skip navigation
National Criminal Justice Reference Service
Login | Subscribe/Register | Manage Account | Shopping Cartshopping cart icon | Help | Contact Us | Home     
National Criminal Justice Reference Service
  Advanced Search
Search Help
     
| | | | |
place holder
Administered by the Office of Justice Programs U.S. Department of Justice Office of Justice Programs Seal National Criminal Justice Reference Service National Criminal Justice Reference Service Office of Justice Programs Seal National Criminal Justice Reference Service
Topics
A-Z Topics
Corrections
Courts
Crime
Crime Prevention
Drugs
Justice System
Juvenile Justice
Law Enforcement
Victims
Left Nav Bottom Line

Home / NCJRS Abstract

Publications
 

NCJRS Abstract


The document referenced below is part of the NCJRS Library collection.
To conduct further searches of the collection, visit the NCJRS Abstracts Database.

How to Obtain Documents
 
NCJ Number: NCJ 230111   Add to Shopping cart   Find in a Library
Title: Examining the Creation, Distribution, and Function of Malware On-Line
Author(s): Bill Chu Ph.D. ; Thomas J. Holt Ph.D. ; Gail Joon Ahn Ph.D.
Date Published: 2010
Page Count: 183
Sponsoring Agency: National Institute of Justice
US Dept Justice
Office of Justice Programs
United States
Grant Number: 2007-IJ-CX-0018
Sale Source: National Institute of Justice/NCJRS
Box 6000
Rockville, MD 20849
United States

NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States
Document: PDF 
Agency Summary: Agency Summary 
Language: English
Country: United States
Annotation: The global adoption of the Internet has engendered the growth of significant threats from computer criminals around the world using malicious software (malware), including a new form called “bots”, to automate attacks and enable multiple forms of cybercrime.
Abstract: Computer crimes are costly, and many appear to be perpetrated by computer hackers in foreign countries, particularly Russia and Eastern Europe. These attackers often use malicious software (malware) to automate attacks and enable multiple forms of cybercrime. Malware takes over an infected computer, allowing it to receive commands remotely. Bots are custom programs, but are also bought and sold in virtual markets. Researchers have, however, only begun to explore the prevalence and origins of this form of malware and its potential as an attack tool. Thirteen quarentined bots were analyzed to determine their utility and function in a simulated computing environment. The findings suggest that these bots had a significant impact on system functionality by changing system protocols, including adding and removing files, and attempting to connect to command and control IRC servers. The sale of bots and malware on the online black market was examined using a sample of threads collected from public web-forums. The findings suggest that a virtual service economy has developed around this market, in addition to credit card and identity documents. Though malicious software takes some skill to create, selling and offering access to malware programs enables hackers of any skill to participate in attacks ranging from Distributed Denial of Service attacks to spam. As a whole, this study demonstrates the key role that bots and other malware play in the facilitation of cybercrime. Thus, there is a significant need to disrupt botnets and the markets that facilitate the distribution of malware and hack tools. References and appendix
Main Term(s): Computer related crime
Index Term(s): Computer privacy and security ; Computer software ; Computer abuse ; Computer crime prevention measures ; Crime in foreign countries ; Eastern Europe ; Russian Federation
 
To cite this abstract, use the following link:
https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=252143

* A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's web site is provided.


Contact Us | Feedback | Site Map
Freedom of Information Act | Privacy Statement | Legal Policies and Disclaimers | USA.gov

U.S. Department of Justice | Office of Justice Programs

place holder