Abstract
The use of botnets for malicious activities has grown significantly in recent years. Criminals leverage the flexibility and anonymity associated with botnets to harvest personal data, generate spam, distribute malware and launch distributed denial-of-service attacks. These same attributes readily translate to applications that can support operations in warfare. In 2007, distributed denial-of-service attacks launched by botnets targeted IT assets belonging to Estonian banks, newspapers and parliament. This paper explores the use of botnets as instruments of warfare. Seven scenarios are used to demonstrate how traditional applications of botnets such as spam, theft of resources and distributed denial-of-service attacks can have implications across the spectrum of warfare. Additionally, the paper discusses the ethical and political concerns associated with the use of botnets by nation states.
Chapter PDF
Similar content being viewed by others
References
M. Bailey, E. Cooke, F. Jahanian, Y. Xu and M. Karir, A survey of botnet technology and defenses, Proceedings of the Cybersecurity Applications and Technology Conference for Homeland Security, pp. 299–304, 2009.
L. Brooks, Botnets: A Threat to National Security, M.S. Thesis, Department of Computer Science, Florida State University, Tallahassee, Florida, 2008.
A. Cole, M. Mellor and D. Noyes, Botnets: The rise of the machines, Proceedings of the Sixth Annual Security Conference, 2007.
M. Feily, A. Shahrestani and S. Ramadass, A survey of botnet and botnet detection, Proceedings of the Third International Conference on Emerging Security Information, Systems and Technologies, pp. 268–273, 2009.
International Committee of the Red Cross, Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol I), International Humanitarian Law – Treaties and Documents, Geneva, Switzerland (www.icrc.org/ihl.nsf/full/470?opendocument), June 8, 1977.
D. Kaplan, Coreflood-style takedowns may lead to trouble, SC Magazine, April 15, 2011.
J. Leonard, S. Xu and R. Sandhu, A framework for understanding botnets, Proceedings of the Fourth International Conference on Availability, Reliability and Security, pp. 917–922, 2009.
S. Liu, Surviving distributed denial-of-service attacks, IT Professional, vol. 11(5), pp. 51–53, 2009.
E. Mills, Microsoft legal punch may change botnet battles forever, CNET News (news.cnet.com/8301-27080_3-20015912-245.html), September 9, 2010.
Pew Research Center for the People and the Press, More young people cite Internet than TV – Internet gains on television as public’s main news source, Washington, DC (people-press.org/reports/pdf/689.pdf), January 4, 2011.
B. Prince, Botnet for sale business going strong, security researchers say, eWeek.com (www.eweek.com/c/a/Security/BotnetBotnet-for-Sale-Bu siness-Going-Strong-Security-Researchers-Say848696), October 25, 2010.
C. Smith, Egypt’s Facebook revolution: Wael Ghonim thanks the social network, Huffington Post, February 11, 2011.
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel and G. Vigna, Your botnet is my botnet: Analysis of a botnet takeover, Proceedings of the Sixteenth ACM Conference on Computer and Communications Security, pp. 635–647, 2009.
P. Wang, L. Wu, B. Aslam and C. Zou, A systematic study of peer-to-peer botnets, Proceedings of the Eighteenth International Conference on Computer Communications and Networks, 2009.
C. Wilson, Botnets, Cybercrime and Cyberterrorism: Vulnerabilities and Policy Issues for Congress, CRS Report for Congress, RL32114, Congressional Research Service, Washington, DC, 2008.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Koziel, E., Robinson, D. (2011). Botnets as an Instrument of Warfare. In: Butts, J., Shenoi, S. (eds) Critical Infrastructure Protection V. ICCIP 2011. IFIP Advances in Information and Communication Technology, vol 367. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24864-1_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-24864-1_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24863-4
Online ISBN: 978-3-642-24864-1
eBook Packages: Computer ScienceComputer Science (R0)