Botnet Detection & Countermeasures

Slides:



Advertisements
Similar presentations
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Advertisements

5-Network Defenses Dr. John P. Abraham Professor UTPA.
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
Computer Security and Penetration Testing
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Borrowed from Brent ByungHoon Kang, GMU. A Network of Compromised Computers on the Internet IP locations of the Waledac botnet. Borrowed from Brent ByungHoon.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Sravanthi Vattikuti Sri Harsha Devabhaktuni
Botnets An Introduction Into the World of Botnets Tyler Hudak
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
BotNet Detection Techniques By Shreyas Sali
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
What’s New in Fireware v11.9.5
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—2-1 Ethernet LANs Exploring the Packet Delivery Process.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicBSCI Module 6 1 Basic Switch Concept Prepared by: Akhyari Nasir Resources form Internet.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Johannes Hassmund (2009), Project Report for Information Security Course, Linkoping University, Sweden. Speaker : Hung-Jen Chiang Studying IDS signatures.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
1 Copyright © 2015, Drilling Info, Inc. All right reserved. All brand names and trademarks are the properties of their respective companies. Webinar Series.
DoS/DDoS attack and defense
A Multifaceted Approach to Understanding the Botnet Phenomenon Aurthors: Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Publication: Internet.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Quiz 2 -> Exam Topics Fall Chapter 10a - Firewalls Simple Firewall - drops packets based on IP, port Stateful - Keeps track of connections, set.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Security Log Visualization with a Correlation Engine: Chris Kubecka Security-evangelist.eu All are welcome in the House of Bytes English Language Presentation.
Presented by : Matthew Sulkosky COSC 316 (Host Security) BOTNETS A.K.A ZOMBIE COMPUTING.
Network System Security - Task 2. Russell Johnston.
A brief Description of the University Network By John G. mwangi Senior Network Administrator Jomo Kenyatta University of Agriculture and Technology.
Presented by Martin Šimek Ransomware, Internet of Things and Botnets vs. Control.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Configuring Network Devices
Todd Crosslin – PDX – Customer Story Todd Crosslin – 45 mins.
Chapter 7: Identifying Advanced Attacks
CONNECTING TO THE INTERNET
Instructor Materials Chapter 7 Network Security
Backdoor Attacks.
ETHANE: TAKING CONTROL OF THE ENTERPRISE
@DamonPoole Highlights
Data Compromises: A Tax Practitioners “Nightmare”
Chapter 11: It’s a Network
Infrastructure, Data Center & Managed Services
Unit 27: Network Operating Systems
UNM Enterprise Firewall
Intro to Denial of Serice Attacks
Information Security Session October 24, 2005
Chapter 4: Protecting the Organization
Network hardening Chapter 14.
Test 3 review FTP & Cybersecurity
Marcial Quinones-Cardona
Session 20 INST 346 Technologies, Infrastructure and Architecture
Host and Small Network Relaying Howard C. Berkowitz
Presentation transcript:

Botnet Detection & Countermeasures

About Me – Kiran Ratnaker IT Security Researcher Certified Ethical Hacker Certified Forensic Investigator Certified Security Analyst WatchGuard Certified Professional Contact Twitter - @kiranratnakar

Agenda What is BotNet Botnet Detection Countermeasures

Close Encounter with Botnet Network of 150 Machines Dead No Internet, No Local Server Access

Mac Flooding, ARP Poison, MITM, DDoS… uses ports 16464, 16465, 16470, and / or 16471. The 

Worst Things No bot detection by AV Websense failed Firewall proxy bottleneck IP in exploit blacklist Rootkit prevented detection, connecting the HDD to other fresh clean machine detected Botnet Zero Access, i.e. AV was compromised

How We Restored Network Operations? Enabled Security features on LAN ARP Spoofing Prevention, DoS Attack Prevention Settings, Broadcast...Multicast...Unicast Traps Reduced network speed > Check for port utilizing high bandwidth > Shut it down > Format the machines

Challenges in Dev & QA Environment Developer needs Admin Access Innovation needs openness QA Needs old versions Port based applications is history p2p apps on top & so as attacks

What is BotNet Botnet: Bot + Network BotMaster Botnet: Bot + Network Compromised machine install programs which performs autonomus tasks, these Networked bots controlled by single botmaster with multiple command & control centers……. builds Botnet C&C C&C Reference Video - https://www.youtube.com/watch?v=s0sgiY93w9c Bots Bots

How Botnet Spreads itself ? Peer to Peer

Cyber Crimes Ransomware Feck Id

2016 Cyberattack Denial-of-service attack on DYN (Distributed Network Services, Inc.) On 21 October 2016 Dyn’s network attacked with DDos with load of 1.2 Terabits per second Twitter,Reddit,GitHub,Amazon.com,Netflix,Spotify,BBC,PayPal,CNN become unreachable Mirai botnet was used to launch a DDos attack Mirai botnet consisting of more than 100,000 infected devices Internet of Things-enabled(IoT) devices included in attack (Surveillance Cameras,Printers,Residential Gateways) Mirai infected devices were spotted in 164 countries Mirai’s C&C(command and control) code is coded in Go while its bots are coded in C programming. Ref- https://www.tripwire.com/state-of-security/latest-security-news/100000-bots-infected-mirai-malware-caused-dyn-ddos-attack/ Mirai botnet - https://www.incapsula.com/blog/malware-analysis-mirai-ddos-botnet.html

Detection Symptoms Benchmark Machine Log L3 Switch Log Firewall Log OS, AV, Wireshark

Benchmark TCP/IP Connections on Machine & Firewall 100 x 50 = 5000 Connections What are the total Number of Machines as per Inventory & Logs ARP on Switch = Number of Machines ARP on L3, Firewall

Machine IP + Mac Address + VLAN Route + VLAN Broadcast on L3 Switch

Process Explorer

Wireshark

Countermeasures Daily Checks Enable AV Firewall + IPS IP Black List, Concurrent Connections, Botnet Ports, Deny Packets, Geolocation, DNS Enable AV Firewall + IPS Update Security Patches Firmware Updates Machines, Network Switches, Printers, WAP, Firewall Install only required applications

Process Explorer Microsoft Netmon Questions ? Questions

Ashish Shanker ashish.shanker@synerzip.com @ShankerAshish +1. 214.507.2843 22

Synerzip Your trusted outsourcing partner for Agile software product development. Accelerate the delivery of your product roadmap Address technology skill gaps Save at least 50% with offshore software development Augment your team with optional on-site professionals

Synerzip Clients

linkedin.com/company/synerzip Connect with Synerzip @Synerzip linkedin.com/company/synerzip facebook.com/Synerzip

Next Webinar Manging Software People & Teams on Thursday, March 16, 2017 at Noon CST Webinar Presenter: Ron Lichty, Author & Agile Consultant