Zero Botnets: An Observe-Pursue-Counter Approach

01/16/2022
by   Jeremy Kepner, et al.
0

Adversarial Internet robots (botnets) represent a growing threat to the safe use and stability of the Internet. Botnets can play a role in launching adversary reconnaissance (scanning and phishing), influence operations (upvoting), and financing operations (ransomware, market manipulation, denial of service, spamming, and ad click fraud) while obfuscating tailored tactical operations. Reducing the presence of botnets on the Internet, with the aspirational target of zero, is a powerful vision for galvanizing policy action. Setting a global goal, encouraging international cooperation, creating incentives for improving networks, and supporting entities for botnet takedowns are among several policies that could advance this goal. These policies raise significant questions regarding proper authorities/access that cannot be answered in the abstract. Systems analysis has been widely used in other domains to achieve sufficient detail to enable these questions to be dealt with in concrete terms. Defeating botnets using an observe-pursue-counter architecture is analyzed, the technical feasibility is affirmed, and the authorities/access questions are significantly narrowed. Recommended next steps include: supporting the international botnet takedown community, expanding network observatories, enhancing the underlying network science at scale, conducting detailed systems analysis, and developing appropriate policy frameworks.

READ FULL TEXT

page 8

page 18

page 19

page 20

page 21

page 22

page 24

page 25

research
06/15/2020

Neural Certificates for Safe Control Policies

This paper develops an approach to learn a policy of a dynamical system ...
research
07/10/2023

International Institutions for Advanced AI

International institutions may have an important role to play in ensurin...
research
08/02/2022

CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations

The Internet of Battlefield Things (IoBT) will advance the operational e...
research
11/10/2019

Minimalistic Attacks: How Little it Takes to Fool a Deep Reinforcement Learning Policy

Recent studies have revealed that neural network-based policies can be e...
research
04/21/2020

SARS-CoV-2, a Threat to Privacy?

The global SARS-CoV-2 pandemic is currently putting a massive strain on ...
research
10/04/2021

Realizing Forward Defense in the Cyber Domain

With the recognition of cyberspace as an operating domain, concerted eff...
research
08/21/2021

Towards a Theory on Architecting for Continuous Deployment

Context: As the adoption of continuous delivery practices increases in s...

Please sign up or login with your details

Forgot password? Click here to reset