Black Market Botnets

Botnets have yet to be exploited to their full potential, because they have yet to take advantage of all the information available to them. The zombie computers that comprise a botnet have access to the private documents of the people that use the computers. A botmaster who controls the botnet can harvest the documents and sell them to third parties, creating a viable ‐ if illegal ‐ online business. We outline motivations for such a business model, as well as the mechanics of a possible implementation. We then present a variety of defenses against this scenario.

[1]  Karen Spärck Jones Index term weighting , 1973, Inf. Storage Retr..

[2]  Moti Yung,et al.  Cryptovirology: extortion-based security threats and countermeasures , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[3]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[4]  Jochen Dörre,et al.  Text mining: finding nuggets in mountains of textual data , 1999, KDD '99.

[5]  Yeuan-Kuen Lee,et al.  High capacity image steganographic model , 2000 .

[6]  Omprakash D. Gnawali A Keyword-Set Search System for Peer-to-Peer Networks , 2002 .

[7]  Deborah G. Johnson,et al.  Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness , 2002, Inf. Soc..

[8]  Catherine Crump Data Retention: Privacy, Anonymity, and Accountability Online , 2003 .

[9]  Michael D. Smith,et al.  Access for sale: a new class of worm , 2003, WORM '03.

[10]  Adam L. Young Non-zero sum games and survivable malware , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[11]  D. Kirovski,et al.  Fingerprinting and forensic analysis of multimedia , 2004, MULTIMEDIA '04.

[12]  Yang Yu,et al.  Display-only file server: a solution against information theft due to insider attack , 2004, DRM '04.

[13]  Shogo Nishida,et al.  Text mining agent for net auction , 2004, SAC '04.

[14]  Enrico Blanzieri,et al.  Implicit: an agent-based recommendation system for web search , 2005, AAMAS '05.

[15]  Yu Jeffrey Hu,et al.  From Niches to Riches: Anatomy of the Long Tail , 2006 .

[16]  Richard J. Lipton,et al.  A Taxonomy of Botnets , 2006 .

[17]  George Danezis,et al.  A pact with the devil , 2006, NSPW '06.

[18]  Christos Faloutsos,et al.  Detecting Fraudulent Personalities in Networks of Online Auctioneers , 2006, PKDD.

[19]  Laurie Freeman Rowel The ballad of DVD Jon , 2006, NTWK.

[20]  M. Hitt The Long Tail: Why the Future of Business Is Selling Less of More , 2007 .

[21]  Stefan Savage,et al.  An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.