Security Architecture

Phatbot, Agobot, and XtremBot all belong to the same botnet family.

a. Pick one of these variants and discuss its command and control structure.

Don't use plagiarized sources. Get Your Custom Essay on
Security Architecture
Just from $13/Page
Order Essay

b. These botnets are open source projects that are distributed under the GNU General Public License (GPL). This is highly unusual for malware—most malware writers are arrested and jailed if they are caught. Why do you suppose that the authors of these botnets are not punished?

It has been suggested that from the perspective of signature detection, malware now far outnumbers goodware. That is, the number of signatures required to detect malicious programs exceeds the number of legitimate programs.

a. Is it plausible that there could be more malware than legitimate programs? Why or why not?

b. Assuming there is more malware than goodware, design an improved signature-based detection system.

In contrast to a flash worm, a slow worm is designed to slowly spread its infection while remaining undetected. Then, at a preset time, all of the slow worms could emerge and do something malicious. The net effect would be similar to that of a flash worm.

a. Discuss one weakness (from Trudy’s perspective) of a slow worm as compared with a flash worm.

b. Discuss one weakness (also from Trudy’s perspective) of a flash worm compared with a slow worm

Place Order
Grab A 14% Discount on This Paper
Pages (550 words)
Approximate price: -
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Try it now!

Grab A 14% Discount on This Paper

Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.