How can botnets be prevented from becoming distributed computing clusters?

  • Thread starter Mk
  • Start date
In summary, the main difference between a botnet and a WAN Beowulf cluster is the level of control and communication between nodes. While a botnet allows for direct communication between nodes, a cluster typically only communicates with the master node. Additionally, botnets may utilize different protocols and coding than clusters.
  • #1
Mk
2,043
4
First,
THIS IS NOT A HACKING QUESTION, I am just interested in distributed computing.

I was wondering if anybody around might know what prevents a "botnet" from being something like a WAN beowulf cluster?

Thanks, :)
 
Computer science news on Phys.org
  • #2
How is a project like BOINC and SETI@HOME, different from the way a botnet gives large amounts of regular home PCs tasks?
 
  • #3
Mk said:
First,
THIS IS NOT A HACKING QUESTION, I am just interested in distributed computing.

I was wondering if anybody around might know what prevents a "botnet" from being something like a WAN beowulf cluster?

Thanks, :)

...actually the differences between a botnet and for example a HTC cluster (of which have most experience) are fairly small I'd say. In both (at least with a typical config) if a user's workstation is utilized they don't necessarily have much control over what the cluster software is doing on their computers and when (Ok, if use personal workstations as a part of a HTC cluster typically configure the cluster appls to run only when the station is idle or during nighttime etc.). Sure a botnet if understood in a typical context goes "somewhat" beyond. How similar is the coding underneath and what protocols they utilize ... hmmmm :confused:
 
  • #4
One difference is the communications in the cluster.
A cluster normally allows direct communications between nodes, sometimes this is even a very expensive high performance network like InfiniBand rather than just ethernet.
A SETI or botnet cannot easily communicate between machines because of firewalls and so all coms is to the master node.
 

1. What is cluster computing/botnet?

Cluster computing, also known as High-Performance Computing (HPC), is a method of connecting multiple computers together to work as a single system to solve complex computing problems. Botnet, short for "robot network", is a network of computers that are infected with malware and controlled by a single entity.

2. What are the benefits of cluster computing?

Cluster computing allows for faster processing of large amounts of data by distributing the workload among multiple computers. It also provides high availability and scalability, as additional computers can be added to the cluster as needed.

3. How is a botnet created?

A botnet is created through the infection of multiple computers with malware, typically through phishing emails, malicious downloads, or vulnerabilities in software. The infected computers are then connected to a central server, allowing the attacker to control them remotely.

4. What are the dangers of a botnet?

Botnets can be used for a variety of malicious activities, including DDoS attacks, spamming, and data theft. They can also be rented out to other attackers, making it difficult to trace the source of the malicious activity.

5. How can cluster computing be used to detect and prevent botnets?

Cluster computing can be used to analyze large amounts of network data and detect patterns that may indicate the presence of a botnet. It can also be used to simulate and predict potential botnet behavior, allowing for proactive measures to be taken to prevent attacks.

Similar threads

  • Computing and Technology
Replies
27
Views
2K
  • Set Theory, Logic, Probability, Statistics
Replies
1
Views
408
  • Computing and Technology
Replies
2
Views
2K
  • Programming and Computer Science
Replies
7
Views
909
  • Computing and Technology
2
Replies
35
Views
4K
  • Calculus and Beyond Homework Help
Replies
1
Views
671
  • Astronomy and Astrophysics
Replies
2
Views
1K
  • Computing and Technology
Replies
4
Views
3K
  • Computing and Technology
Replies
20
Views
2K
  • STEM Academic Advising
Replies
9
Views
1K
Back
Top