Botnets implies to the networks of computer systems that hackers have spread an infection and assembled with each other under their management for propagating viruses, send illegal spam, and carry out attacks that results in web sites crashing.
What makes botnets exceedingly bad is the difficulty in tracing them back to their originators as well as the ever rising utilization of them in extortion schemes. How are they used in extortion schemes? Imagine that anyone sends you a messages to either for paying up or for see your web site crashing. This scenario is starting to replay itself over and over again.
Botnets can consist of thousands of compromised machines. With such a large network, botnets can make the utilization of DDoS (Distributed denial of service) as a method to cause mayhem and chaos. For example a small botnet with only 500 bots can bring corporate web sites to there knees by using the combined bandwidth of all the computers to overwhelm corporate systems and thereby cause the web site to appear offline.
Jeremy Kirk, IDG News Service on January 19, 2006, quotes Kevin Hogan, in his article “Botnets shrinking in size, harder to trace”, As per Hogan, extortion schemes have come up supported by the power of botnets, and hackers also hire the large number of computers for illegal purposes through advertisements on the internet.
One well-known technique to combat botnets is a honeypot. Honeypots helps in discovering the way how attackers infiltrate systems. A Honeypot is essentially a set of resources that one plans to make a deal in order to perceive the way of breaking the hacker’s system. Unpatched Windows 2000 or XP machines make top honeypots given the comfort with which one can get hold over such systems.
There are a great sites to read up on this topic. These sites can providing you an assistant in understanding the tools, strategies and rationale involved in computer and network attacks, and share the lessons learned.”