Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Botnet

Handbook of Research on Technoethics
A network of computers with rootkits that are secretly controlled by a cyber-attacker.
Published in Chapter:
The Ethics of Deception in Cyberspace
Neil C. Rowe (U.S. Naval Postgraduate School, USA)
Copyright: © 2009 |Pages: 13
DOI: 10.4018/978-1-60566-022-6.ch034
Abstract
We examine the main ethical issues concerning deception in cyberspace. We first discuss the concept of deception and survey ethical theories applicable to cyberspace. We then examine deception for commercial gain such as spam, phishing, spyware, deceptive commercial software, and dishonest games. We next examine deception used in attacks on computer systems, including identity deception, Trojan horses, denial of service, eavesdropping, record manipulation, and social engineering. We then consider several types of deception for defensive purposes, less well known, including honeypots, honeytokens, defensive obstructionism, false excuses, deceptive intelligence collection, and strategic deception. In each case we assess the ethical issues pro and con for the use of deception. We argue that sometimes deception in cyberspace is unethical and sometimes it is ethical.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
The Role of Artificial Intelligence in Cyber Security
It is an infected computer terminal which can be used a platform to launch various attacks like DDoS attacks, Spamming, mining of bit coins, etc.
Full Text Chapter Download: US $37.50 Add to Cart
Malware Detection in Industrial Scenarios Using Machine Learning and Deep Learning Techniques
A network of internet-connected devices infected by a bot, generally used to perform Distributed Denial-of-Service (DDoS) attacks and send spam.
Full Text Chapter Download: US $37.50 Add to Cart
Defending Information Networks in Cyberspace: Some Notes on Security Needs
a) A ro bot net work (ro BOT NET work) or a network of compromised computer systems linked together for a common purpose. Criminals distribute malicious software (also known as malware) that can turn a given computer into a bot (also known as a zombie) and typically use bots to infect large numbers of computers which form a network, or a botnet . Further, they use botnets to send out spam email messages, spread viruses, attack computers and servers, and commit other kinds of crime and fraud. If a computer becomes part of a botnet, it might slow down and the owner might inadvertently be helping criminals; b) Also called a “zombie army,” a botnet is a large number of compromised computers that are used to generate spam, relay viruses or flood a network or Web server with excessive requests to cause it to fail (see denial of service attack). The computer is compromised via a Trojan that often works by opening an Internet Relay Chat (IRC) channel that waits for commands from the person in control of the botnet. There is a thriving botnet business selling lists of compromised computers to hackers and spammers
Full Text Chapter Download: US $37.50 Add to Cart
Denial-of-Service and Botnet Analysis, Detection, and Mitigation
A network of private computers infected with malicious software and controlled as a group without the owners' knowledge (e.g., to send spam).
Full Text Chapter Download: US $37.50 Add to Cart
Anomaly Detection in IoT Frameworks Using Machine Learning
A botnet is a group of nodes associated in a planned manner for vindictive purposes. Every node in a botnet is known as a bot. These bots structure a system of trading off nodes, which is constrained by an outsider and used to transmit malware or spam or to dispatch attacks.
Full Text Chapter Download: US $37.50 Add to Cart
Honeypots and Honeynets: Analysis and Case Study
Network composed of infected hosts remotely controlled by an attacker.
Full Text Chapter Download: US $37.50 Add to Cart
The Essence of Cyber Security: The Main Historical Stages of the Development of Cyber Threats
A botnet of infected computers controlled by the attacker through a command-and-control server.
Full Text Chapter Download: US $37.50 Add to Cart
Social Research Methods in Cybersecurity: From Criminology to Industrial Cybersecurity
Software artifacts built by cybercriminals as basic infrastructures to support different variants of cyberattacks, allowing multiple remote computers to infect and control up to millions of computer computers without their owner's knowledge, being controlled to launch denial of access attacks, theft of information, and bank credentials or means of payment and sending millions of messages with harmful content.
Full Text Chapter Download: US $37.50 Add to Cart
The Advancing Cybersecurity Ecosystem of Israel: An Overview of Current Challenges and Opportunities in the Early 2020s
A botnet is a network of infected IT devices that can be used by a botnet host for multiple types of damage. The purpose of using infected workstations is primarily to send unsolicited mail, launch Denial-of-Service (DoS) attacks, or even steal sensitive (such as banking) data.
Full Text Chapter Download: US $37.50 Add to Cart
National Security Policy and Strategy and Cyber Security Risks
A collection of computers compromised by malicious code and controlled across a network.
Full Text Chapter Download: US $37.50 Add to Cart
Crime Identification Using Traffic Analysis of HTTP Botnet
A botnet is a collection of bots. Botnets originate many types of attacks like distributed denial-of-service attack (DDoS attack), data theft, spamming, and intrusion to systems and networks.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Toward More Resilient Cyber Infrastructure: A Practical Approach
Large number of compromised computers that are used to generate spam, relay viruses or flood a network or Web server with excessive requests to cause it to fail.
Full Text Chapter Download: US $37.50 Add to Cart
Prediction, Detection, and Mitigation of DDoS Attacks Using HPCs: Design for a Safer Adaptive Infrastructure
Computer network “zombie”, normally used to perform tasks in an automated way on the Internet, without the user's knowledge.
Full Text Chapter Download: US $37.50 Add to Cart
Retrieval of Information Through Botnet Attacks: The Importance of Botnet Detection in the Modern Era
A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
Full Text Chapter Download: US $37.50 Add to Cart
Detecting Botnet Traffic from a Single Host
Coordinated group of infected computers externally managed by an attacker.
Full Text Chapter Download: US $37.50 Add to Cart
Evaluating Cyber Attacks in Rail Transit
A number of Internet computers that have been set up (without the knowledge of the computer owners) to forward transmissions (including spam or viruses) to other computers on the Internet. Any such computer connected to this net is often referred to as a zombie - in effect, a computer “robot” or “bot” that serves the wishes of some master hacker.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR