Botnets A collection of compromised machines

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Introduction to Security Computer Networks Computer Networks Term B10.
Threats To A Computer Network
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Vijay krishnan Avinesh Dupat  Collection of tools (programs) that enable administrator-level access to a computer or computer network.  The main purpose.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Chapter Nine Maintaining a Computer Part III: Malware.
Advanced Persistent Threats CS461/ECE422 Spring 2012.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Lecture 14 Page 1 CS 236 Online Worms Programs that seek to move from system to system –Making use of various vulnerabilities Other performs other malicious.
Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators.
Lecture 26 Page 1 Advanced Network Security Malware for Networks Advanced Network Security Peter Reiher August, 2014.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Lecture 12 Page 1 CS 136, Fall 2013 Malware CS 136 Computer Security Peter Reiher November 5, 2013.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Host and Application Security Lesson 17: Botnets.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Malicious Software.
Lecture 13 Page 1 CS 136, Fall 2012 Malware CS 136 Computer Security Peter Reiher November 13, 2012.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Lecture 12 Page 1 CS 136, Spring 2014 Malware CS 136 Computer Security Peter Reiher May 15, 2014.
Understand Malware LESSON Security Fundamentals.
Lecture 15 Page 1 CS 136, Fall 2010 Malware CS 136 Computer Security Peter Reiher November 18, 2010.
Lecture 14 Page 1 CS 236 Online Worms Programs that seek to move from system to system –Making use of various vulnerabilities Other performs other malicious.
Lecture 15 Page 1 CS 136, Spring 2009 Malware CS 136 Computer Security Peter Reiher May 21, 2009.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Lecture 12 Page 1 CS 136, Spring 2016 Malicious Software Computer Security Peter Reiher May 12, 2016.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Lecture 14 Page 1 CS 136, Fall 2011 Malware CS 136 Computer Security Peter Reiher November 10, 2011.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Computer safety Filip Hruby.
Malicious Software Computer Security Peter Reiher February 21, 2017
What they are and how to protect against them
3.6 Fundamentals of cyber security
Outline Introduction Viruses Trojan horses Trap doors Logic bombs
Worms Programs that seek to move from system to system
Botnets A collection of compromised machines
NET 311 Information Security
Computer Applications Unit B
Risk of the Internet At Home
Malware, Phishing and Network Policies
Chap 10 Malicious Software.
Malware CJ
Security.
Groups for This Week Golita Benoodi, Vishwa Goudar, Kuo-Yen Luo
Malware CS 136 Computer Security Peter Reiher February 25, 2010
Chap 10 Malicious Software.
WJEC GCSE Computer Science
Crisis and Aftermath Morris worm.
Test 3 review FTP & Cybersecurity
Introduction to Internet Worm
Worms Programs that seek to move from system to system
Presentation transcript:

Botnets A collection of compromised machines Under control of a single person Organized using distributed system techniques Used to perform various forms of attacks Usually those requiring lots of power

What Are Botnets Used For? Spam (90% of all email is spam) Distributed denial of service attacks Hosting of pirated content Hosting of phishing sites Harvesting of valuable data From the infected machines Much of their time spent on spreading

Botnet Software Each bot runs some special software Often built from a toolkit Used to control that machine Generally allows downloading of new attack code And upgrades of control software Incorporates some communication method To deliver commands to the bots

Botnet Communications Originally very unsophisticated All bots connected to an IRC channel Commands issued into the channel Most sophisticated ones use peer technologies Similar to some file sharing systems Peers, superpeers, resiliency mechanisms Conficker’s botnet uses peer techniques Stronger botnet security becoming common Passwords and encryption of traffic

Botnet Spreading Originally via worms and direct break-in attempts Then through phishing and Trojan Horses Increasing trend to rely on user mistakes Conficker uses multiple vectors Buffer overflow, through peer networks, password guessing Regardless of details, almost always automated

Characterizing Botnets Most commonly based on size Estimates for Conficker over 5 million Zeus-based botnets got 3.6 million machines in US alone Trend Micro estimates 100 million machines are members of botnets Controlling software also important Other characteristics less examined

Why Are Botnets Hard to Handle? Scale Anonymity Legal and international issues Fundamentally, if a node is known to be a bot, what then? How are we to handle huge numbers of infected nodes?

Approaches to Handling Botnets Clean up the nodes Can’t force people to do it Interfere with botnet operations Difficult and possibly illegal But some recent successes Shun bot nodes But much of their activity is legitimate And no good techniques for doing so

Spyware Software installed on a computer that is meant to gather information On activities of computer’s owner Reported back to owner of spyware Probably violating privacy of the machine’s owner Stealthy behavior critical for spyware Usually designed to be hard to remove

What Is Done With Spyware? Gathering of sensitive data Passwords, credit card numbers, etc. Observations of normal user activities Allowing targeted advertising And possibly more nefarious activities

Where Does Spyware Come From? Usually installed by computer owner Generally unintentionally Certainly without knowledge of the full impact Via vulnerability or deception Can be part of payload of worms Or installed on botnet nodes

Malware Components Malware is becoming sufficiently sophisticated that it has generic components Two examples: Droppers Rootkits

Droppers Very simple piece of code Runs on new victim’s machine Fetches more complex piece of malware from somewhere else Can fetch many different payloads Small, simple, hard to detect

Rootkits Software designed to maintain illicit access to a computer Installed after attacker has gained very privileged access on the system Goal is to ensure continued privileged access By hiding presence of malware By defending against removal

Use of Rootkits Often installed by worms or viruses E.g., the Pandex botnet But Sony installed rootkits on people’s machines via music CDs Generally replaces system components with compromised versions OS components Libraries Drivers

Ongoing Rootkit Behavior Generally offer trapdoors to their owners Usually try hard to conceal themselves And their other nefarious activities Conceal files, registry entries, network connections, etc. Also try to make it hard to remove them Sometimes removes others’ rootkits Another trick of the Pandex botnet