<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">SDQ</journal-id><journal-title-group><journal-title>Security &amp; Defence Quarterly</journal-title><abbrev-journal-title>SDQ</abbrev-journal-title></journal-title-group><issn pub-type="epub">2544-994X</issn><publisher><publisher-name>Akademia Sztuki Wojennej</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">SDQ-00145-2021</article-id><article-categories><subj-group subj-group-type="heading"><subject>RESEARCH PAPER</subject></subj-group></article-categories><title-group><article-title>Effects of botnets – a human-organisational approach</article-title></title-group><contrib-group content-type="authors"><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-7569-1278</contrib-id><name><surname>Szádeczky</surname><given-names>Tamás</given-names></name><xref ref-type="aff" rid="aff1">1</xref><email>szadeczky@mail.muni.cz</email></contrib><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-0444-7275</contrib-id><name><surname>Bederna</surname><given-names>Zsolt</given-names></name><xref ref-type="aff" rid="aff2">2</xref><email>bederna.zsolt@stud.uni-obuda.hu</email></contrib><aff id="aff1"><label>1</label>Masaryk University, Žerotínovonám. 617/9, 601 77 Brno, Czech Republic</aff><aff id="aff2"><label>2</label>Obuda University, Bécsi út 96/B, 1034 Budapest, Hungary</aff></contrib-group><pub-date pub-type="epub"><day>26</day><month>06</month><year>2021</year></pub-date><volume>0</volume><issue>0</issue><fpage>1</fpage><lpage>32</lpage><history><date date-type="received"><day>07</day><month>04</month><year>2021</year></date><date date-type="rev-recd"><day>01</day><month>06</month><year>2021</year></date><date date-type="accepted"><day>06</day><month>06</month><year>2021</year></date></history><abstract><p>Botnets, the remotely controlled networks of computers with malicious aims, have significantly affected the international order from Ukraine to the United States in recent years. Disruptive software, such as malware, ransomware, and disruptive services, provided by those botnets has many specific effects and properties. Therefore, it is paramount to improve the defences against them. To tackle botnets more or less successfully, one should analyse their code, communication, kill chain, and similar technical properties. However, according to the Business Model for Information Security, besides technological attributes, there is also a human and organisational aspect totheir capabilities and behaviour.This paper aims to identify the aspects of different attacks and present an analysis framework to identify botnets’ technological and human attributes.After researching the literature and evaluating our previous findings in this research project, we formed a unified framework for the human-organisational classification of botnets.We tested the defined framework on five botnet attacks, presenting them as case studies. The chosen botnets wereElectrumDoSMiner, Emotet, Gamover Zeus, Mirai, and VPNfilter. The focus of the comparison was motivation, the applied business model, willingness to cooperate, capabilities, and the attack source. For defending entities, reaching the target state of defending capabilities is impossible with a one-time development due to cyberspace’s dynamic behaviour and botnets. Therefore, one has to develop cyber-defence and conduct threat intelligence on botnets using such methodology as that presented in this paper. This framework comprises people and technological attributes according to the BMIS model, providing the defender with a standard way of classification.</p></abstract><kwd-group><kwd>capabilities</kwd><kwd>botnet</kwd><kwd>cyberattack</kwd></kwd-group></article-meta></front><body><sec id="S1" sec-type="intro"><title>Introduction</title><p>In cybersecurity, several actors operatewiththeir own objectives, preferences, tools, and tactics. Since the actors behave according to their strategies and payoffs for actions, one can regard them as players who play a big game in cyberspace limited byresource constraints.There may well be some collaborators and some enemies of an actor in more layers, as a player may be a person or a group of people (<xref ref-type="bibr" rid="ref14">Chukwudi, 2017</xref>, p. 45), to defend or attack a specific system. To achievetheir objectives, attackers and defenders apply some or even several tools to carry out their activities; and one of the most preferred tools of the attackers are botnets.</p><p>In fact,because “many areas of cybersecurity are also interconnected with national security” (<xref ref-type="bibr" rid="ref21">Dobák, 2021</xref>), the essential services defined in the NIS Directive (<xref ref-type="bibr" rid="ref23">European Union, 2016</xref>; <italic>Directive (EU) 2016/1148 of the European Parliament and of the Council, 2016</italic>) are frequently the targets of botnet attacks. Previous research (<xref ref-type="bibr" rid="ref8">Bederna, Rajnai and Szadeczky, 2021</xref>) showed that criminals often use botnets against such services. Operators of digital infrastructure, financial and banking sectors were the victims of distributed denial of Services (DDoS), for example, by Mirai botnet’s operation. Furthermore, criminals targeted the health, transport, and financial and banking sectors with ransomware attacksthat halted operations for hours or even days. Not to mention that Governmental services also suffered from such an attack. However, criminals targeted them with the aim of espionage.</p><p>Although “most of the cyber-attacks against information systems, services or national information critical infrastructure originates fromdifferent networks […] made from infected end-points or network devices” (<xref ref-type="bibr" rid="ref9">Bederna and Szadeczky, 2019</xref>, p. 45), botnets are “only” tools in attackers’ hands, but quite complex ones. So, due to their functionalities and the types of attacks, ENISA (the <xref ref-type="bibr" rid="ref25">European Union Agency for Network and Information Security (ENISA), n.d.</xref>) has categorised botnets as the most dangerous threats. As <xref ref-type="fig" rid="F1">Figure 1</xref> shows, these ‘tools’ have been with us since the first Internet worm was created in 1988 with limited C&amp;C capabilities, although thehistory of botnets started in 1999 with the Sub7 trojan and the Pretty Park worm. Since that time, botnets have evolved in the applied topologies and protocols, and threat actors have added important capabilities.</p><fig id="F1" orientation="portrait" position="float"><label>Figure 1</label><caption><p>Evolution of botnets</p><p>Source: <xref ref-type="bibr" rid="ref12">Cantón (n.d.)</xref>.</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/138588/SDQ-00145-2021-g001_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/138588/SDQ-00145-2021-g001.jpg"/></fig><p>From the defending perspective, the applied topology, protocols, and technical capabilities and attributes are inevitably important. However, if one wants to understand botnets’ ecosystems, he or she should view botnets holistically, analysing technical and non-technical attributes. This paper aims to identify some essential technical and non-technical attributes that create a basic ontological model to facilitate such analyses, applying the information security perspective Business Model for Information Security (BMIS) model of ISACA (<xref ref-type="bibr" rid="ref59">von Roessing, 2010</xref>). According to the BMIS, each organisation (attackers and defenders) comprises three essential (static) elements as (1) people, (2) process, and (3) technology, distinguishing among entities’ components the people, relevant processes, and tools and technology analysing the attackers in security games.In this context, botnets and their applicationshave various attributes. The paper first identifies the threat parameters of attackers and the possible technical effects of botnets on attacked entities to reach this target. Finally, in the case studies section,analysis of the five chosen botnetsapplies the pre-defined frameworkbefore the summary and the conclusion.</p></sec><sec id="S2"><title>Threat parameters of botnets</title><p>All the technological elements of botnets serve the botmasters’ will and behave according to their will. The whole or part of a botnet behaves according to its botmaster’s (or botherder’s) commands materialisingthe playing strategy. Regarding the BMIS model, thecommand and control (C&amp;C) servers and the connected bots comprise the technology factor; and the botmaster,which is a person or a group of persons, is the human (people) factor.Therefore, there are various limitations in the operation of botnets. These boundaries include the various types of personal, organisational, or technical attributes, which are thebotmaster’s motivation, the applied business model, willingness to cooperate, and human and technical capabilities. These parameters are discussed in the next subsections.</p><sec id="S2_1"><title><italic>Motivation</italic></title><p>With the application of botnets as tools, botmasters aim tocommit different types ofcybercrimes. <xref ref-type="bibr" rid="ref30">Halder and Jaishankar (2012)</xref> describe cybercrimes as the “offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as the Internet (networks including chat rooms, e-mails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)”.</p><p>Based on the definition, one can distinguish criminals’ objectives according to the attacker’s effectuate will.As information is becomingmore and more advantageous for individuals, businesses, and states, an attacker frequently aims to steal, leak, or destruct information processed by the targeted systems, or aims to disrupt operation due to anger, avenge, or for political reasons.</p><p>In effect, the motivation integrates the source of motives such as biological, social, and psychological needs, wants, or desires and the probable effects of any given action (<xref ref-type="bibr" rid="ref46">Ryan and Deci, 2000</xref>). However, organisations or researchers may apply different categorisations. For example, <xref ref-type="bibr" rid="ref58">Verizon (2020)</xref> distinguishes financial, espionage, and FIG (Fun, Ideology, and Grudges), despite the fact that one conducts espionage by political or even economic motivation.Therefore, applying espionage as motivation is not accurate, not to mention that espionage is a tool or action to get confidential data of the targeted entity. On the other hand, <xref ref-type="bibr" rid="ref29">Gandhi <italic>et al</italic>. (2011)</xref>, applied a methodology comprising political, socio-cultural, and economicmotivation as high-level factors; yet, the socio-cultural factor’s elements they applied can belong to the FIG or political motivation.Accordingly, we apply the high-level categorisation for thebotmasters’ motivation as (1) financial, (2) political, or (3) fun, ideology, and grudges (FIG).</p></sec><sec id="S2_2"><title><italic>Applied business models</italic></title><p>It is beyond question that cybercrimes have evolvedoverthe last decade. Furthermore, today, there are highly sophisticated cybercrimes available as businesses. Cybercrime as a Service is a business model forcybercriminals offering services, infrastructure, and knowledge to be rented (<xref ref-type="bibr" rid="ref39">Manky, 2013</xref>), which incorporates (1) the Crimeware as a Service, (2) the Cybercrime Infrastructure as a Service, and (3) the Hacking as a Service.</p><p>In Crimeware as a Service, cybercriminals offer general or specifically targeted identified vulnerabilities and related exploits. For example, to this category, zero-day vulnerabilities, malware such as rootkits, ransomware belong, as well as droppers, keyloggers, and hiding tools (<xref ref-type="bibr" rid="ref52">Szőr, 2005</xref>). However, they are the main building blocks for creating a botnet.Criminals offer infrastructural elements, specifically clients and servers under the aegis of the Cybercrime Infrastructure as a Service, making others ableto rent a botnet or typically a part of a botnet with a limited set of capabilities. Clients, as part of a botnet, are ready to process the renter’s commands.Already in 2006, the Zeus botnet was the first that couldbe rented quickly in Darknet. It arose with spyware capabilities, and overthe years, with version updates, some new features have been added to the original capabilities (<xref ref-type="bibr" rid="ref9">Bederna and Szadeczky, 2019</xref>, p. 10). Hence, when planning a botnet, the botmaster can compare the income from renting with life-cycle costs such as acquiring malware, spreading, and maintenance (<xref ref-type="bibr" rid="ref44">Putman, Abhishta, and Nieuwenhuis, 2018</xref>, pp. 443–444).</p><p>Using Hacking as a Service solution, an attacker can outsource the complete attacking process to the “service provider” including planning and performing on-demand.</p></sec><sec id="S2_3"><title><italic>Cooperation willingness</italic></title><p>Today’s complex and comprehensive relations induce interactions between entities in any situation represented in a strategic form that describes players’ action (<xref ref-type="bibr" rid="ref20">Do <italic>et al</italic>., 2017</xref>). In a security game, a player follows his or her strategy, which is the plan of actionswiththe payoff (<xref ref-type="bibr" rid="ref35">Liang and Xiao, 2013</xref>). According to the noncooperative versus cooperative game-theoretic approaches, a critical aspect of a game is the players’ cooperation behaviour. A noncooperative player chooses a strategy to optimise his or her interests. Contrarily, a cooperative player has a joint strategy for mutually achieving benefits with other players (<xref ref-type="bibr" rid="ref20">Do <italic>et al</italic>., 2017</xref>). However, the cooperation willingness can materialise in several layers in the technology and people factors of the BMIS model.</p><p>Creating and operating a botnet can be an easy and lonelytask if one is using pre-defined elements offered via Crimeware as a Service (<xref ref-type="bibr" rid="ref44">Putman, Abhishta, and Nieuwenhuis, 2018</xref>, p. 445). However, developing a comprehensive botfrom the beginning requires several actors to be involved, such as vulnerability analysts, exploit developers, bot collectors, bot maintainers, operators, remote personnel, developers, testers, sysadmins, and managers (<xref ref-type="bibr" rid="ref41">Miller, 2010</xref>). So, individuals as players of the security games can commit a crime separately or in a groupthat hasthe same motivation. Furthermore, different threat actors may also cooperate. For example, in June 2016, “the US Democratic National Committee (DNC) announced that it had suffered a network compromise. Evidence proved two separate breaches, one carried outby APT28 and the other by another Russian group, APT29 (aka Cozy Bear)” (<xref ref-type="bibr" rid="ref9">Bederna and Szadeczky, 2019</xref>). There is no information on whether the two groups cooperated or not, but in effect, at least, they did not work against each other.</p><p>However, in the technology factor, C&amp;C servers may communicate and cooperate with bots belonging to another botnet. Collaboration (<xref ref-type="bibr" rid="ref13">Chang <italic>et al</italic>., 2015</xref>, pp. 648–649) may exist inter-family and intra-family botnet.On the other hand, noncooperative attacking players may take over the command centre’s control (<xref ref-type="bibr" rid="ref15">Cimpanu, 2019</xref>) or hijack or remove other botnets’ agents (<xref ref-type="bibr" rid="ref31">IBM Corporation, 2016</xref>, p. 11).</p></sec><sec id="S2_4"><title><italic>Capabilities</italic></title><p>Capabilities incorporate the tools, tactics, and procedures (TTP) in the attacker’s portfolio, which has changed tremendously over time, generally and in connection with botnets.In 1999, the Pretty Park contained only a limited number of competencies. It connected to a remote IRC server and reported basic system information as an operating system’s version, login names, and e-mail addresses (<xref ref-type="bibr" rid="ref6">Banday, Qadri, and Shah, 2009</xref>, p. 2). Eight years later, when the Zeus botnet started its career, its main capabilities were (1) reporting system information, (2) stealing protected storage information, (3) stealing online credential information, and (4) contacting the C&amp;C server for additional tasks to perform, as the agents’ code had built-in commands waiting to be executed (<xref ref-type="bibr" rid="ref1">Alzubaidy and Hatim, 2015</xref>, p. 123).</p><p>Today, as per ENISA (2019, pp. 130–131), botnets pose at being multi-staged and modular threats that have several features such as (1) self-propagation, (2) self-destruction, (3) anonymous communication, (3) persistent behaviour, (4) origin obfuscation, and (5) downloading payloads and installing themeven in the memory.Furthermore, one can distinguish botnet features according to their functionalities such as the (1) command module, (2) control module, (3) infection module, and (4) stealth module. The command module sends commands to the agents, and the control module controls the ownerships and relationships between the C&amp;C and the bot. The infection module’s task is to find vulnerable network nodes, such as servers, client machines, network devices, and the Internet of Things (IoT), and infect them. The stealth module has an essential role in hiding from antimalware services or even disabling their functionalities.</p><p>The commands that the command module carries determine the given botnet’s capabilities that performattacking activities. The effectuated attack depends on the botmaster’s motives. Such an attack is mainly one of the following : DDoS, phishing, spam and spim (spammed instant messages) sending, spyware, adware, ransomware cryptocurrency mining, fake news propagation, and more. The disruptionware simply overwrites or wipes the data stored on the infected device without any possibility of recovering it.</p></sec></sec><sec id="S3"><title>Used resources of attacked and utilised entities</title><p>Eventually, the botnets’ capabilities determine the used or affected resources on the attacked entities and its operation’s technical effects.As a botnet is acollection of its connected bots, which is an agent on infected nodes to tackle with the nodes’ resources to perform given tasks, one can regarda botnet as a distributed system with separated resources for achieving a common goal in a certain sense. Hence, botnets tackle the infected computers’ computational capacity, and networking, and process data to conduct an attack on the infected machines or targetfurther uninfected ones. The following subsections contain an analysis ofthe specifics of these parameters.</p><sec id="S3_1"><title><italic>Computational capacity</italic></title><p>As a botnet can be thought of as a distributed system with non-interactive workloads, it handles its bots’ computational resource. Therefore, a botnet’s computational capacity is the aggregated amount of its bots’ capacity.The computational capacity (or performance) is the amount of valuable work accomplished by a computer system, which depends on response time, throughput, and the computer system’s execution time. The response time is the time interval from the starting point to completing a task, which includes waiting for input or output and other processes, accessing disk and memory, and the time spent on execution time. The throughput is the total amount of computing tasks done in a given interval.</p></sec><sec id="S3_2"><title><italic>Networking</italic></title><p>An attacker can use the network resources of the infected machines for attacking other entities. However, enterprises usually follow basic principles such as the hierarchical network model and modularity (<xref ref-type="bibr" rid="ref16">Cisco, 2014a</xref>) in the planning, implementing, and operating of their network. This design method involves dividing the network into discrete layers, in which each layer in the hierarchy provides specific functions within the overall network (<xref ref-type="bibr" rid="ref17">Cisco, 2014b</xref>). Nevertheless, the Internet is also a hierarchical network based on the autonomous systems (ASs) concept, which is routing domainscomprising a collection of routers under the same administration. The Internetencompasses several smaller and bigger Internet Service Providers (ISPs), Internet Exchange Points (IXPs), and Content Delivery Networks (CDNs) (<xref ref-type="bibr" rid="ref19">Dey <italic>et al</italic>., 2018</xref>).</p><p>This hierarchical approach of enterprise networks and the Internet is crucial as it gives limitations and opportunities for the attackers. The limitations originate from the fact that a bot has a restrained network bandwidth of the infected computer resources. Furthermore, the malicious traffic has to flow over aggregated connections, such as between the enterprise and the ISP, or between ISPs.However, on the other hand, the hierarchical structureallows the aggregating of the malicious traffic to achieve ahigher performance, e.g., for DDoS or spamming. Moreover, the attacked entity also has the limitationsa bot has; therefore, it is possible to get the desired effect with a lower performance from the attacker’s viewpoint if the targeted systems have fewer available resources such as bandwidth or computational capacity.</p></sec><sec id="S3_3"><title><italic>Processed data</italic></title><p>In every presence and in each status, data assets have theirconfidentiality, integrity, and availability parameters (<xref ref-type="bibr" rid="ref7">Beckers, 2015</xref>). Confidentiality means only authorised users and processes can access or modify data; so, one has to protect processed data from unauthorised access and misuse.Integrity is the protection of data from unauthorised alteration; hence, a defender has tomaintain the data in a correct state,ensuring that nobody or no process canmodify it, either accidentally or maliciously improperly. According to the availability parameter, data has to be accessiblepromptlyand uninterruptedly to authorised users and processes. An attack can therefore specifically affect at least one of its parameters such as confidentiality, integrity, or availabilityof specific data or a set of data depending on the botmaster’s motivation and the botnet’ capabilities.</p></sec></sec><sec id="S4"><title>Technical effects of botnets</title><p>Based on the previous chapter’sdiscussion about the effects on the processed data’s confidentiality, integrity, or availability, the following subsectionsdiscuss the attack types mentioned in the Capabilities section, according to the attacked entity’s main technical effects.</p><sec id="S4_1"><title><italic>Confidentiality focus attacks</italic></title><p>Spyware collects and shares personal and confidential information without the user’s consent (<xref ref-type="bibr" rid="ref5">Aycock, 2011</xref>). The information may include the company’s proprietary data, computer, network data, personal data about the user, such as activities and behaviour from various applications as, e.g., browsers and instant messengers. Spyware can transfer all the information to the botmaster via its C&amp;C server. The adware that is a particular category of spyware works as a tool for advertisingand collects the user information and behaviour for interested advertisers or other interested parties without their consent. It can display advertisements on the screen of a given user, most often within a web browser.</p><p>Phishing is the mechanism of crafting messages that use social engineering techniques to fraudulently attempt to obtain sensitive information from users (<xref ref-type="bibr" rid="ref34">Khonji, Iraqi, and Jones, 2013</xref>). It tricks the recipients into clicking on a link that points to an unsafe URL, hand over their credentials via legitimate-looking websites, online payment, and similar. It is typically carried out via e-mail spoofing or instant messaging. Spear phishing is directedat specific individuals or companies, while whaling attacks specifically senior executives and other high-profile targets.</p></sec><sec id="S4_2"><title><italic>Integrity focus attacks</italic></title><p>Cryptocurrency mining (or cryptojacking) refers to the method that uses the processing power of the victim’s device without his or her consent to mine cryptocurrencies. It may work with the installation of software on a user’sdevice that would run in the background or a browser aftervisiting a malicious website. The algorithm is about to generate units of a cryptocurrency that would go back into the attacker’s wallet (<xref ref-type="bibr" rid="ref22">Eskandari <italic>et al</italic>., 2018</xref>). It wastes bandwidth and computational capacity. The user may noticea reductionin the speed and efficiency of legitimate computing workloads. The extra computation increases the power consumption causing direct costs. Furthermore, if the code runs on a mobile device, it also negatively affects its battery lifetime.</p><p>Fake news (or hoaxes; <xref ref-type="bibr" rid="ref53">Tandoc, Lim, and Ling, 2018</xref>) is not a new phenomenon; however, digitalisation has facilitated itsdiffusion via social media, making online visitorsmore susceptible to popularity indicators. Social bots (<xref ref-type="bibr" rid="ref49">Siddiqui, Healy, and Olmsted, 2018</xref>) can spread non-curated content using trending topics and hashtags. Their primary strategy is to reach a broader audience, which, in many cases, further helps the propagation of fake news by (1) tweeting fake news items or (2) replying or commenting on the postings of real social media users with false information.</p><p>Fake news delivery is also possible with spams and spims. Spam and spimare abusive uses of e-mail and instant messaging to flood unsolicited messages in bulk. Despite its low cost, spamming causes a massive waste of time and resources for recipients and service providers in network bandwidth and storage.</p><p>On the other hand, ransomware stops users from accessing the data they use, and it may freezetheir devices, too. For users to be able to release locked devices, an online payment ransom is demanded, typically in cryptocurrency (<xref ref-type="bibr" rid="ref60">Youngblood, 2016</xref>). Criminals have committed ransomware attacks against a variety of organisations as victims paid the ransom in many cases. Nowadays, it has evolved from stand-alone attacks to campaigns. The victims of these attacks not only suffer financial losses, but also lose their credibility.</p></sec><sec id="S4_3"><title><italic>Availability focus attacks</italic></title><p>Disruptionware is a particular category of malware that is designed to suspend operations within the targeted organisation. It aims to suspend operations and disrupt continuity; therefore, it is devastating in mission-critical systems and legacy systems that lack redundancy (<xref ref-type="bibr" rid="ref11">Brichant and Eftekhari, 2019</xref>). Worms, file infectors, wipers, and even subcategories of ransomware belong to this category. A worm replicates itself over the network from device to device without the guidance of its creator. A file infector infects executable files by overwriting them or inserting infected code that disables them. A wiper deletes all the data stored on the infected device. In the case of disruptionware, the attacked and utilised entities are the same.</p><p>On the other hand, a DDoS attack attempts to disrupt the targeted entity’s regular traffic or service behaviour by overwhelming the target or its surrounding infrastructure. In the case of a DDoS attack, the attacked and the utilised entities are distinct. A DoS attack occurs when an attacker makes the target machine local or network resource unavailable to its intended users temporarily or indefinitely. Such solutions as physical disruption, MAC, TCP, UDP, ICMP flood, and the routing protocol modification in the network infrastructures also belong to DoS.</p><p>According to the TCP/IP model (<xref ref-type="bibr" rid="ref45">Ravali, 2013</xref>), there are (1) Internet layer attacks such as ICMP flood, smurf attack, and ping of death, (2) Transport layer attacks such as syn flood and UDP flood, and (3) Application layer attacks such as malformed SSL requests, and HTTP, telnet, FTP requests, andDNS attacks (<xref ref-type="bibr" rid="ref51">Specht and Lee, 2004</xref>).</p></sec></sec><sec id="S5"><title>Case studies</title><p>The following subsections contain ananalysis of specific botnets according to the discussed attributes. The chosen botnets try to represent the most dangerous or spectacular ones from the last decade, specifically: (1) ElectrumDoSMiner, (2) Emotet, (3) Gamover Zeus, (4) Mirai, and (5) VPNfilter.</p><sec id="S5_1"><title><italic>ElectrumDoSMiner</italic></title><p>Threat actors have causedmany users of the Electrum Bitcoin wallet to be victims of phishing attacks, at least sinceDecember 2018, by tricking them into downloading a malicious version of the wallet by exploiting a weakness of the Electrum software. As a result, attackers were able to stealmany bitcoins from their owners. In February, the developers of Electrum decided to exploit the same flaw to force them to download the latest patched version to tackle this problem. In March, Electrum tried to exploit another vulnerability unknown to the public. Shortly after, criminals launched distributed DDoS attacks against Electrum servers. Theseattacks stopped legitimate Electrum servers dealing with legitimate requests meaningpreviously untouched clients turned to rogue servers which stole from other wallets (<xref ref-type="bibr" rid="ref37">Malwarebytes Labs, 2019a</xref>).</p><p><bold><xref ref-type="table" rid="T1">Table 1</xref></bold> presents the threat parameters of ElectrumDoSMiner, which applied Crimeware as Service tools such as the Smoke loader and the RIG exploit kit, stipulating its TTP, to conduct a DDoS attack. An interesting point is that by analysing the infected machines’ geolocation, the largest concentration was in the Asia Pacific region (<bold><xref ref-type="fig" rid="F2">Figure 2</xref></bold>).</p><table-wrap id="T1" orientation="portrait" position="float"><label>Table 1</label><caption><p>Threat parameters of ElectrumDoSMiner</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th>Motivation</th><th>Financial</th></tr></thead><tbody valign="top"><tr><td>Business model</td><td>The threat actor may have used Crimeware as a Service to apply the Smoke loader and the RIG exploit kit (<xref ref-type="bibr" rid="ref38">Malwarebytes Labs, 2019b</xref>). The Smoke Loader (<xref ref-type="bibr" rid="ref42">MITRE ATT&amp;CK, 2019</xref>) has been able toload other malware since 2011, and the RIG exploit kit (<xref ref-type="bibr" rid="ref27">FireEye, 2018</xref>) can be considered a repository or collection of various exploits.</td></tr><tr><td>Cooperation willingness</td><td>There is no information on whether it has taken over other bots or cooperatedwith other C&amp;C servers or other criminals.</td></tr><tr><td>Capabilities</td><td>Its TTP is stipulated by the Smoke Loader and the RIG exploit kit.</td></tr><tr><td>Attack capabilities</td><td>DDoS attack</td></tr><tr><td>Used resources on attacked entities</td><td>Network resources and computational capacity of Electrum clients</td></tr><tr><td>Technical effects on attacked entities</td><td>The integrity of the Electrum clients and confidentiality of the Electrum valets</td></tr><tr><td>Used resources on utilised entities</td><td>Network resources of bots</td></tr><tr><td>Technical effects on utilised entities</td><td>The integrity of the system and availability of network</td></tr></tbody></table></table-wrap><fig id="F2" orientation="portrait" position="float"><label>Figure 2</label><caption><p>Presence of ElectrumDoSMiner</p><p>Source: <xref ref-type="bibr" rid="ref38">Malwarebytes Labs (2019b)</xref>.</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/138588/SDQ-00145-2021-g002_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/138588/SDQ-00145-2021-g002.jpg"/></fig></sec><sec id="S5_2"><title><italic>Emotet</italic></title><p>Emotetwas initially a banking trojan. Its first detection in the wild was in 2014. However, it disappeared in 2016 and 2017. As seenlater, its operators had updated the trojan and reconfigured it to work primarily as a loader for other malware, e.g., spam as Trickbot and ransomware as Ryuk (<xref ref-type="bibr" rid="ref28">Fortinet, 2019</xref>). Furthermore, in September 2019, it ran three separate botnets called Epoch 1, Epoch 2, and Epoch 3 to reducethe probability and the effect of a takeover or a takedown (<xref ref-type="bibr" rid="ref50">Spamhouse, 2019</xref>).</p><p><bold><xref ref-type="table" rid="T2">Table 2</xref></bold> discusses the threat parameters of Emotet, which is a botnet offering a loader functionality for others as, e.g., Trickbot and Ryuk; it is in effect a Cybercrime Infrastructure as a Service tool. Therefore, some capabilities depend on the carried botnets. An examination of the presence of infections (<bold><xref ref-type="fig" rid="F3">Figure 3</xref></bold>) reveals the most affected countries are Germany, the United States, India, the Russian Federation, and China.</p><table-wrap id="T2" orientation="portrait" position="float"><label>Table 2</label><caption><p>Threat parameters of Emotet</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th>Motivation</th><th colspan="3">Financial</th></tr></thead><tbody valign="top"><tr><td>Business model</td><td colspan="3">With the reconfiguration, the threat actor behind Emotet has been offering the botnet as Cybercrime Infrastructure as a Service.</td></tr><tr><td>Cooperation willingness</td><td colspan="3">Due to the business model, it has delivered other malware, including Trickbot and Ryuk.</td></tr><tr><td>Capabilities</td><td colspan="3">Its TTP is described in (<xref ref-type="bibr" rid="ref48">Security Boulevard, 2020</xref>).</td></tr><tr><td rowspan="2">Attack capabilities</td><td colspan="3">Emotet is a loader; therefore, the attack type depends on the delivered payload.</td></tr><tr><td>Spam (e.g., Trickbot)</td><td>Ransomware (e.g., Ryuk)</td><td>Further payload(s)</td></tr><tr><td>Used resources on attacked entity</td><td>Network and storage</td><td>Storage</td><td>Depending on the payload(s)</td></tr><tr><td>Technical effects on attacked entities</td><td>Availability and integrity of network and storage</td><td>The integrity of storage media on attacked entities</td><td>Depending on the payload(s)</td></tr><tr><td>Used resources on utilised entity</td><td>Network resources of bots</td><td>Network resources of bots</td><td>Depending on the payload(s)</td></tr><tr><td>Technical effects on utilised entities</td><td>The integrity of system and availability of network on the attacked entities</td><td>The integrity and the availability of system and availability of network on the attacked entities</td><td>Depending on the payload(s)</td></tr></tbody></table></table-wrap><fig id="F3" orientation="portrait" position="float"><label>Figure 3</label><caption><p>Presence of Emotet</p><p>Source: <xref ref-type="bibr" rid="ref33">Kaspersky (2018)</xref>.</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/138588/SDQ-00145-2021-g003_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/138588/SDQ-00145-2021-g003.jpg"/></fig></sec><sec id="S5_3"><title><italic>Gameover Zeus</italic></title><p>Gameover Zeus (GOZ) is a variant of the Zeus family, andwas identified in September 2011 using a decentralised peer-to-peer infrastructure of the compromised end-points. GOS utilised its P2P network for communicating commands, binary updates, or configuration and sent back stolen data in which it employed encryption to evade detection. Furthermore, GOZ was responsible for spreading Cryptolocker ransomware, spamming, data theft, and DDoS (<xref ref-type="bibr" rid="ref47">Sandee, 2015</xref>). However, due tosuccessfulcooperation, law enforcement agencies were able to takedown GOZ in May 2014 (<xref ref-type="bibr" rid="ref26">Europol, 2014</xref>).</p><p><bold><xref ref-type="table" rid="T3">Table 3</xref></bold> presents the threat parameters of GOZ, from which there are two interesting points: (1) there were a sophisticated cooperation of several threat actors working as a group, to create the botnet, which is explicitly known by security researchers, and (2) GOZ builders are not sold to individuals, showing less cooperation willingness. According to the geolocation attributes (<bold><xref ref-type="fig" rid="F4">Figure 4</xref></bold>), the infected machines were mostly in the United States, India, and the United Kingdom.</p><table-wrap id="T3" orientation="portrait" position="float"><label>Table 3</label><caption><p>Threat parameters of Gameover Zeus</p></caption><table frame="border" rules="groups"><tbody valign="top"><tr><td>Motivation</td><td colspan="4">Financial motivation from stealing banking account details and a ransomware attack<break/>Political motivation because it conducted “searches for documents with certain levels of government secret classifications, and for specific government intelligence agency employees, and information about politically sensitive issues” (<xref ref-type="bibr" rid="ref47">Sandee, 2015</xref>, p. 9)</td></tr><tr><td>Business model</td><td colspan="4">N/A</td></tr><tr><td>Cooperation willingness</td><td colspan="4">After the Zeus code became publicly available, the Zeus 2.1.0.X, used by the JabberZeuS group, morphed into GOZ. There were two leaders, a support crew, and several preferred suppliers to implement and troubleshoot certain features. There were also operators for the bots and the backend infrastructure (<xref ref-type="bibr" rid="ref47">Sandee, 2015</xref>).<break/>“Gameover builders are not sold to individuals. Instead, they are privately operated which means only one Gameover botnet is running” (<xref ref-type="bibr" rid="ref54">Trend Micro, 2014</xref>)</td></tr><tr><td>Capabilities</td><td colspan="4">“[…] the builder has a number of functions, one of which is to build updates with a number of configurable settings, and another is to communicate with the peer-to-peer network to interact with it in a number of ways, including distributing configurations and updates. For interaction with the peer-to-peer network, the builder needsa list of seed nodes, specified with the kbucket option […]” (<xref ref-type="bibr" rid="ref3">Antonakakis <italic>et al</italic>., 2017</xref>, p. 11)<break/>“The newer version of the builder came both with built in rootkit (Nercurs) and new options, which included crawling the peer-to-peer network, and the inclusion of support for creating signed plugins […]” (<xref ref-type="bibr" rid="ref3">Antonakakis <italic>et al</italic>., 2017</xref>, p. 12)</td></tr><tr><td>Attack capabilities</td><td>DDoS</td><td>Spam</td><td>Ransomware</td><td>Spyware</td></tr><tr><td>Used resources on attacked entities</td><td>Network resources and computational capacity</td><td>Network and storage</td><td>Storage</td><td>Processed data</td></tr><tr><td>Technical effects on attacked entities</td><td>Availability</td><td>Availability and integrity of network and storage</td><td>The integrity of storage media on attacked entities</td><td>Confidentiality of files, documents, and any processed data</td></tr><tr><td>Used resources on utilised entities</td><td colspan="3">Network resources of bots</td><td>Utilised and attacked entities are the same</td></tr><tr><td>Technical effects on utilised entities</td><td colspan="3">Integrity of system and availability of network</td><td>Utilised and attacked entities are the same</td></tr></tbody></table></table-wrap><fig id="F4" orientation="portrait" position="float"><label>Figure 4</label><caption><p>Presence of Gameover Zeus</p><p>Source: <xref ref-type="bibr" rid="ref32">Ilascu (2014)</xref>.</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/138588/SDQ-00145-2021-g004_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/138588/SDQ-00145-2021-g004.jpg"/></fig></sec><sec id="S5_4"><title><italic>Mirai</italic></title><p>Threat actors made Mirai, the infamous botnet, which was comprised of hundreds of thousands of thingbotsweaponising the Internet of things (IoT). Mirai started its DDoS attacks in August 2016. In early October, its developer released the Mirai source code as open-source. It infected more than 300,000 IoT devices, and soon after, it had more thana half-million thingbots. Mirai was in charge of attacks against Dyn DNS infrastructure, the French OVH datacentre and cloud provider, and the Deutsche Telekom infrastructure (<xref ref-type="bibr" rid="ref3">Antonakakis <italic>et al</italic>., 2017</xref>).</p><p>Due to its open-source nature, it has had several variants, such as Satori, Okiru, and Owari (<xref ref-type="bibr" rid="ref36">Liu and Wang, 2018</xref>). Even Android smartphones were targets for bot-creation (<xref ref-type="bibr" rid="ref56">Ullrich, 2018</xref>). However, one version of Satori, a variant of Mirai, changed the profile to crypto mining. After infecting, it switched the wallet to the attacker’s wallet, resulting inall coins being generated for the attacker (<xref ref-type="bibr" rid="ref4">Ashford, 2018</xref>).</p><p>According to the threat parameters of Mirai, depicted in <bold><xref ref-type="table" rid="T4">Table 4</xref></bold>, there was massive cooperation willingness among threat actors and business efforts from the botnet’s operator(s), who had managed IoT devices-based bots worldwide (<bold><xref ref-type="fig" rid="F5">Figure 5</xref></bold>).</p><table-wrap id="T4" orientation="portrait" position="float"><label>Table 4</label><caption><p>Threat parameters of Mirai</p></caption><table frame="border" rules="groups"><tbody valign="top"><tr><td>Motivation</td><td>Financial for botmaster<break/>Possibly FIG for renter</td><td colspan="2">Depending on the variant, e.g. it is usually the same as the original Mirai, but the cryptomining variant of Satori was created with clear financial gain in mind</td></tr><tr><td>Business model</td><td>Its developer had made its code open-source on the Darknet, and thingbots may have been rented (<xref ref-type="bibr" rid="ref10">Bing, 2016</xref>).</td><td colspan="2">Probably the DDoS capable variants were alsorented (<xref ref-type="bibr" rid="ref36">Liu and Wang, 2018</xref>).</td></tr><tr><td>Cooperation willingness</td><td colspan="3">There is no information about botnet takeovers or cross communications between Mirai variants or other bots.</td></tr><tr><td>Capabilities</td><td>Its kill chain is described in (<xref ref-type="bibr" rid="ref40">Manuel, 2018</xref>) and (<xref ref-type="bibr" rid="ref3">Antonakakis <italic>et al</italic>., 2017</xref>, pp. 2–3).</td><td colspan="2">Due to the open-source nature of its source code, there are several variants with various capabilities,e.g. the OMG set up 3proxy on thingbots.</td></tr><tr><td>Attack capabilities</td><td>DDoS</td><td>DDoS (e.g., Satori)</td><td>Cryptomining (e.g., Satori.miner variant)</td></tr><tr><td>Used resources on attacked entities</td><td>Network resources and computational capacity</td><td>Network resources and computational capacity</td><td>Computational capacity</td></tr><tr><td>Technical effects on attacked entities</td><td>Availability</td><td>Availability</td><td>The integrity of computer and wallets</td></tr><tr><td>Used resources on utilised entities</td><td>Network resources of bots</td><td>Network resources of bots</td><td>Utilised and attacked entities are the same</td></tr><tr><td>Technical effects on utilised entities</td><td>The integrity of the system and availability of network</td><td>The integrity of the system and availability of network</td><td>Utilised and attacked entities are the same</td></tr></tbody></table></table-wrap><fig id="F5" orientation="portrait" position="float"><label>Figure 5</label><caption><p>Presence of Mirai.</p><p>Source: <xref ref-type="bibr" rid="ref43">Montalbano (2018)</xref>.</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/138588/SDQ-00145-2021-g005_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/138588/SDQ-00145-2021-g005.jpg"/></fig></sec><sec id="S5_5"><title><italic>VPNfilter</italic></title><p>VPNFilter initially attacked devices located in Ukraine, but it spread to other countries very quickly. In May 2018, one of the most extensive campaigns was reported as having comprosed around 500,000 bots. However, after the VPNfilter attack, Ukraine started developingcyber-defence capabilities (<xref ref-type="bibr" rid="ref57">Vakulyk <italic>et al</italic>., 2020</xref>).</p><p>The botnetapplied a multi-stage and modular infection. The first stage had the capability of boot persistence on devices; the second stage acted as a RAT, and the thirdstage included plugins to enhance functionalities. By the application of its RAT functions, it collected data, inspected local traffic, hijacked network data, communicated on the Tor network, and even wiped local firmware to destroy a specific device or all infected devices (<xref ref-type="bibr" rid="ref18">Cisco Talos, 2018</xref>). Cisco Talos researchers found an interrelation between VPNFilter and BlackEnergydisruptionware that targeted the Ukrainian powergrid in the winter of 2015–2016 (<xref ref-type="bibr" rid="ref2">Anomali, 2019</xref>). Both were the product of the APT28 group. There is no information about the business model and cooperation willingness, see <bold><xref ref-type="table" rid="T5">Table 5</xref></bold>; however, according to the conditional sponsorship of the Russian government, there must have been certain cooperation. Although the VPNfilter started mainly in Ukraine, its presence has changed worldwide (<bold><xref ref-type="fig" rid="F6">Figure 6</xref></bold>).</p><table-wrap id="T5" orientation="portrait" position="float"><label>Table 5</label><caption><p>Threat parameters of VPNfilter</p></caption><table frame="border" rules="groups"><tbody valign="top"><tr><td>Motivation</td><td>Political becauseit was the product of the APT28 group, which is “most probably sponsored by the Russian government. […] its primary interests are in the Caucasus, Eastern European Governments and Militaries, NATO and Other European Security Organisations including the European Defence Exhibitions” (<xref ref-type="bibr" rid="ref9">Bederna and Szadeczky, 2019</xref>, p. 53).</td></tr><tr><td>Business model</td><td>N/A</td></tr><tr><td>Cooperation willingness</td><td>N/A</td></tr><tr><td>Capabilities</td><td>Its kill chain is described in <xref ref-type="bibr" rid="ref24">ENISA (2019)</xref>, and its TTP is in <xref ref-type="bibr" rid="ref18">Cisco Talos (2018)</xref>.<break/>It is a multi-stage and modular malware that has “the capabilities of an intelligence-collection platform, such as file collection, command execution, data exfiltration, and device management, and some versions possessed a self-destruct capability that overwrites a critical portion of the device’s firmware and reboots the device” (<xref ref-type="bibr" rid="ref9">Bederna and Szadeczky, 2019</xref>, p. 57).</td></tr><tr><td>Attack capabilities</td><td>Spyware</td></tr><tr><td>Used resources on attacked entities</td><td>It utilised storage and accessed processed data</td></tr><tr><td>Technical effects on attacked entities</td><td>Confidentiality of any processed data<break/>The integrity of the infected end-points operation system<break/>Availability of processed data in the case of sanitisation</td></tr><tr><td>Used resources on utilised entities</td><td>Utilised and attacked entities are the same</td></tr><tr><td>Technical effects on utilised entities</td><td>Utilised and attacked entities are the same</td></tr></tbody></table></table-wrap><fig id="F6" orientation="portrait" position="float"><label>Figure 6</label><caption><p>Presence of VPNfilter</p><p>Source: <xref ref-type="bibr" rid="ref55">Trend Micro (2021)</xref>.</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/138588/SDQ-00145-2021-g006_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/138588/SDQ-00145-2021-g006.jpg"/></fig></sec></sec><sec id="S6" sec-type="discussion"><title>Discussion</title><p>For analysing the attributes of botnets, this paper created a framework for a comprehensive review of the ecosystemof botnets, as shown in <bold>Figure 7</bold>. Botmasters as threat actors havethe motivation, evenchoosing a business model to operate, and may have (non-)cooperation willingness. As the technology factor of a botnet attack, theyuse the resources ofthe attacked and utilised entities, and technical effectssuch as confidentiality (C), integrity (I), andavailability (A) define botnet behaviour.</p><fig id="F7" orientation="portrait" position="float"><label>Figure 7</label><caption><p>Identified attributes of the botnet ecosystem</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/138588/SDQ-00145-2021-g007_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/138588/SDQ-00145-2021-g007.jpg"/></fig><p>Based on the defined framework, this paper reviewed five botnets,the ElectrumDoSMiner, Emotet, Gamover Zeus, Mirai, and VPNfilter. Utilising such a botnet, as Mirai was during its peak activity, has the potential to paralyse networks. Even another type of botnet, like VPNfilter is able to steal files, documents, and any processed data. Moreover, when a cyberattack hits an unprepared country as it didUkrainethroughVPNfilter in 2018, the effect may be multiplied. However, Ukraine has learnt from the attack and started improving its cyber-defence capabilities, i.e. according to the BMIS elements. <bold><xref ref-type="table" rid="T6">Table 6</xref></bold> displays these discussed parameters according to the created model.</p><table-wrap id="T6" orientation="portrait" position="float"><label>Table 6</label><caption><p>Comparison of the reviewed botnets</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th colspan="2"/><th align="center">ElectrumDosMinter</th><th colspan="2" align="center">Emotet</th><th colspan="4" align="center">Gamover Zeus</th><th align="center">Mirai</th><th align="center">VPNfilter</th></tr></thead><tbody valign="top"><tr><td rowspan="3">Possible motivation</td><td>Financial</td><td align="center">X</td><td align="center">X</td><td align="center">X</td><td colspan="4" align="center">X</td><td align="center">X</td><td align="center"/></tr><tr><td>Political</td><td align="center"/><td/><td align="center"/><td colspan="4" align="center">X</td><td align="center"/><td align="center">X</td></tr><tr><td>FIG</td><td align="center"/><td align="center"/><td align="center"/><td colspan="4" align="center"/><td align="center">X</td><td align="center"/></tr><tr><td rowspan="3">Business model</td><td>Crimeware as a Service</td><td align="center">X</td><td align="center"/><td align="center"/><td colspan="4" align="center">?</td><td align="center"/><td align="center">?</td></tr><tr><td>Cybercrime Infrastructure as a Service</td><td align="center"/><td align="center">X</td><td align="center">X</td><td colspan="4" align="center">?</td><td align="center">X</td><td align="center">?</td></tr><tr><td>Hacking as a Service</td><td align="center"/><td align="center"/><td align="center"/><td colspan="4" align="center">?</td><td align="center"/><td align="center">?</td></tr><tr><td rowspan="2">Cooperation willingness</td><td>Cooperative</td><td align="center">?</td><td align="center">X</td><td align="center">X</td><td colspan="4" align="center">X</td><td align="center"/><td align="center">?</td></tr><tr><td>Noncooperative</td><td align="center">?</td><td align="center"/><td align="center"/><td colspan="4" align="center"/><td align="center"/><td align="center">?</td></tr><tr><td>Capabilities</td><td/><td colspan="9" align="center">Described by TTPs</td></tr><tr><td rowspan="2"/><td rowspan="2">Attack</td><td align="center" rowspan="2">DDoS</td><td colspan="2" align="center">Loader</td><td align="center" rowspan="2">DDoS</td><td align="center" rowspan="2">Spam</td><td align="center" rowspan="2">Ransomware</td><td align="center" rowspan="2">Spyware</td><td align="center" rowspan="2">DDoS</td><td align="center" rowspan="2">Spyware</td></tr><tr><td align="center">Spam (Trickbot)</td><td align="center">Rans (Ryuk)</td></tr><tr><td rowspan="4">Used resource of attacked entity</td><td>Comp. capacity</td><td align="center">X</td><td align="center"/><td align="center"/><td align="center">X</td><td align="center"/><td align="center"/><td align="center"/><td align="center"/><td align="center"/></tr><tr><td>Networking</td><td align="center">X</td><td align="center">X</td><td align="center"/><td align="center">X</td><td align="center">X</td><td align="center"/><td align="center"/><td align="center">X</td><td align="center"/></tr><tr><td>Storage</td><td align="center"/><td align="center">X</td><td align="center">X</td><td align="center"/><td align="center">X</td><td align="center">X</td><td align="center"/><td align="center"/><td align="center"/></tr><tr><td>Processed data</td><td align="center"/><td align="center"/><td align="center"/><td align="center"/><td align="center"/><td align="center"/><td align="center">X</td><td align="center"/><td align="center">X</td></tr><tr><td rowspan="4">Used resource of utilised entity</td><td>Comp. capacity</td><td align="center"/><td align="center"/><td align="center"/><td align="center"/><td align="center"/><td align="center"/><td align="center"/><td align="center"/><td align="center"/></tr><tr><td>Networking</td><td align="center">X</td><td align="center">X</td><td align="center">X</td><td align="center">X</td><td align="center">X</td><td align="center">X</td><td align="center"/><td align="center"/><td align="center"/></tr><tr><td>Storage</td><td align="center"/><td align="center"/><td align="center"/><td align="center"/><td align="center"/><td align="center"/><td align="center"/><td align="center"/><td align="center"/></tr><tr><td>Processed data</td><td align="center"/><td align="center"/><td/><td/><td/><td/><td/><td align="center"/><td/></tr><tr><td rowspan="2">Technical effect on the</td><td>attacked entity</td><td align="center">C,I</td><td align="center">I,A</td><td align="center">I,A</td><td>A</td><td>I,A</td><td align="center">I</td><td>C,I</td><td align="center">A</td><td>C,I,A</td></tr><tr><td>utilised entity</td><td align="center">I</td><td align="center">I,A</td><td align="center">I,A</td><td>I</td><td>I</td><td align="center">I</td><td/><td align="center">I,A</td><td/></tr></tbody></table></table-wrap></sec><sec id="S7" sec-type="conclusions"><title>Conclusion</title><p>Without any doubt, botnets, as a beloved tool of attackers,have become more sophisticated in the last two decades. Indeed, attackers have been employing botnets with different motivations and capabilities; therefore, there are also differences in thetechnical effects. Furthermore, considering the advancements of information technology and the dependence of today’s society on (critical) infrastructure, a botnet being deployed directly or indirectly on (critical) infrastructural elements canhave devastating effects.</p><p>For defending entities, achievingthe target state of defending capabilities is impossible with a one-time development due to cyberspace’s dynamic behaviour and, hence, botnets. One’s cyber-defence needs to be developed and threat intelligence on botnets carried out using themethodology discussed in this paper. This framework comprises people and technological attributes according to the BMIS model. The people factor encompasses motivation, business model, and cooperation willingness; and the technology factor covers some aspects of capabilities as the used resources ofthe attacked and the utilised entities, and technical effectssuch as confidentiality, integrity, andavailability define the behaviour of botnets. The application of the created model highlights important parts of the overall botnet ecosystems. In effect, the human attributes such as motivation, the applied business model, and cooperation willingness are most important. Based on the case studies, the applied business model and the cooperation willingness attributes can fundamentally affect the behaviour of botnets, although the current model does not handle this connection. Nevertheless, based on the case studies, the geolocation data can also serve as important data for a given botnet. Furthermore, the current processes are not detailed. According to the authors’ opinion, this model can enhance the recognition of the botnets’ ecosystem after the inclusion of the missing attributes and further important technological attributes outside the paper’s scope.</p></sec></body><back><ref-list><ref id="ref1"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alzubaidy</surname>, <given-names>L</given-names></string-name>. and <string-name><surname>Hatim</surname>, <given-names>K</given-names></string-name></person-group>. (<year>2015</year>) <article-title>'Analysis and detection of the Zeus Botnet crimeware'</article-title>, <source>International Journal of Computer Science and Information Security</source>, <volume>13</volume>, pp. <fpage>121</fpage>-<lpage>135</lpage>.</mixed-citation></ref><ref id="ref2"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Anomali</collab></person-group> (<year>2019</year>) <article-title>APT28 timeline of malicious activity</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://forum.anomali.com/t/apt28-timeline-of-malicious-activity/2019">https://forum.anomali.com/t/apt28-timeline-of-malicious-activity/2019</ext-link> (Accessed: 21 February 2019).</mixed-citation></ref><ref id="ref3"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Antonakakis</surname>, <given-names>M</given-names></string-name>. <etal>et al</etal></person-group>. (<year>2017</year>) <article-title>'Understanding the Mirai Botnet'</article-title>, <source>USENIX Security</source>. <pub-id pub-id-type="doi">10.1016/j.religion.2008.12.001</pub-id></mixed-citation></ref><ref id="ref4"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Ashford</surname>, <given-names>W</given-names></string-name></person-group>. (<year>2018</year>) <article-title>Next-gen Mirai botnet targets cryptocurrency mining operations, Computer Weekly.com</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.computerweekly.com/news/450433414/Next-gen-Mirai-botnet-targets-cryptocurrency-mining-operations">https://www.computerweekly.com/news/450433414/Next-gen-Mirai-botnet-targets-cryptocurrency-mining-operations</ext-link> (Accessed: 21 April 2020).</mixed-citation></ref><ref id="ref5"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Aycock</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2011</year>) <article-title>Spyware and adware</article-title>. <publisher-loc>&gt;Switzerland AG</publisher-loc>: <publisher-name>Springer</publisher-name>. <pub-id pub-id-type="doi">10.1007/978-0-387-77741-2</pub-id>.</mixed-citation></ref><ref id="ref6"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Banday</surname>, <given-names>M.T</given-names></string-name>., <string-name><surname>Qadri</surname>, <given-names>J.A</given-names></string-name>. and <string-name><surname>Shah</surname>, <given-names>N.A</given-names></string-name></person-group>. (<year>2009</year>) <article-title>'Study of botnets and their threats to internet security'</article-title>, <source>Sprouts: Working Papers on Information Systems</source>, <volume>9</volume>(<issue>24</issue>), <fpage>9</fpage>-<lpage>24</lpage>.</mixed-citation></ref><ref id="ref7"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Beckers</surname>, <given-names>K</given-names></string-name></person-group>. (<year>2015</year>) <article-title>Pattern and security requirements engineering-based establishment of security standards</article-title>. <source>Switzerland AG: Springer</source>. <pub-id pub-id-type="doi">10.1007/978-3-319-16664-3</pub-id>.</mixed-citation></ref><ref id="ref8"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bederna</surname>, <given-names>Z</given-names></string-name>., <string-name><surname>Rajnai</surname>, <given-names>Z</given-names></string-name>. and <string-name><surname>Szadeczky</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2021</year>) <article-title>'Attacks against energy, water and other critical infrastructure in the EU', in 2020 IEEE 3rd international conference and workshop on electrical and power engineering (CANDO-EPE), Óbuda</article-title>, <source>Hungary</source>. <pub-id pub-id-type="doi">10.1109/CANDO-EPE51100.2020.9337751</pub-id></mixed-citation></ref><ref id="ref9"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bederna</surname>, <given-names>Z</given-names></string-name>. and <string-name><surname>Szadeczky</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2019</year>) <article-title>'Cyber espionage through botnets'</article-title>, <source>Security Journal</source>, <volume>33</volume>, pp. <fpage>43</fpage>-<lpage>62</lpage>. <pub-id pub-id-type="doi">10.1057/s41284-019-00194-6</pub-id>.</mixed-citation></ref><ref id="ref10"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Bing</surname>, <given-names>C</given-names></string-name></person-group>. (<year>2016</year>) <article-title>You can now buy a Mirai-powered botnet on the dark web, CYBERSCOOP</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.cyberscoop.com/mirai-botnet-for-sale-ddos-dark-web/">https://www.cyberscoop.com/mirai-botnet-for-sale-ddos-dark-web/</ext-link> (Accessed: 21 April 2020).</mixed-citation></ref><ref id="ref11"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Brichant</surname>, <given-names>R</given-names></string-name>. and <string-name><surname>Eftekhari</surname>, <given-names>P</given-names></string-name></person-group>. (<year>2019</year>) <article-title>The rise of disruptionware</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://icitech.org/wp-content/uploads/2019/09/ICIT-Brief-The-Rise-of-Disruptionware.pdf">https://icitech.org/wp-content/uploads/2019/09/ICIT-Brief-The-Rise-of-Disruptionware.pdf</ext-link> (Accessed: 29 September 2019).</mixed-citation></ref><ref id="ref12"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Cantón</surname>, <given-names>D</given-names></string-name></person-group>. (n.d.) <article-title>Botnet detection through DNS-based approaches, INCIBE</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.incibe-cert.es/en/blog/botnet-detection-dns">https://www.incibe-cert.es/en/blog/botnet-detection-dns</ext-link> (Accessed: 1 August 2018).</mixed-citation></ref><ref id="ref13"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chang</surname>, <given-names>W</given-names></string-name>. <etal>et al</etal></person-group>. (<year>2015</year>) <article-title>'Measuring botnets in the wild: Some new trends', in ASIACCS 2015-Proceedings of the 10th ACM symposium on information, computer and communications security</article-title>. <pub-id pub-id-type="doi">10.1145/2714576.2714637</pub-id>.</mixed-citation></ref><ref id="ref14"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chukwudi</surname>, <given-names>A.E</given-names></string-name></person-group>. (<year>2017</year>) <article-title>'Game theory basics and its application in cyber security'</article-title>, <source>Advances in Wireless Communications and Networks</source>, <volume>3</volume>(<issue>4</issue>), pp. <fpage>45</fpage>-<lpage>49</lpage>. <pub-id pub-id-type="doi">10.11648/j.awcn.20170304.13</pub-id>.</mixed-citation></ref><ref id="ref15"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Cimpanu</surname>, <given-names>C</given-names></string-name></person-group>. (<year>2019</year>) <article-title>Hacker takes over 29 IoT botnets, ZDNet</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.zdnet.com/article/hacker-takes-over-29-iot-botnets/">https://www.zdnet.com/article/hacker-takes-over-29-iot-botnets/</ext-link> (Accessed: 10 March 2020).</mixed-citation></ref><ref id="ref16"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>Cisco</collab></person-group> (<year>2014a</year>) <chapter-title>Cisco Networking Academy connecting networks companion guide: Hierarchical network design</chapter-title>. <publisher-name>Cisco Press</publisher-name>.</mixed-citation></ref><ref id="ref17"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab>Cisco</collab></person-group> (<year>2014b</year>) <article-title>The Art of Network Architecture</article-title>. <source>Cisco Press</source>.</mixed-citation></ref><ref id="ref18"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Cisco Talos</collab></person-group> (<year>2018</year>) <article-title>New VPN Filter malware targets at least 500K networking devices worldwide</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://blog.talosintelligence.com/2018/05/VPNFilter.html">https://blog.talosintelligence.com/2018/05/VPNFilter.html</ext-link> (Accessed: 20 February 2020).</mixed-citation></ref><ref id="ref19"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dey</surname>, <given-names>P.K</given-names></string-name>. <etal>et al</etal></person-group>. (<year>2018</year>) <article-title>'On correlating ISP topologies to their businesses'</article-title>, <source>in IEEE international conference on communications</source>. <pub-id pub-id-type="doi">10.1109/ICC.2018.8422620</pub-id>.</mixed-citation></ref><ref id="ref20"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Do</surname>, <given-names>C.T</given-names></string-name>. <etal>et al</etal></person-group>. (<year>2017</year>) <article-title>'Game theory for cyber security and privacy'</article-title>, <source>ACM Computing Surveys</source>, <volume>50</volume>(<issue>2</issue>), pp. <fpage>1</fpage>-<lpage>37</lpage>. Article No.: 30. <pub-id pub-id-type="doi">10.1145/3057268</pub-id>.</mixed-citation></ref><ref id="ref21"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dobák</surname>, <given-names>I</given-names></string-name></person-group>. (<year>2021</year>) <article-title>'Many areas of cybersecurity are also interconnected with national security'</article-title>, <source>Security &amp; Defence</source>, <volume>33</volume>(<issue>1</issue>), pp. <fpage>xxx</fpage>. <pub-id pub-id-type="doi">10.35467/sdq/133154</pub-id>.</mixed-citation></ref><ref id="ref22"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Eskandari</surname>, <given-names>S</given-names></string-name>. <etal>et al</etal></person-group>. (<year>2018</year>) <article-title>'A first look at browser-based cryptojacking', in Proceedings of 3rd IEEE European symposium on security and privacy workshops</article-title>, <source>EURO S and PW</source><volume>2018</volume>. <pub-id pub-id-type="doi">10.1109/EuroSPW.2018.00014</pub-id>.</mixed-citation></ref><ref id="ref23"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>European Union</collab></person-group> (<year>2016</year>) <article-title>'Directive (EU) 2016/1148 of the European parliament and of the council (2016)'</article-title>, <source>Journal of the European Union</source>. Available at: <ext-link ext-link-type="uri" xlink:href="http://data.europa.eu/eli/dir/2016/1148/oj">http://data.europa.eu/eli/dir/2016/1148/oj</ext-link></mixed-citation></ref><ref id="ref24"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>European Union Agency for Network and Information Security (ENISA)</collab></person-group> (<year>2019</year>) <article-title>ENISA threat landscape report 2018</article-title>. <pub-id pub-id-type="doi">10.2824/622757</pub-id>.</mixed-citation></ref><ref id="ref25"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>European Union Agency for Network and Information Security (ENISA)</collab></person-group> (n.d.) <article-title>Botnets</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.enisa.europa.eu/topics/csirts-in-europe/glossary/botnets">https://www.enisa.europa.eu/topics/csirts-in-europe/glossary/botnets</ext-link> (Accessed: 26 February 2020).</mixed-citation></ref><ref id="ref26"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Europol</collab></person-group> (<year>2014</year>) <article-title>International action against 'Gameover Zeus' botnet and 'CryptoLocker' ransomware</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.europol.europa.eu/newsroom/news/international-action-against-gameover-zeus-botnet-and-cryptolocker-ransomware">https://www.europol.europa.eu/newsroom/news/international-action-against-gameover-zeus-botnet-and-cryptolocker-ransomware</ext-link> (Accessed: 20 April 2020).</mixed-citation></ref><ref id="ref27"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>FireEye</collab></person-group> (<year>2018</year>) <article-title>Threat research-A deep dive into RIG exploit kit delivering grobios trojan</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.fireeye.com/blog/threat-research/2018/05/deep-dive-into-rig-exploit-kit-delivering-grobios-trojan.html">https://www.fireeye.com/blog/threat-research/2018/05/deep-dive-into-rig-exploit-kit-delivering-grobios-trojan.html</ext-link> (Accessed: 20 April 2020).</mixed-citation></ref><ref id="ref28"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Fortinet</collab></person-group> (<year>2019</year>) <article-title>New emotet report details threats from one of the world's most successful malware operations</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.fortinet.com/blog/threat-research/emotet-playbook-banking-trojan.html">https://www.fortinet.com/blog/threat-research/emotet-playbook-banking-trojan.html</ext-link> (Accessed: 20 April 2020).</mixed-citation></ref><ref id="ref29"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gandhi</surname>, <given-names>R.A</given-names></string-name>. <etal>et al</etal></person-group>. (<year>2011</year>) <article-title>'Dimensions of cyber-attacks: Cultural, social, economic, and political'</article-title>, <source>IEEE Technology and Society Magazine</source>, <volume>30</volume>(<issue>1</issue>), pp. <fpage>28</fpage>-<lpage>38</lpage>. <pub-id pub-id-type="doi">10.1109/MTS.2011.940293</pub-id>.</mixed-citation></ref><ref id="ref30"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Halder</surname>, <given-names>D</given-names></string-name>. and <string-name><surname>Jaishankar</surname><given-names>K</given-names></string-name></person-group>. (<year>2012</year>) <article-title>Cyber crime and the victimization of women: Laws, rights, and regulations</article-title>. <publisher-loc>Hershey, PA</publisher-loc>: <publisher-name>IGI Global</publisher-name>. <pub-id pub-id-type="doi">10.4018/978-1-60960-830-9</pub-id>.</mixed-citation></ref><ref id="ref31"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>IBM Corporation</collab></person-group> (<year>2016</year>) <article-title>The inside story on botnets</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.ibm.com/downloads/cas/V3YJVYZX">https://www.ibm.com/downloads/cas/V3YJVYZX</ext-link>.</mixed-citation></ref><ref id="ref32"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Ilascu</surname>, <given-names>I</given-names></string-name></person-group>. (<year>2014</year>) <article-title>'New gameover Zeus botnet forming, the US sees most infections', Sofpedia News</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://news.softpedia.com/news/New-Gameover-Zeus-Botnet-Forming-the-US-Sees-Most-Infections-455112.shtml">https://news.softpedia.com/news/New-Gameover-Zeus-Botnet-Forming-the-US-Sees-Most-Infections-455112.shtml</ext-link> (Accessed: 27 May 2021).</mixed-citation></ref><ref id="ref33"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Kaspersky</surname></string-name></person-group> (<year>2018</year>) <article-title>Trojan-Banker.Win32.Emotet</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://threats.kaspersky.com/en/threat/Trojan-Banker.Win32.Emotet/">https://threats.kaspersky.com/en/threat/Trojan-Banker.Win32.Emotet/</ext-link> (Accessed: 27 May 2021).</mixed-citation></ref><ref id="ref34"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Khonji</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Iraqi</surname>, <given-names>Y</given-names></string-name>. and <string-name><surname>Jones</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2013</year>) <article-title>'Phishing detection: A literature survey'</article-title>, in <source>IEEE Communications Surveys and Tutorials</source>, <volume>15</volume>(<issue>4</issue>), pp. <fpage>2091</fpage>-<lpage>2121</lpage>. <pub-id pub-id-type="doi">10.1109/SURV.2013.032213.00009</pub-id>.</mixed-citation></ref><ref id="ref35"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Liang</surname>, <given-names>X</given-names></string-name>. and <string-name><surname>Xiao</surname>, <given-names>Y</given-names></string-name></person-group>. (<year>2013</year>) <article-title>'Game theory for network security'</article-title>, <source>IEEE Communications Surveys and Tutorials</source>, <volume>15</volume>(<issue>1</issue>), pp. <fpage>472</fpage>-<lpage>486</lpage>. <pub-id pub-id-type="doi">10.1109/SURV.2012.062612.00056</pub-id>.</mixed-citation></ref><ref id="ref36"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Liu</surname>, <given-names>Y</given-names></string-name>. and <string-name><surname>Wang</surname>, <given-names>H</given-names></string-name></person-group>. (<year>2018</year>) <article-title>'VB2018 paper: Tracking Mirai variants', Virus Bulletin</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.virusbulletin.com/virusbulletin/2018/12/vb2018-paper-tracking-mirai-variants/">https://www.virusbulletin.com/virusbulletin/2018/12/vb2018-paper-tracking-mirai-variants/</ext-link> (Accessed: 21 April 2020).</mixed-citation></ref><ref id="ref37"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Malwarebytes</surname><given-names>Labs</given-names></string-name></person-group> (<year>2019a</year>) <article-title>Electrum bitcoin wallets under siege</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://blog.malwarebytes.com/cybercrime/2019/04/electrum-bitcoin-wallets-under-siege/">https://blog.malwarebytes.com/cybercrime/2019/04/electrum-bitcoin-wallets-under-siege/</ext-link> (Accessed: 20 April 2020).</mixed-citation></ref><ref id="ref38"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Malwarebytes</surname><given-names>Labs</given-names></string-name></person-group> (<year>2019b</year>) <article-title>Electrum DDoS botnet reaches 152,000 infected hosts</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://blog.malwarebytes.com/cybercrime/2019/04/electrum-ddos-botnet-reaches-152000-infected-hosts/">https://blog.malwarebytes.com/cybercrime/2019/04/electrum-ddos-botnet-reaches-152000-infected-hosts/</ext-link></mixed-citation></ref><ref id="ref39"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Manky</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2013</year>) <article-title>'Cybercrime as a service: A very modern business'</article-title>, <source>Computer Fraud and Security</source>. <pub-id pub-id-type="doi">10.1016/S1361-3723(13)70053-8</pub-id>.</mixed-citation></ref><ref id="ref40"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Manuel</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2018</year>) <article-title>Searching for the reuse of Mirai code: Hide 'N Seek Bot</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.fortinet.com/blog/threat-research/searching-for-the-reuse-of-mirai-code--hide--n-seek-bot.html">https://www.fortinet.com/blog/threat-research/searching-for-the-reuse-of-mirai-code--hide--n-seek-bot.html</ext-link> (Accessed: 10 March 2020).</mixed-citation></ref><ref id="ref41"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Miller</surname>, <given-names>C</given-names></string-name></person-group>. (<year>2010</year>) <chapter-title>'Kim Jong-il and me: How to build a cyber army to attack the US', DEF CON 18</chapter-title>.</mixed-citation></ref><ref id="ref42"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>MITRE</surname><given-names>ATT&amp;CK</given-names></string-name></person-group> (<year>2019</year>) <article-title>Smoke loader</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://attack.mitre.org/software/S0226/">https://attack.mitre.org/software/S0226/</ext-link> (Accessed: 20 April 2020).</mixed-citation></ref><ref id="ref43"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Montalbano</surname>, <given-names>E</given-names></string-name></person-group>. (<year>2018</year>) <article-title>Mirai creators Cooperate with feds to avoid prison, the security ledger</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://securityledger.com/2018/09/mirai-creators-cooperate-with-feds-to-avoid-prison/">https://securityledger.com/2018/09/mirai-creators-cooperate-with-feds-to-avoid-prison/</ext-link> (Accessed: 27 May 2021).</mixed-citation></ref><ref id="ref44"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Putman</surname>, <given-names>C.G.J</given-names></string-name>., <string-name><surname>Abhishta</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Nieuwenhuis</surname>, <given-names>L.J.M</given-names></string-name></person-group>. (<year>2018</year>) <article-title>'Business model of a botnet', in Proceedings of the 26th euromicro international conference on parallel, distributed, and network-based processing</article-title>, <source>PDP</source><volume>2018</volume>. <pub-id pub-id-type="doi">10.1109/PDP2018.2018.00077</pub-id>.</mixed-citation></ref><ref id="ref45"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ravali</surname>, <given-names>P</given-names></string-name></person-group>. (<year>2013</year>) <article-title>'A comparative evaluation of OSI and TCP/IP models'</article-title>, <source>International Journal of Science and Research</source>, <volume>4</volume>(<issue>7</issue>), pp. <fpage>514</fpage>-<lpage>521</lpage>.</mixed-citation></ref><ref id="ref46"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ryan</surname>, <given-names>R.M</given-names></string-name>. and <string-name><surname>Deci</surname>, <given-names>E.L</given-names></string-name></person-group>. (<year>2000</year>) <article-title>'Self Determination Theory and the facilitation of intrinsic motivation, social development and well-being'</article-title>, <source>American Psychologist</source>, <volume>55</volume>(<issue>1</issue>), pp. <fpage>68</fpage>-<lpage>78</lpage>. 10.1.1.529.4370.</mixed-citation></ref><ref id="ref47"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Sandee</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2015</year>) <article-title>GameOver ZeuS-Backgrounds on the Badguys and the backends</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.blackhat.com/docs/us-15/materials/us-15-Peterson-GameOver-Zeus-Badguys-And-Backends-wp.pdf">https://www.blackhat.com/docs/us-15/materials/us-15-Peterson-GameOver-Zeus-Badguys-And-Backends-wp.pdf</ext-link>.</mixed-citation></ref><ref id="ref48"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Security Boulevard</collab></person-group> (<year>2020</year>) <article-title>Emotet attacks-A spike to start the year…</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://securityboulevard.com/2020/02/emotet-attacks-a-spike-to-start-the-year/">https://securityboulevard.com/2020/02/emotet-attacks-a-spike-to-start-the-year/</ext-link> (Accessed: 20 April 2020).</mixed-citation></ref><ref id="ref49"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Siddiqui</surname>, <given-names>H</given-names></string-name>., <string-name><surname>Healy</surname>, <given-names>E</given-names></string-name>. and <string-name><surname>Olmsted</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2018</year>) <article-title>'Bot or not', in 12th International conference for internet technology and secured transactions</article-title>, <source>ICITST</source><volume>2017</volume>. <pub-id pub-id-type="doi">10.23919/ICITST.2017.8356448</pub-id>.</mixed-citation></ref><ref id="ref50"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Spamhouse</collab></person-group> (<year>2019</year>) <article-title>Estimating Emotet's size and reach</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.spamhaus.org/news/article/791/estimating-emotets-size-and-reach">https://www.spamhaus.org/news/article/791/estimating-emotets-size-and-reach</ext-link> (Accessed: 20 April 2020).</mixed-citation></ref><ref id="ref51"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Specht</surname>, <given-names>S.M</given-names></string-name>. and <string-name><surname>Lee</surname>, <given-names>R.B</given-names></string-name></person-group>. (<year>2004</year>) <article-title>'Distributed denial of service: Taxonomies of attacks, tools and countermeasures'</article-title>, in <source>International workshop on security in parallel and distributed systems</source>. 10.1.1.133.4566.</mixed-citation></ref><ref id="ref52"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Szőr</surname>, <given-names>P</given-names></string-name></person-group>. (<year>2005</year>) <chapter-title>The art of computer virus research and defense</chapter-title>. <publisher-loc>New Jersey</publisher-loc>: <publisher-name>Pearson Education</publisher-name>.</mixed-citation></ref><ref id="ref53"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Tandoc</surname>, <given-names>E.C</given-names></string-name>., <string-name><surname>Lim</surname>, <given-names>Z.W</given-names></string-name>. and <string-name><surname>Ling</surname>, <given-names>R</given-names></string-name></person-group>. (<year>2018</year>) <article-title>'Defining “fake news”: A typology of scholarly definitions'</article-title>, <source>Digital Journalism</source>. <pub-id pub-id-type="doi">10.1080/21670811.2017.1360143</pub-id>.</mixed-citation></ref><ref id="ref54"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Trend</surname><given-names>Micro</given-names></string-name></person-group> (<year>2014</year>) <article-title>Gameover: ZeuS with P2P functionality disrupted</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.trendmicro.com/en_us/research/14/f/gameover-zeus-with-p2p-functionality-disrupted.html">https://www.trendmicro.com/en_us/research/14/f/gameover-zeus-with-p2p-functionality-disrupted.html</ext-link> (Accessed: 27 May 2021).</mixed-citation></ref><ref id="ref55"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Trend</surname><given-names>Micro</given-names></string-name></person-group> (<year>2021</year>) <article-title>VPNFilter two years later: Routers still compromised</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.trendmicro.com/en_ca/research/21/a/vpnfilter-two-years-later-routers-still-compromised-.html">https://www.trendmicro.com/en_ca/research/21/a/vpnfilter-two-years-later-routers-still-compromised-.html</ext-link> (Accessed: 27 May 2021).</mixed-citation></ref><ref id="ref56"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Ullrich</surname>, <given-names>J.B</given-names></string-name></person-group>. (<year>2018</year>) <article-title>Worm (Mirai?) exploiting android debug bridge (Port 5555/tcp), SANS ISC InfoSec forums</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://isc.sans.edu/forums/diary/Worm+Mirai+Exploiting+Android+Debug+Bridge+Port+5555tcp/23856/">https://isc.sans.edu/forums/diary/Worm+Mirai+Exploiting+Android+Debug+Bridge+Port+5555tcp/23856/</ext-link> (Accessed: 21 April 2020).</mixed-citation></ref><ref id="ref57"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Vakulyk</surname>, <given-names>O</given-names></string-name>. <etal>et al</etal></person-group>. (<year>2020</year>) <article-title>'Cybersecurity as a component of the national security of the state'</article-title>, <source>Journal of Security and Sustainability Issues</source>, <volume>9</volume>(<issue>3</issue>), pp. <fpage>775</fpage>-<lpage>784</lpage>. <pub-id pub-id-type="doi">10.9770/jssi.2020.9.3(4)</pub-id>.</mixed-citation></ref><ref id="ref58"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>Verizon</collab></person-group> (<year>2020</year>) <article-title>Data breach investigations report 2020</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf">https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf</ext-link> (Accessed: 23 March 2021). <pub-id pub-id-type="doi">10.1016/S1361-3723(20)30059-2</pub-id></mixed-citation></ref><ref id="ref59"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>von Roessing</surname>, <given-names>R</given-names></string-name></person-group>. (<year>2010</year>) <article-title>'The ISACA business model for information security: An integrative and innovative approach'</article-title>, in <source>ISSE 2009 securing electronic business processes</source><pub-id pub-id-type="doi">10.1007/978-3-8348-9363-5_4</pub-id>.</mixed-citation></ref><ref id="ref60"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Youngblood</surname>, <given-names>J.R</given-names></string-name></person-group>. (<year>2016</year>) <article-title>'Ransomware', in Business theft and fraud</article-title>. <source>Detection and prevention</source>. <publisher-loc>Boca Raton, FL</publisher-loc>: <publisher-name>Routledge</publisher-name>.: <pub-id pub-id-type="doi">10.4324/9781315380780-37</pub-id>.</mixed-citation></ref></ref-list></back></article>
