OFFENSE BY KALYAN MANDAGAUTAM BHASWAR.  4 years of study, covers only 6 Botnets reponsible for 79% of spam messages arriving at the University of Washington.

Slides:



Advertisements
Similar presentations
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Advertisements

Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Network Security Highlights Nick Feamster Georgia Tech.
Zhiyun Qian, Z. Morley Mao (University of Michigan)
1 Effective, secure and reliable hosted security and continuity solution.
Paul Vanbosterhaut Managing Director, Vircom Europe January 2007 ModusGate™ 4.4 Smart Assurance Gateway Not Just Warmed-over Open Source Technology…
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Wireless and Switch Security NETS David Mitchell.
Web Server Administration TEC 236 Securing the Web Environment.
HIPAA Security Standards What’s happening in your office?
Lisa Farmer, Cedo Vicente, Eric Ahlm
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Detecting Fraudulent Clicks From BotNets 2.0 Adam Barth Joint work with Dan Boneh, Andrew Bortz, Collin Jackson, John Mitchell, Weidong Shao, and Elizabeth.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Detecting Botnets Using Hidden Markov Models on Network Traces Wade Gobel Bio-Grid, Summer 2008.
Spam May CS239. Taxonomy (UBE)  Advertisement  Phishing Webpage  Content  Links From: Thrifty Health-Insurance Mailed-By: noticeoption.comReply-To:
Lecture 11 Reliability and Security in IT infrastructure.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Sravanthi Vattikuti Sri Harsha Devabhaktuni
Botnets An Introduction Into the World of Botnets Tyler Hudak
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
BUSINESS B1 Information Security.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
Security Services Agenda Overview of HEAnet security services HEAnet CERT (Computer Emergency Response) Anti-Spam RBL (Real time blacklist service) HEAnet.
Jonell Baltazar, A Trend Micro Research Paper (Retrieved May 2010).
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
Daniul Byrd. What are bots?  Software that automates tasks  Can network to share data and act in coordination.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Lecture 12 Page 1 CS 236 Online Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite coasts.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
Chapter 2 Securing Network Server and User Workstations.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Studying Spamming Botnets Using Botlab
Security fundamentals Topic 9 Securing internet messaging.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Address Spoofing, DoS, and VoIP Groups 5 and 6. Spoofing, DoS, and VoIP MAC Address Spoofing MAC Address Spoofing IP Spoofing IP Spoofing DNS Spoofing.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Managing Secure Network Systems
FUS . For more information regarding fus click on the link mentioned below- support-phone-number.
CS4622 Team 4 Worms, DoS, and Smurf Attacks
Offense Questions: Botnet detection
Cloud Security AWS as an example.
Cloud Security AWS as an example.
Presented by Aaron Ballew
MESSAGE ACCESS AGENT: POP AND IMAP
Presentation transcript:

OFFENSE BY KALYAN MANDAGAUTAM BHASWAR

 4 years of study, covers only 6 Botnets reponsible for 79% of spam messages arriving at the University of Washington.  What about the other 21%?  Why cant Botlab provide any details regarding the same….

In classifying bots: For the bots which spread spam using HTTP based services, the Botlab infrastructure spoofs login and mail transaction process, using fake ssl certificates. Fortunately, this variant didn’t check the ssl certificate. And now after reading this paper the spammer will have to only start validating the certificate and we are back to ground zero.

 Avoiding Blacklisting To prevent bots from reporting 100% delivery rates Botlab depends upon failed DNS lookup as a source of randomness in bot-reported statistics. The botmasters have to only perform a more complicated statistics analysis to identify the spamhole. So what after this?

 Perform an end to end check for reachability!  Use encrypted packets to avoid detection

- Deploy in-depth defense strategies and multi- layered network security - Promptly patch and vigilantly download security updates - Block JavaScripts - Monitor ports and plan port security to block unauthorized traffic - Generate user awareness amongst friends and colleagues

 Good guys always end up last!  It’s a one time study! Bad guys will soon be back with some alternatives and perhaps you will require another four years of study  !