Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

Botnet

Index Botnet

A botnet is a number of Internet-connected devices, each of which is running one or more bots. [1]

92 relations: Advanced persistent threat, Akbot, Alureon, Antivirus software, Asprox botnet, Bagle (computer worm), Bitcoin, Bot herder, BotHunter, Bredolab botnet, Browser exploit, Bulletproof hosting, Chameleon botnet, Click fraud, Communication protocol, Computer cluster, Computer network, Computer worm, Conficker, Covert channel, Cutwail botnet, Cybercrime, Denial-of-service attack, Domain generation algorithm, Domain Name System, Donbot botnet, Drive-by download, EarthLink, Egress filtering, Email spam, Fast flux, Federal Bureau of Investigation, Festi botnet, Firewall (computing), Gameover ZeuS, GitHub, Great Cannon, Grum botnet, Gumblar, Hacktivism, Hypertext Transfer Protocol, InformationWeek, Instagram, Internet, Internet backbone, Internet bot, Internet of things, Internet Relay Chat, Kelihos botnet, Kraken botnet, ..., Lethic botnet, List of Internet Relay Chat commands, Low Orbit Ion Cannon, Mariposa botnet, Mega-D botnet, Mirai (malware), Network packet, Norton AntiBot, PC World, Peer-to-peer, Project Chanology, Public-key cryptography, Ramnit, Reddit, Robot, Rustock botnet, Sality, Sandia National Laboratories, SANS Institute, Simple Mail Transfer Protocol, Smartphone, Spambot, Spyware, Srizbi botnet, Storm botnet, Subdomain, Timeline of computer viruses and worms, Tor (anonymity network), Torpig, Trojan horse (computing), Twitter, United States Army Research Laboratory, Virtual machine, Vulcanbot, Waledac botnet, Wired (magazine), XMPP, ZeroAccess botnet, Zeus (malware), Zombie (computer science), .onion, 4chan. Expand index (42 more) »

Advanced persistent threat

An advanced persistent threat is a set of stealthy and continuous computer hacking processes, often orchestrated by a person or persons targeting a specific entity.

New!!: Botnet and Advanced persistent threat · See more »

Akbot

Akbot was a computer virus that infected an estimated 1.3 million computers and added them to a botnet.

New!!: Botnet and Akbot · See more »

Alureon

Alureon (also known as TDSS or TDL-4) is a trojan and bootkit created to steal data by intercepting a system's network traffic and searching for: banking usernames and passwords, credit card data, PayPal information, social security numbers, and other sensitive user data.

New!!: Botnet and Alureon · See more »

Antivirus software

Antivirus software, or anti-virus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

New!!: Botnet and Antivirus software · See more »

Asprox botnet

The Asprox botnet (discovered around 2008), also known by its aliases Badsrc and Aseljo, is a botnet mostly involved in phishing scams and performing SQL injections into websites in order to spread malware.

New!!: Botnet and Asprox botnet · See more »

Bagle (computer worm)

Bagle (also known as Beagle) was a mass-mailing computer worm affecting Microsoft Windows.

New!!: Botnet and Bagle (computer worm) · See more »

Bitcoin

Bitcoin (₿) is the world's first cryptocurrency, a form of electronic cash.

New!!: Botnet and Bitcoin · See more »

Bot herder

Bot herders are hackers who use automated techniques to scan specific network ranges and find vulnerable systems, such as machines without current security patches, on which to install their bot program.

New!!: Botnet and Bot herder · See more »

BotHunter

BotHunter is a free utility for Unix, which aims at detecting botnet activity within a network.

New!!: Botnet and BotHunter · See more »

Bredolab botnet

The Bredolab botnet, also known by its alias Oficla, was a Russian botnet mostly involved in viral e-mail spam.

New!!: Botnet and Bredolab botnet · See more »

Browser exploit

A browser exploit is a form of malicious code that takes advantage of a flaw or vulnerability in an operating system or piece of software with the intent to breach browser security to alter a user's browser settings without their knowledge.

New!!: Botnet and Browser exploit · See more »

Bulletproof hosting

Bulletproof hosting is a service provided by some domain hosting or web hosting firms that allows their customer considerable leniency in the kinds of material they may upload and distribute.

New!!: Botnet and Bulletproof hosting · See more »

Chameleon botnet

The Chameleon botnet is a botnet that was discovered on February 28, 2013 by the security research firm, spider.io.

New!!: Botnet and Chameleon botnet · See more »

Click fraud

Click fraud is a type of fraud that occurs on the Internet in pay-per-click (PPC) online advertising.

New!!: Botnet and Click fraud · See more »

Communication protocol

In telecommunication, a communication protocol is a system of rules that allow two or more entities of a communications system to transmit information via any kind of variation of a physical quantity.

New!!: Botnet and Communication protocol · See more »

Computer cluster

A computer cluster is a set of loosely or tightly connected computers that work together so that, in many respects, they can be viewed as a single system.

New!!: Botnet and Computer cluster · See more »

Computer network

A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.

New!!: Botnet and Computer network · See more »

Computer worm

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

New!!: Botnet and Computer worm · See more »

Conficker

Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008.

New!!: Botnet and Conficker · See more »

Covert channel

In computer security, a covert channel is a type of attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy.

New!!: Botnet and Covert channel · See more »

Cutwail botnet

The Cutwail botnet, founded around 2007, is a botnet mostly involved in sending spam e-mails.

New!!: Botnet and Cutwail botnet · See more »

Cybercrime

Cybercrime, or computer oriented crime, is crime that involves a computer and a network.

New!!: Botnet and Cybercrime · See more »

Denial-of-service attack

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

New!!: Botnet and Denial-of-service attack · See more »

Domain generation algorithm

Domain generation algorithms (DGA) are algorithms seen in various families of malware that are used to periodically generate a large number of domain names that can be used as rendezvous points with their command and control servers.

New!!: Botnet and Domain generation algorithm · See more »

Domain Name System

The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network.

New!!: Botnet and Domain Name System · See more »

Donbot botnet

Donbot, also known by its aliases Buzus and Bachsoy, is a botnet mostly involved in sending pharmaceutical and stock-based e-mail spam.

New!!: Botnet and Donbot botnet · See more »

Drive-by download

Drive-by download means two things, each concerning the unintended download of computer software from the Internet.

New!!: Botnet and Drive-by download · See more »

EarthLink

EarthLink is an IT services, network and communications provider headquartered in Atlanta, Georgia.

New!!: Botnet and EarthLink · See more »

Egress filtering

In computer networking, egress filtering is the practice of monitoring and potentially restricting the flow of information outbound from one network to another.

New!!: Botnet and Egress filtering · See more »

Email spam

Email spam, also known as junk email, is a type of electronic spam where unsolicited messages are sent by email.

New!!: Botnet and Email spam · See more »

Fast flux

Fast flux is a DNS technique used by botnets to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies.

New!!: Botnet and Fast flux · See more »

Federal Bureau of Investigation

The Federal Bureau of Investigation (FBI), formerly the Bureau of Investigation (BOI), is the domestic intelligence and security service of the United States, and its principal federal law enforcement agency.

New!!: Botnet and Federal Bureau of Investigation · See more »

Festi botnet

The Festi botnet, also known by its alias of Spamnost, is a botnet mostly involved in email spam and denial of service attacks.

New!!: Botnet and Festi botnet · See more »

Firewall (computing)

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

New!!: Botnet and Firewall (computing) · See more »

Gameover ZeuS

Gameover ZeuS is a peer-to-peer botnet based on components from the earlier ZeuS trojan.

New!!: Botnet and Gameover ZeuS · See more »

GitHub

GitHub Inc. is a web-based hosting service for version control using Git.

New!!: Botnet and GitHub · See more »

Great Cannon

The Great Cannon of China is an attack tool that is used to launch distributed denial-of-service attacks on websites by intercepting massive amounts of web traffic and redirecting them to targeted websites.

New!!: Botnet and Great Cannon · See more »

Grum botnet

The Grum botnet, also known by its alias Tedroo and Reddyb, was a botnet mostly involved in sending pharmaceutical spam e-mails.

New!!: Botnet and Grum botnet · See more »

Gumblar

Gumblar is a malicious JavaScript trojan horse file that redirects a user's Google searches, and then installs rogue security software.

New!!: Botnet and Gumblar · See more »

Hacktivism

In Internet activism, hacktivism or hactivism (a portmanteau of hack and activism) is the subversive use of computers and computer networks to promote a political agenda or a social change.

New!!: Botnet and Hacktivism · See more »

Hypertext Transfer Protocol

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems.

New!!: Botnet and Hypertext Transfer Protocol · See more »

InformationWeek

InformationWeek is a digital magazine which conducts corresponding face-to-face events, virtual events, and research.

New!!: Botnet and InformationWeek · See more »

Instagram

Instagram is a photo and video-sharing social networking service owned by Facebook, Inc. It was created by Kevin Systrom and Mike Krieger, and launched in October 2010 exclusively on iOS.

New!!: Botnet and Instagram · See more »

Internet

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.

New!!: Botnet and Internet · See more »

Internet backbone

The Internet backbone might be defined by the principal data routes between large, strategically interconnected computer networks and core routers on the Internet.

New!!: Botnet and Internet backbone · See more »

Internet bot

An Internet Bot, also known as web robot, WWW robot or simply -bot-, is a software application that runs automated tasks (scripts) over the Internet.

New!!: Botnet and Internet bot · See more »

Internet of things

The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data, creating opportunities for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits, and reduced human exertions.

New!!: Botnet and Internet of things · See more »

Internet Relay Chat

Internet Relay Chat (IRC) is an application layer protocol that facilitates communication in the form of text.

New!!: Botnet and Internet Relay Chat · See more »

Kelihos botnet

The Kelihos botnet, also known as Hlux, is a botnet mainly involved in spamming and the theft of bitcoins.

New!!: Botnet and Kelihos botnet · See more »

Kraken botnet

The Kraken botnet was the world's largest botnet.

New!!: Botnet and Kraken botnet · See more »

Lethic botnet

The Lethic Botnet (initially discovered around 2008) is a botnet consisting of an estimated 210 000 - 310 000 individual machines which are mainly involved in pharmaceutical and replica spam.

New!!: Botnet and Lethic botnet · See more »

List of Internet Relay Chat commands

This is a list of all Internet Relay Chat commands from RFC 1459, RFC 2812, and extensions added to major IRC daemons.

New!!: Botnet and List of Internet Relay Chat commands · See more »

Low Orbit Ion Cannon

Low Orbit Ion Cannon (LOIC) is an open-source network stress testing and denial-of-service attack application, written in C#.

New!!: Botnet and Low Orbit Ion Cannon · See more »

Mariposa botnet

The Mariposa botnet, discovered December 2008, is a botnet mainly involved in cyberscamming and denial-of-service attacks.

New!!: Botnet and Mariposa botnet · See more »

Mega-D botnet

The Mega-D, also known by its alias of Ozdok, is a botnet that at its peak was responsible for sending 32% of spam worldwide.

New!!: Botnet and Mega-D botnet · See more »

Mirai (malware)

Mirai (Japanese for "the future", 未来) is a malware that turns networked devices running Linux into remotely controlled "bots" that can be used as part of a botnet in large-scale network attacks.

New!!: Botnet and Mirai (malware) · See more »

Network packet

A network packet is a formatted unit of data carried by a packet-switched network.

New!!: Botnet and Network packet · See more »

Norton AntiBot

Norton AntiBot, developed by Symantec, monitors applications for damaging behavior.

New!!: Botnet and Norton AntiBot · See more »

PC World

PC World, stylized PCWorld, is a global computer magazine published monthly by IDG.

New!!: Botnet and PC World · See more »

Peer-to-peer

Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers.

New!!: Botnet and Peer-to-peer · See more »

Project Chanology

Project Chanology (also called Operation Chanology) was a protest movement against the practices of the Church of Scientology by members of Anonymous, a leaderless Internet-based group.

New!!: Botnet and Project Chanology · See more »

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

New!!: Botnet and Public-key cryptography · See more »

Ramnit

Ramnit is a Computer worm affecting Windows users.

New!!: Botnet and Ramnit · See more »

Reddit

Reddit (stylized in its logo as reddit) is an American social news aggregation, web content rating, and discussion website.

New!!: Botnet and Reddit · See more »

Robot

A robot is a machine—especially one programmable by a computer— capable of carrying out a complex series of actions automatically.

New!!: Botnet and Robot · See more »

Rustock botnet

The Rustock botnet was a botnet that operated from around 2006 until March 2011.

New!!: Botnet and Rustock botnet · See more »

Sality

Sality is the classification for a family of malicious software (malware), which infects files on Microsoft Windows systems.

New!!: Botnet and Sality · See more »

Sandia National Laboratories

The Sandia National Laboratories (SNL), managed and operated by the National Technology and Engineering Solutions of Sandia (a wholly owned subsidiary of Honeywell International), is one of three National Nuclear Security Administration research and development laboratories.

New!!: Botnet and Sandia National Laboratories · See more »

SANS Institute

The SANS Institute (officially the Escal Institute of Advanced Technologies) is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training and selling Certificates.

New!!: Botnet and SANS Institute · See more »

Simple Mail Transfer Protocol

Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission.

New!!: Botnet and Simple Mail Transfer Protocol · See more »

Smartphone

A smartphone is a handheld personal computer with a mobile operating system and an integrated mobile broadband cellular network connection for voice, SMS, and Internet data communication; most, if not all, smartphones also support Wi-Fi.

New!!: Botnet and Smartphone · See more »

Spambot

A spambot is a computer program designed to assist in the sending of spam.

New!!: Botnet and Spambot · See more »

Spyware

Spyware is software that aims to gather information about a person or organization sometimes without their knowledge, that may send such information to another entity without the consumer's consent, that asserts control over a device without the consumer's knowledge, or it may send such information to another entity with the consumer's consent, through cookies.

New!!: Botnet and Spyware · See more »

Srizbi botnet

Srizbi BotNet, considered one of the world's largest botnets, and responsible for sending out more than half of all the spam being sent by all the major botnets combined.

New!!: Botnet and Srizbi botnet · See more »

Storm botnet

The Storm botnet or Storm worm botnet (also known as Dorf botnet and Ecard malware) is a remotely controlled network of "zombie" computers (or "botnet") that have been linked by the Storm Worm, a Trojan horse spread through e-mail spam.

New!!: Botnet and Storm botnet · See more »

Subdomain

In the Domain Name System (DNS) hierarchy, a subdomain is a domain that is a part of a main domain.

New!!: Botnet and Subdomain · See more »

Timeline of computer viruses and worms

This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.

New!!: Botnet and Timeline of computer viruses and worms · See more »

Tor (anonymity network)

Tor is free software for enabling anonymous communication.

New!!: Botnet and Tor (anonymity network) · See more »

Torpig

Torpig, also known as Anserin or Sinowal is a type of botnet spread through systems compromised by the Mebroot rootkit by a variety of trojan horses for the purpose of collecting sensitive personal and corporate data such as bank account and credit card information.

New!!: Botnet and Torpig · See more »

Trojan horse (computing)

In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.

New!!: Botnet and Trojan horse (computing) · See more »

Twitter

Twitter is an online news and social networking service on which users post and interact with messages known as "tweets".

New!!: Botnet and Twitter · See more »

United States Army Research Laboratory

The Army Research Laboratory (ARL) is the U.S. Army's corporate research laboratory.

New!!: Botnet and United States Army Research Laboratory · See more »

Virtual machine

In computing, a virtual machine (VM) is an emulation of a computer system.

New!!: Botnet and Virtual machine · See more »

Vulcanbot

Vulcanbot is the name of a botnet predominantly spread in Vietnam, apparently with political motives.

New!!: Botnet and Vulcanbot · See more »

Waledac botnet

Waledac, also known by its aliases Waled and Waledpak, was a botnet mostly involved in e-mail spam and malware.

New!!: Botnet and Waledac botnet · See more »

Wired (magazine)

Wired is a monthly American magazine, published in print and online editions, that focuses on how emerging technologies affect culture, the economy, and politics.

New!!: Botnet and Wired (magazine) · See more »

XMPP

Extensible Messaging and Presence Protocol (XMPP) is a communication protocol for message-oriented middleware based on XML (Extensible Markup Language).

New!!: Botnet and XMPP · See more »

ZeroAccess botnet

ZeroAccess is a Trojan horse computer malware that affects Microsoft Windows operating systems.

New!!: Botnet and ZeroAccess botnet · See more »

Zeus (malware)

Zeus, ZeuS, or Zbot is a Trojan horse malware package that runs on versions of Microsoft Windows.

New!!: Botnet and Zeus (malware) · See more »

Zombie (computer science)

In computer science, a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.

New!!: Botnet and Zombie (computer science) · See more »

.onion

.onion is a special-use top level domain suffix designating an anonymous hidden service reachable via the Tor network.

New!!: Botnet and .onion · See more »

4chan

4chan is an English-language imageboard website.

New!!: Botnet and 4chan · See more »

Redirects here:

Bot HTTP Request, Bot net, Bot nets, BotNet, Botnets, C&C server, Command and control (malware), Command and control server, Command-and-control server, Control and command server, DoSnet, Dosnet, Xarvester, Zombie botnet, Zombie network.

References

[1] https://en.wikipedia.org/wiki/Botnet

OutgoingIncoming
Hey! We are on Facebook now! »