Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the concept of botnets, which are networks of compromised hosts controlled by a single entity. It explains botnet configurations, such as star and hybrid topologies, and discusses defense strategies against botnets, including attacking the command and control infrastructure. The lecture also delves into the monetization of botnets through activities like DDoS extortion, click fraud, and distributing ransomware. An example botnet, Mirai, targeting IoT devices is presented, along with its impact and defense mechanisms. Additionally, the lecture touches on other types of malware like Rabbit, logic bombs, and scareware, emphasizing the significance of understanding and defending against malicious software.