New Insights Into the Elimination of Botnets

Lecture: Botnets” Anticipating failure” Rick Wesson.

Great  lecture about how Botnets are run, the internal workings of Botnet Harvesters and defense mechanisms against having your personal servers turned into “Zombie” computers and used to extract data as well as preformed a myriad of other functions. The rather apocalyptic view probably giving the lecture its name “Anticipating Failure”, a view I personally hold as true about the nature of the current status of the lack of security found globally. The lecture goes over a spectrum of key points, very helpful in terms of conducting research in this realm. Topics of interest include; Detection Systems, proper handling of found Botnets inside of a server that you own, legality, and overall devastating systemic failures. The lecture has a great collection of ideas and anecdotes that are rather off center such as “buy a Mac, it will buy you two extra years” and does a good job pointing out specific institutions that have been contacted but who repeatedly refuse to come together and create a centralized defense and detection system for dealing with this extremely ever expanding problem. Regardless of the gaps in strategy that become obvious throughout the lecture in terms of formatting such a system, the conclusion is evident; Botnets are here, they are real, and they are much more dangerous than most people realize.

“Researching Botnets” Nicolas Albright.

A relatively good paper on the subject of how to defend your network against possible enslavement, and detection mechanism’s. The paper is of a more technically oriented nature and provides a foundational framework for actually going out and being proactive in the realm of Botnet research and detection. Included in the paper is a collection of such useful tools as who to contact if a virus is detected and not already registered with the major anti-virus software companies and data collection agencies. Protocol on how to approach IRC chat rooms while raising minimal amounts of suspicion and gathering highly important data. The paper also discusses the mechanics of sniffers, auditing, and other aspects of network security in relation to Botnets and marginalization of the damage done by them.


Leave a comment

No comments yet.

Comments RSS TrackBack Identifier URI

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s