SZÁDECZKY, Tamás and Zsolt BEDERNA. Effects of botnets – a human-organisational approach. Security and Defence Quarterly. 2021, vol. 35, No 3, p. 25-44. ISSN 2300-8741. Available from: https://dx.doi.org/10.35467/sdq/138588.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Effects of botnets – a human-organisational approach
Authors SZÁDECZKY, Tamás (348 Hungary, belonging to the institution) and Zsolt BEDERNA.
Edition Security and Defence Quarterly, 2021, 2300-8741.
Other information
Original language English
Type of outcome Article in a journal
Field of Study 50501 Law
Country of publisher Poland
Confidentiality degree is not subject to a state or trade secret
WWW URL
RIV identification code RIV/00216224:14220/21:00124491
Organization unit Faculty of Law
Doi http://dx.doi.org/10.35467/sdq/138588
Keywords in English botnet; cybersecurity
Changed by Changed by: JUDr. Jakub Klodwig, učo 434044. Changed: 5/4/2022 23:02.
Abstract
Botnets, the remotely controlled networks of computers with malicious aims, have significantly affected the international order from Ukraine to the United States in recent years. Disruptive software, such as malware, ransomware, and disruptive services, provided by those botnets has many specific effects and properties. Therefore, it is paramount to improve the defences against them. To tackle botnets more or less successfully, one should analyse their code, communication, kill chain, and similar technical properties. However, according to the Business Model for Information Security, besides technological attributes, there is also a human and organisational aspect to their capabilities and behaviour. This paper aims to identify the aspects of different attacks and present an analysis framework to identify botnets’ technological and human attributes. After researching the literature and evaluating our previous findings in this research project, we formed a unified framework for the human-organisational classification of botnets. We tested the defined framework on five botnet attacks, presenting them as case studies. The chosen botnets were ElectrumDoSMiner, Emotet, Gamover Zeus, Mirai, and VPNFilter. The focus of the comparison was motivation, the applied business model, willingness to cooperate, capabilities, and the attack source. For defending entities, reaching the target state of defending capabilities is impossible with a one-time development due to cyberspace’s dynamic behaviour and botnets. Therefore, one has to develop cyberdefence and conduct threat intelligence on botnets using such methodology as that presented in this paper. This framework comprises people and technological attributes according to the BMIS model, providing the defender with a standard way of classification.
Links
EF16_019/0000822, research and development projectName: Centrum excelence pro kyberkriminalitu, kyberbezpečnost a ochranu kritických informačních infrastruktur
PrintDisplayed: 30/7/2024 14:24