Posts Tagged ‘P2P-botnets’

BotnetIn 2007, the attention of researchers of information security has attracted P2P-botnet, created by a malicious program known as the Storm Worm (classified “Kaspersky Lab” – Email-Worm.Win32.Zhelatin).

The authors of “Storm” worm spread their offspring are very active: apparently, they have created an entire factory to create new versions of the malicious program.

Some experts believe that the “Storm” Worm is a malicious program for the construction of a zombie network of new generation. The fact that the bot was designed and distributed by professionals in their field, and the architecture and the protection of zombie networks are well thought out, according to the following characteristics of the “Storm” botnet: (more…)

BotnetClassification of botnets today is quite simple. It is based on the architecture of botnets and the protocols used to control the bots.

Classification of botnets: Architecture

So far known only two types of architecture botnets.

  • Botnets with a single point. In this architecture with botnets of zombie computers all connected to one control center, or C & C (Command & Control Centre). C & C expects to add new bots, registers them in its database, to monitor their condition and gives them the team, the owner of the botnet selected from the list of available commands for the bot. Respectively, in the C & C shows all connected zombie computers, and centralized management zombie network web host must have access to the command center. (more…)