dive into the behavior, trends, distribution and details of a botnet and DDoS attack. This white paper goes on to examine the intricacies of a botnet or DDoS attack – Arbor Security Engineering & Response Team (ASERT) takes a “look under the hood” approach.
Anatomy of a Botnet outlines how ASERT used a structured, multi-step process to analyze botnet and DDoS attacks. From there, ASERT collected the malware samples daily and executed them in a secured “sandbox” environment. Their results, which are published to a database of more than 2.5 million unique threat analyses, include information on some of the following:
- Categorizing each botnet.
- Identifying each attack.
- Determining botnet and DDoS characteristics.
- A look at and analysis of Malcode.
- Understanding the lifecycle of a botnet.
- Automated identification and tracking.
Download Anatomy of a Botnet to learn more about the workings of a botnet and DDoS attack. By understanding the design of a malicious attack, environments are able to better secure their infrastructure. There is a greater reliance on the Internet and as a result, botnets and DDoS attacks are on the rise. Anatomy of a Botnet and ASERT help illustrate need for preparation and a greater understanding of both botnets and DDoS attacks.