Internet Security. Abstract. Online users today are faced with multitude of problems and issues. A typical online user is vulnerable to virus, worms, bugs, Trojan horses etc.; he/she is also exposed to sniffers, spoofing their private sessions; and they are also vulnerable to phishing of financial information Internet Security And The Internet Essay. Words | 8 Pages. that the Internet continues to spread its influence to further parts of the world. The internet gives benefits to anyone who uses the global-reaching technology Internet Security Essay. Many people today are familiar with the Internet and its use. A large number of its users however, are not aware of the security problems they face when using the Internet. Most users feel they are anonymous when on-line, yet in actuality they are not. There are some very easy ways to protect the user from future blogger.comted Reading Time: 9 mins
Internet Security Essay Essay on
During the last few decades, internet security essay, we have seen the dramatically rise of the Internet and its applications to the point which they internet security essay become a critical part of our lives. Internet security in that way has become more and more important to those who use the Internet for work, business, internet security essay, entertainment or education. Most of the attacks and malicious activities on the Internet are carried out by malicious applications such internet security essay Malware, which includes viruses, trojan, worms, and botnets, internet security essay.
Botnets become a main source of most of the malicious activities such as scanning, internet security essay, distributed denial-of-service DDoS activities, and malicious activities happen across the Internet.
The bot code is usually written by some criminal groups. A botnet is essentially a network of bots that are under the control of an attacker BotMaster. Figure 1. A bot usually take advantage of sophisticated malware techniques. As an example, a bot use some techniques like keylogger to record user private information like password and hide its existence in the system. More importantly, a bot can distribute itself on the internet to increase its scale to form a bot army.
Recently, attackers use compromised Web servers to contaminate internet security essay who visit the websites through drive-by download [6]. Currently, a botnet contains thousands of bots, but there is some cases that botnet contain several millions of bots [7]. Actually bots differentiate themselves from other kind of worms by their ability internet security essay receive commands from attacker remotely [32]. Attacker or better call it botherder control bots through different protocols and structures.
HTTP is also used because Http protocol is permitted in most networks. Centralized structure botnets was very successful in the past but now botherders use decentralized structure to avoid single point of failure problem.
Unlike previous malware such as worms, which are used probably for entertaining, botnets are used for real financial abuse. Actually Botnets can cause many problems as some of them listed below:. Click fraud, internet security essay. A botmaster can internet security essay profit by forcing the bots to click on advertisement for the purpose of personal or commercial abuse. DDoS attacks. A bot army can be commanded to begin a distributed denial-of-service attack against any machine.
Botnets are widely used to host malicious phishing sites. Nowadays, the most serious manifestation of advanced malware is Botnet. To make distinction between Botnet and other kinds of malware, the concepts of Botnet have to understand.
For a better understanding of Botnet, two important terms, Bot and BotMaster have been defined internet security essay another point of views. Bot — Bot is actually short for robot which is also called as Zombie. It is a new type of malware [24] installed into a compromised computer which can be controlled remotely by BotMaster for executing some orders through the received commands.
After the Bot code has been installed into the compromised computers, the computer becomes a Bot or Zombie [25]. Contrary to existing malware such as virus and worm which their main activities focus on attacking the infecting host, bots can receive commands from BotMaster and are used in distributed attack platform. BotMaster — BotMaster is also known as BotHerder, is a person or a group of person which control remote Bots. Botnets- Botnets are networks consisting of large number of Bots. Botnets are created by the BotMaster to setup a private communication infrastructure which can be used for malicious activities such as Distributed Denial-of-Service DDoSsending large amount of SPAM or phishing mails, and other nefarious purpose [26, 27, 28].
Bots internet security essay disseminate themselves across the Internet by looking for vulnerable and unprotected computers to infect. When they find an unprotected computer, they infect it and then send a report to the BotMaster. The Bot stay hidden until they are announced by their BotMaster to perform an attack or task. Other ways in which attackers use to infect a computer in the Internet with Bot include sending email and using malicious websites, but common way internet security essay searching the Internet to look for vulnerable and unprotected computers [29].
The activities associated with Botnet can be classified into three parts: 1 Searching — searching for vulnerable and unprotected computers. However, detection and mitigation techniques against Botnets have been increased [30,31]. Recently, attackers are also continually improving their approaches to protect their Botnets. In Section 1. The oldest type of topology is the centralized model. In this model, one central point is responsible for exchanging commands and data between the BotMaster and Bots.
In this model, BotMaster chooses a host usually high bandwidth computer to be the central point Command-and-Control server of all the Bots. The main advantage of this model is small message latency which cause BotMaster easily arranges Botnet and launch attacks. Thus, it becomes the main drawback of this model. There are two central points that forward commands and data between the BotMaster and his Bots. The IRC is a type of real-time Internet text messaging or synchronous conferencing [36].
IRC protocol is based on the Client Server model that can be used on many computers in distributed networks. Some advantages which made IRC protocol widely being used in remote communication for Botnets are: i low latency communication; ii anonymous real-time communication; iii ability of Group many-to-many and Private one-to-one communication; iv simple to setup and v simple commands.
The basic commands are connect to servers, join channels and post messages in the channels; vi very flexibility in communication. Therefore IRC protocol is still the most popular protocol being used in Botnet communication. In this model, internet security essay, BotMasters can command all of their Bots or command a few of the Bots using one-to-one communication. Puri [38] presented the procedures and mechanism of Botnet based on IRC, as shown in Figure. After the Bot is installed on target machine, it will try to connect to IRC server.
The Bot will join the private IRC channel set up by the attacker and wait for instructions from the attacker. Most of these private IRC channel is set as the encrypted mode.
The HTTP protocol is an additional well-known protocol used by Botnets. Because IRC protocol within Botnets became well-known, internet security researchers gave more consideration to monitoring IRC traffic to detect Botnet. Consequently, attackers started to use HTTP protocol as a Command-and-Control communication channel internet security essay make Botnets become more difficult to detect.
The main advantage of using the HTTP protocol is hiding Botnets traffics in normal web traffics, so it can easily passes firewalls and avoid IDS detection. Usually firewalls block incoming and outgoing traffic to not needed ports, which usually include the IRC port. Hence, they decided to find a model in which the communication system does not heavily depending on few selected servers and even discovering and destroying a number of Bots. In the P2P model, as shown in Fig.
Each Bot have some connections to the other Bots of the same Botnet and Bots act as both Clients and servers. A new Bot must know some addresses of the Botnet to connect there. If Bots in the Internet security essay are taken offline, the Botnet can still continue to operate under the control of BotMaster. P2P Botnets aim at removing or hiding the central point of failure which is the main weakness and vulnerability of Centralized model.
Some P2P Botnets operate to a certain extent decentralized and some completely decentralized. Those Botnets that are completely decentralized allow a BotMaster to insert a command into any Bots. Since P2P Botnets usually allow commands to be injected at any node in the network, the authentication of commands become essential to prevent other nodes from injecting incorrect commands.
For a better understanding in this model, internet security essay, some characteristics and important features of famous P2P Botnets have been mentioned: Slapper: Allows the routing of commands to distinct nodes.
Uses Public key and private key cryptography to authenticate commands. BotMasters sign commands with private key and only those nodes which has corresponding public key can verify the commands [42]. Two important weak points are: a its list of known Bots contains all or almost all of internet security essay Botnet.
Thus, one single captured Bot would expose the entire Botnet to defenders [42] b its sophisticated communication mechanism produces lot traffic, making it vulnerable to monitoring via network flow analysis.
Sinit: This Bot uses random searching to discove other Bots to communicate with. It can results in an easy detection due to the extensive probing traffic [34].
Nugache: Its weakness is based on its reliance on a seed list of 22 IP addresses during its bootstrap process [47]. Phatbot: Uses Gnutella cache server for its bootstrap process which can be easily shutdown. Also its WASTE P2P protocol has a scalability problem across a long network [48]. Strom worm: it uses a P2p overnet protocl to control compromised hosts.
The communication protocol for this Bot can be classified into five steps, as describes below :[37] i. Connect to Overnet — Bots try to join Overnet network, internet security essay.
Each Bot initially has hard-coded binary files which internet security essay included the Internet security essay addresses of P2P-based Botnet nodes.
Search and Download Secondary Injection URL — Bot uses hard-coded keys to explore for and download the URL on the Overnet network [37]. Decrypt Secondary Injection URL — compromised hosts take advantages of a key hard coded to decrypt the URL. Download Secondary Injection — compromised hosts attempt to download the second injection from a server probably web server. It could be infected files or updated files or list of the P2P nodes [37]. The Bots in the Hybrid Botnet are categorized into two groups: 1 Servant Bots — Bots in the first group are called as servant Bots, because they behave as both clients and servers, which have static, routable IP addresses and are accessible from the entire Internet.
This group contains the remaining Bots, including:- a Bots with dynamically designated IP addresses; b Bots with Non-routable IP addresses; and c Bots internet security essay firewalls which they cannot be connected from the global Internet, internet security essay.
Botnets which are controlled remotely by BotMasters can launch huge denial of service attacks, several infiltration attacks, can be used to spread spam and also conduct malicious activities internet security essay. While bot army activity has, so far, been limited to criminal activity, their potential for causing large- scale damage to the entire internet is immeasurable [].
Therefore, Botnets are one of the most dangerous types of network-based attack today because they involve the use of very large, synchronized groups of hosts for their malicious activities.
Botnets obtain their power by size, both in their increasing bandwidth and in their reach. As mentioned before Botnets can cause severe network disruptions through huge denial- of-service attacks, and the danger of internet security essay interruption can charge enterprises big sums in extortion fees.
Botnets are also used to harvest personal, corporate, or government sensitive information for sale on a blooming organized crime market, internet security essay. They utilize peer-to-peer style communication, internet security essay. Tracking the starting point and activity of this botnet is much more complicated due to the Peer-to-Peer communication infrastructure.
Essay for SSC CGL TIER 3 EXAM DESCRIPTIVE ESSAY WRITING : CYBER SECURITY
, time: 3:22Internet Security Essay Examples Essay Essay on Internet Security
· Introduction During the last few decades, we have seen the dramatically rise of the Internet and its applications to the point which they have become a critical part of our lives. Internet security in that way has become more and more important to those who use the Internet for work, business, entertainment or education/5(35) Internet Security And The Internet Essay. Words | 8 Pages. that the Internet continues to spread its influence to further parts of the world. The internet gives benefits to anyone who uses the global-reaching technology Technology has overall made life easier, but maybe too easy, and has made things a lot less private. This results in us having to be extra careful with security on the internet. Internet security is important to protect our privacy, protect us from fraud, and from viruses that could destroy a piece of our technology. Internet privacy and security may be different but share a
No comments:
Post a Comment