A botnet is a network of computers infected by malware and controlled by an attacking party. It may comprise millions of devices connected by the internet like mobile phones, IoT devices, PCs, and so on.
There are two main components of a botnet:
A botnet enables the attacking party to get resources and perform large-scale actions previously impossible with the malware. Some botnet commanders specialize in botnet development and expansion and sell their botnets to cyber criminals who carry out cyber attacks. Some of the common uses of botnet include:
Attacking parties can control botnets using the following approaches:
The client-server model involves a Command and Control (C&C) server. The attacker uses this server to operate the bots. It enables the attacker to control some or all of the bots simultaneously.
P2P relies on a decentralized approach. Each bot can act as a client and a server, making it very difficult to shut down.
Some of the well-known botnet attacks carried out in history include:
It is tough to detect a botnet attack as each attack is uniquely set up and operates differently. However, the following measures can be adopted to prevent your device from becoming a part of a botnet:
Free Resources