What is botnet - How botnet works
Post by Jawad Ahmad Riaz
Internet is an advanced technology that performs different types of useful tasks over the network. In this technology a term ‘bot’ is used which come from the robot and it involves in performing different types of duties with the help of automated software. Botnet is the term that is evolved from the Bots and generally it is a group of different computer systems refereed to as the Zombie that work automatically with the help of remote devices. The infrastructure of the Botnets is depends upon the malicious software that is used by the hackers to hack the networks. All the computers used in the Botnets ate associated with the malware and the distributed system also. Botnets are easily transfer to the systems when users trying to connect the internet through browser.
How Botnet Works?
Working of the Botnet is quite specific and it is similar to that of the infections related to the malware. The people who used to spread or create the Botnets are those whole all well educated and very much aware from the networking field and also do programming and the development of the software. They are generally called as the ‘bot herders’. They are used to control the different computer devices from the remote locations and once they achieved a control on the computer networks. They sends different type of malicious components to the computers that are associated with the bot net over the network. With the help of such activities they can easily hack the personal information of the computers over internet.
How to Create a Botnet?
Bot herders used to create the Botnets with the help of different steps. Some of the important steps that are used to create the bot nets with the help of malicious software are listed below.
- First of all bot herders choose the networking media and locate the server of the local area network, then they install different types of viruses, malicious software and different type of infections which is then used to infect the other computer attached to the server of that particular network.
- Different types of advertisements also play role in spreading such type of botnets and infect the systems of the users that are present on the network.
- Spammers are hackers use different techniques to spread such infection. They are also user to contact the operators of the network for the sake of such job and can also get the permission of the botnets from the service providers.
- After this, spammers provide different type of infective messages or the viruses to the operators of IRC server to spread the spam or the bots to all the users
So, with the help of such methods or the conversation between the spammers or hackers with the operators of the networking media they can easily create and setup the botnet on the internet browsers.
Architecture of Botnets:
The working of the botnets depends upon the typical architectural frame that deals with different topologies to maintain the performance of the botnets and also helpful for the spammers to spread it more. Different type of changes in the architecture of the botnets has been evolved with the passage of time because topology of all the botnets are quite different from each other depends upon the commending and setting. With the help of their strong topological architecture the frame of the botnets is quite resistant to enumeration and other possibilities. Some of typical components that are used in the topology of the botnets are star, multiple servers, random and hierarchal. On the basis of such architecture we can easily detect or distinguish the botnets from other infections.advertisemet
Interested in Advertising your products or website with us? Click Why Advertising with us ?
Network access server :: What is workstation :: How to start career in network administration :: Computer security systems :: How do I choose best fire wire hard drive :: Internet security system :: What is NIPRNET :: What is SIPRnet :: What is ESATA :: ESATA connector :: What is wirefire port :: Master Slaves in hard drive :: What is processor Bus? :: SATA 6Gbs :: What is network Operating system :: What is Application cluster :: What is authentication server :: Home network server :: Linux terminal server project :: Network load balancer :: Virtual network computing :: Analog Vs digital signals :: Broadband troubleshooting :: Types of Broadband :: What is ADSL2+ :: Extranet vs Intranet :: Peer to peer networks :: What is scada computer system :: Advantages of Networking Intranetworking :: Types of networking cable :: Types of workstation :: Workstation Vs Desktop computers :: Business networking :: What is CRM sofware :: Electronic medical report :: What is Ethernet switch :: How ethernet works :: How to install unformatted hard drive in vista :: Installing windows server 2003 :: What is Network backup :: PointCast Network :: Networking internetworking :: Install and configure sata drive :: What is secure socket layer :: Terminal Server vs Virtual Desktop :: What is data logger :: What is IPsec ::
Browse All Categories
- WiFi Technology
- Wimax Technology
- Computer Networks
- Mobile Communication
- IT - Certifications
- Computer OS
- Computer Hardware
- Computer security
- Technology Reviews
- Networking Tutorials
- Other Technology articles
- Top 10
Lastest articles in Category