Sunday, September 8, 2019
Information Technology Essay Example | Topics and Well Written Essays - 1000 words
Information Technology - Essay Example Once a computer falls into the bonet, it tends to perform in a slower manner (Leigh 2006). Protocols and Systems that Attackers use today to Control and Update Botnets Communication Protocols of Botnets. A wide number of distinct system connections of protocols are controlled by botnets. These include HTTP, IM, IRC and P2P protocols. These procedures help in communication or avail the source of the botnet and as well as the software equipments that can be utilized in the botnet. Control and Command Techniques (C and C). Immediately the malware of the bot enters to the affected machines, the bot controller or master takes the initiative of discovering the given network of affected machinery; this happens by a given method of communique to perform the desired procedure. A solitary and straightforward process of conveying messages amongst the affected networks and their controllers is kept by powering an express communication connection. On the other hand, this nonstop connection is abl e to position the bot controller with much ease, hence that method of sending messages is neglected so much. In their place, a number of well thought-out control words as well as systematized procedure known as C and C (Command and Control) techniques are made to make the botnets active distantly. The contact connecting the C and C machinery and bots appears to be the feeblest linkage within the bonet but without it, the prey obscure doesnââ¬â¢t perform like a harmonized system (Song 2010). The two various categories of C and C used by attackers to control and update bonnets today include; Control technique and Centralized Command With the C and C method, it makes use of a high and essential bandwidth horde known as the Command and Control server for forwarding data among a variety of affected computers. The given Command and Control server in the specified botnet could be a negotiated machine which manages a given set of the services of the network like HTTP and IRC, and many mo re, further more, it assembles the instructions given from the bot controller or master to every horde within that botnet which connect the Command and Control server canal. The Botnets make use of a variety of devices to defend their connections. This involves the utilization of protected passwords which are made by the bot controllers. The centralized Command and Control server is mainly the principal Command and Control technique. Nowadays, the majority of attackers use the centralized Command and Control, due to its capability of great productivity and itââ¬â¢s simply reachable (Husain 2008). Peer 2 Peer Command and Control (C and C) Technique The peer to peer Command and Control system makes use of a Peer to Peer communication without a specific mid server to frontward the packet messages in between the botnets, this is as a result making the P2P technique more tough to any breakdown within the given system. However, this classification is fairly rough to establish as well a s terminate, even though one or more bots may be disengaged, it has no effect upon the functioning within a bonnet (Brian 2008). Q. 2 Secured Evidence of 3-DES and RSA 3-DES and RSA are mutually convention procedures which are applied in the encryption of data. Workstation set-ups function within such a manner that, data packets
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.