Presentation Title

Using Cloud Computing To Develop A Botnet

Presenter Information

Mark Miller

Mentor

Wei Lu

Location

L. P. Young Student Center – Lantern And East Dining Rooms

Abstract

In the last decade, cloud computing has become very popular. Cloud computing is the usage of centrally located computers used for data storage and computing resources. Cloud computing is often used for web applications because it is a cheap option for using very powerful computers. In this research, we designed a botnet, a network of computers (bots) remotely controlled by one person (the bot master), that utilizes cloud computing. Bot masters often use botnets to spam email addresses, attack webservers, or distribute adware. It is often the bot master’s goal to acquire as many bots as possible, usually by distributing malware to an unsuspecting victim’s computers, because having more bots makes their botnet much more powerful. Using cloud computing, we are able to quickly create a very powerful botnet in minutes, without compromising anyone’s computers.

Share

COinS
 
Apr 11th, 4:15 PM Apr 11th, 5:15 PM

Using Cloud Computing To Develop A Botnet

L. P. Young Student Center – Lantern And East Dining Rooms

In the last decade, cloud computing has become very popular. Cloud computing is the usage of centrally located computers used for data storage and computing resources. Cloud computing is often used for web applications because it is a cheap option for using very powerful computers. In this research, we designed a botnet, a network of computers (bots) remotely controlled by one person (the bot master), that utilizes cloud computing. Bot masters often use botnets to spam email addresses, attack webservers, or distribute adware. It is often the bot master’s goal to acquire as many bots as possible, usually by distributing malware to an unsuspecting victim’s computers, because having more bots makes their botnet much more powerful. Using cloud computing, we are able to quickly create a very powerful botnet in minutes, without compromising anyone’s computers.