1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Botnets ECE 4112 Lab 10 Group 19.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Trojan Horse Program Presented by : Lori Agrawal.
Computer Viruses.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
Threats To A Computer Network
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
CS Nathan Digangi.  Secret, undocumented routine embedded within a useful program  Execution of the program results in execution of secret code.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Bots and Botnets CS-431 Dick Steflik. DDoS ● One of the most common ways to mount a Distributed Denial of Service attacks is done via networks of zombie.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
COMPUTER TERMS PART 2. NETWORK When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
2009/9/151 Rishi : Identify Bot Contaminated Hosts By IRC Nickname Evaluation Reporter : Fong-Ruei, Li Machine Learning and Bioinformatics Lab In Proceedings.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Chapter Nine Maintaining a Computer Part III: Malware.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Sravanthi Vattikuti Sri Harsha Devabhaktuni
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Botnets An Introduction Into the World of Botnets Tyler Hudak
Introduction to Honeypot, Botnet, and Security Measurement
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Viruses.
BotNet Detection Techniques By Shreyas Sali
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Internet Security facilities for secure communication.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
IT security By Tilly Gerlack.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Omar Hemmali CAP 6135 Paul Barford Vinod Yegneswaran Computer Sciences Department University of Wisconsen, Madison.
Topic 5: Basic Security.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Know your Enemy: Tracking Botnets The Honeynet Project & Research Alliance Presented by: Jonathan Dowdle.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Network System Security - Task 2. Russell Johnston.
Botnets A collection of compromised machines
Various Types of Malware
VIRUS HOAX + BOTS. VIRUS HOAX + BOTS Group Members Aneeqa Ikram Fatima Ishaque Tufail Rana Anwar Amjad.
Botnets A collection of compromised machines
An overview over Botnets
Presentation transcript:

1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen

ECE Internetwork Security 2 What is a Botnet? Attacker controls remote computer  Any attack that allows execution of code  Virus, worm, Trojan horse, etc.  Controlled machine known as “zombie” “Phones home” via IRC  Joins a pre-specified channel  Attacker gives commands on channel Network of these machines is a botnet

ECE Internetwork Security 3 Controlling a Botnet Attacker IRC Server Zombie

ECE Internetwork Security 4 How big is a Botnet? Size ranges from 10 to 10,000 Largest recorded: 50,000 Could be much larger

ECE Internetwork Security 5 Purpose of Botnets Spamming  Send large amounts of text to chat rooms in mIRC  Send out spam s Sniffing Traffic  Use packet sniffers to find passwords and usernames on supposedly secure networks

ECE Internetwork Security 6 Purpose of Botnets (cont’d) Keylogging  Log and send private information like name, ssn, credit card info etc. Spread Malware  Install various malicious programs Install Advertisement addons  Make money from autoclicking banners Manipulate online polls

ECE Internetwork Security 7 Purpose of Botnets (cont’d) DDOS  Even a small botnet (~1000 machines) can be effective. –Each computer is attacking, which can offer more than 100Mb/sec in an attack This is enough to cripple most Company networks  A large botnet (~50000 machines) –Each computer contributes roughly 128Kb/sec on average. –Roughly 5000Mb/sec

ECE Internetwork Security 8 Often used in Corporate attacks. Easily disable most networks Become a kind of Hacker Mercenary

ECE Internetwork Security 9 What can a typical bot do? Gather Computer Information  Cpu speed, memory, etc Keylogger  Credit card information, name, ssn etc Portscan  Bypass firewalls by scanning from behind the firewall Infect other computers with the trojan

ECE Internetwork Security 10 Types of Bots Script Based  Run from installing a IRC client and running malicious scripts on it. Code based  Run from an executable created from a source code file, do not require any other files than the initial executable.

ECE Internetwork Security 11 Detecting a Botnet Packet sniffing does not work  IRC helps to make master anonymous.  Infected computers typically send spoofed packets. Manual Detection  Watch IRC clients for odd activity  Look for suspicious names  Look for login verification

ECE Internetwork Security 12 Who does a Botmaster target? Most botnets spread from old exploits  Most targeted computers are “home pc” as many users do not patch their operating system. –Allows botnets to run rampant and infect large amounts of computers automatically

ECE Internetwork Security 13 What protects against infection? A botnet is basically just a special form of trojan  Firewalls  Anti-Virus  Intelligent Downloading

ECE Internetwork Security 14 What will you do in lab? Install mIRC Connect to the IRC Server View source code for both GT-bot and SD- bot, some of the earlier bots Configure and infect a computer with both bots

ECE Internetwork Security 15 Control each bot and compare the power of each Explore the capabilities of a botnet

ECE Internetwork Security 16 Conclusions Easy to spread Hard to detect Very powerful

ECE Internetwork Security 17 Questions? Comments?

ECE Internetwork Security 18 References botnet.phphttp://zine.dal.net/previousissues/issue22/ botnet.php