Illicit Use of Computer Equipment by Botnets and Related Malware

By | October 5, 2011

Source: Department of Homeland Security

This article has a comment period that ends in 30 days (11/04/2011)


The U.S. Department of Commerce and U.S. Department of Homeland Security are requesting information on the requirements of, and possible approaches to creating, a voluntary industry code of conduct to address the detection, notification and mitigation of botnets.1 Over the past several years, botnets have increasingly put computer owners at risk. A botnet infection can lead to the monitoring of a consumer’s personal information and communication, and exploitation of that consumer’s computing power and Internet access. Networks of these compromised computers are often used to disseminate spam, to store and transfer illegal content, and to attack the servers of government and private entities with massive, distributed denial of service attacks. The Departments seek public comment from all Internet stakeholders, including the commercial, academic, and civil society sectors, on potential models for detection, notification, prevention, and mitigation of botnets’ illicit use of computer equipment.Show citation box

1 Botnets are collections of compromised computers that are remotely controlled by a malevolent party, as defined by the National Research Council’s Committee on Improving Cybersecurity Research in the United States, Toward a Safer and More Secure Cyberspace, at 40 (2007).

Read the full document here.

Leave a Reply