Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Cybercriminal Organizations: Utilization of Botnets
Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
2016 (engelsk)Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
Abstract [en]

Botnets, networks of hundreds to millions of computers, controlled by one or more individuals, increasingly play a part in cybercrimes, with astonishing results. The access of a botnet gives the controller abilities of a large majority of all the cyberattacks over the internet, and with the possibility of buying a complete botnet, this opens the market to nontechnical criminals. The Darknet and the market it provides, enable the buyers to buy and trade everything from botnets and malware to complete schemes.

 

The increase in cybercriminal activities and organizations has been alarmingly high in recent years, and no wonder, when criminals just need to invest a small amount of money to gain potentially millions of dollars without any advance knowledge of computer science, and with only a slight chance of getting caught due to the anonymity of the internet and botnets.

 

Based on a literature review combined with a critically reflective analysis of a selection of information about botnets from other sources available on the internet, this paper has identified some of the main types of organizations used in cybercrime and their operations as well as basic information about botnets, the players and stakeholders in this area, the theft and schemes used by botnets and the online money laundering service involved. 

sted, utgiver, år, opplag, sider
2016. , s. 36
Emneord [en]
Botnets, Cybercriminal Organizations, Security, Money Laundering.
HSV kategori
Identifikatorer
URN: urn:nbn:se:bth-12918OAI: oai:DiVA.org:bth-12918DiVA, id: diva2:952839
Fag / kurs
DV1478 Bachelor Thesis in Computer Science
Utdanningsprogram
DVGIS Security Engineering
Veileder
Examiner
Tilgjengelig fra: 2016-09-09 Laget: 2016-08-15 Sist oppdatert: 2018-01-10bibliografisk kontrollert

Open Access i DiVA

fulltext(1293 kB)853 nedlastinger
Filinformasjon
Fil FULLTEXT02.pdfFilstørrelse 1293 kBChecksum SHA-512
b4955cb69108b792cda93027625d66e9c86edf704cad8c1ab60e2e48fffbe31c6a04f4623939acae53d8b95b5aee3e153e09aa9fb1a3a1d7c64d7ac02d06a69d
Type fulltextMimetype application/pdf

Av organisasjonen

Søk utenfor DiVA

GoogleGoogle Scholar
Totalt: 853 nedlastinger
Antall nedlastinger er summen av alle nedlastinger av alle fulltekster. Det kan for eksempel være tidligere versjoner som er ikke lenger tilgjengelige

urn-nbn

Altmetric

urn-nbn
Totalt: 1260 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf