BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.

Slides:



Advertisements
Similar presentations
By Hiranmayi Pai Neeraj Jain
Advertisements

Botnets ECE 4112 Lab 10 Group 19.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Introduction to Security Computer Networks Computer Networks Term B10.
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Bots and Botnets CS-431 Dick Steflik. DDoS ● One of the most common ways to mount a Distributed Denial of Service attacks is done via networks of zombie.
Detecting Botnets Using Hidden Markov Models on Network Traces Wade Gobel Bio-Grid, Summer 2008.
Botnets Usman Jafarey Including slides from The Zombie Roundup by Cooke, Jahanian, McPherson of the University of Michigan.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Botnets An Introduction Into the World of Botnets Tyler Hudak
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
BotNet Detection Techniques By Shreyas Sali
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang, and.
IT security By Tilly Gerlack.
CAP6135: Malware and Software Vulnerability Analysis Botnets Cliff Zou Spring 2012.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Jeong, Hyun-Cheol. 2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in.
A N I NSIDE L OOK AT B OTNETS ARO-DHS S PECIAL W ORKSHOP ON M ALWARE D ETECTION, 2005 Written By: Paul Barford and Vinod Yegneswaran University of Wisconsin,
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Johannes Hassmund (2009), Project Report for Information Security Course, Linkoping University, Sweden. Speaker : Hung-Jen Chiang Studying IDS signatures.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
AN INSIDE LOOK AT BOTNETS Barford, Paul and Yegneswaran Advances in Information Security, Springer, 2006 Kishore Padma Raju.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Omar Hemmali CAP 6135 Paul Barford Vinod Yegneswaran Computer Sciences Department University of Wisconsen, Madison.
By Mason Hall And Zeb Fross. Attacker Command & Control Zombies.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Computer Skills and Applications Computer Security.
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
Big Bad Botnet Day! Xeno Kovah In association with the Corporation for Public Botcasting, and Viewers Like You! Xeno Kovah In association with the Corporation.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Know your Enemy: Tracking Botnets The Honeynet Project & Research Alliance Presented by: Jonathan Dowdle.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Botnets Usman Jafarey Including slides from The Zombie Roundup by Cooke, Jahanian, McPherson of the University of Michigan.
Instructor Materials Chapter 7 Network Security
Backdoor Attacks.
Acknowledgement This lecture uses some contents from the lecture notes from: Dr. Dawn Song: CS161: computer security Richard Wang – SophosLabs: The Development.
Speaker : YUN–KUAN,CHANG Date : 2009/11/17
VIRUS HOAX + BOTS. VIRUS HOAX + BOTS Group Members Aneeqa Ikram Fatima Ishaque Tufail Rana Anwar Amjad.
Acknowledgement This lecture uses some contents from the lecture notes from: Dr. Dawn Song: CS161: computer security Richard Wang – SophosLabs: The Development.
Risk of the Internet At Home
Botnets An Introduction Into the World of Botnets Tyler Hudak
Acknowledgement This lecture uses some contents from the lecture notes from: Dr. Dawn Song: CS161: computer security Richard Wang – SophosLabs: The Development.
Acknowledgement This lecture uses some contents from the lecture notes from: Dr. Dawn Song: CS161: computer security Richard Wang – SophosLabs: The Development.
Botnets Usman Jafarey Including slides from The Zombie Roundup by Cooke, Jahanian, McPherson of the University of Michigan.
Acknowledgement This lecture uses some contents from the lecture notes from: Dr. Dawn Song: CS161: computer security Richard Wang – SophosLabs: The Development.
Presentation transcript:

BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET

A Quick Glance  Introduction  History  How do they work ?  Protocols  What are they used for ?  Types of BOTS  Prevention  Conclusion

INTRODUCTION  Botnets are networks of computers taken hostage by malware that controls them and makes them to act in other nefarious ways.  A "botnet" is a collection of computers that have been infected with remote-control software.  Runs autonomously and automatically.  User unaware

History  Originally used in IRC as a way to allow automated tasks to be done Protect a channel, kick a user out of a channel etc.Protect a channel, kick a user out of a channel etc.  Eventually evolved into a way to automate malicious tasks  Started with DoS/DDoS against servers TFN, stacheldraht, trinoo (1999)TFN, stacheldraht, trinoo (1999)

How do they work? Worm/Trojan program that's usually transmitted through a spam. 2. Bot connects to IRC C&C channel 4. Repeat. Soon the botmaster has an army of bots to control from a single point 3. Botmaster sends commands through IRC C&C channel to bots Botmaster Victim IRC Server

PROTOCOLS  IRC  HTTP  P2P

Some Important points  Size of Botnets: 50,000 or more BOTS in a single botnet new bots each day.  IRC hides IP’S.  Different botnets can be connected through IRC  Botnets can be rented  Botnet controller is always unidentified.

Malicious activities  Distributed Denial-of-Service (DDoS) attacks. DDoS  Spamming  Sniffing  Keylogging  Spreading new malware  Mass identity theft (Phishing)

GOOD APPLICATIONS  Online games/Polling  Instant Messenger  Search Engines

EXAMPLE  DDoS attack on an Asian e- commerce company in Nov  According to security company Prolexic it was the largest DDoS attacks in 2011  Prolexic refused to tell name of cpmpany because of a trust agreement with the company.  The 15,000 requests per second were performed by a botnet of 250,000 PCs in total, which together peaked at 45Gbps DDoS traffic.

TYPES OF BOTS  Agobot: Most sophisticated. Most sophisticated. 20,000 lines c/c++ code 20,000 lines c/c++ code IRC based command/control. IRC based command/control. Capable of many DoS attack types. Capable of many DoS attack types. Traffic sniffers/key logging. Traffic sniffers/key logging.  SDBot: Simpler than Agobot, 2,000 lines C code. Simpler than Agobot, 2,000 lines C code. Non-malicious at base. Non-malicious at base. Easily extended for malicious purposes. Easily extended for malicious purposes. ScanningScanning DoS AttacksDoS Attacks SniffersSniffers

 SpyBot: <3,000 lines C code. <3,000 lines C code. Possibly evolved from SDBot. Possibly evolved from SDBot. Similar command/control engine. Similar command/control engine. No attempts to hide malicious purposes. No attempts to hide malicious purposes.  GT Bot: Functions based on mIRC scripting capabilities. HideWindow program hides bot on local system. HideWindow program hides bot on local system. Port scanning, DoS attacks, exploits for RPC. Port scanning, DoS attacks, exploits for RPC. TYPES OF BOTS

PREVENTION  Using anti-virus and anti-spyware software and keeping it up to date.  Setting your operating system software to download and install security patches automatically.  Being cautious about opening any attachments or downloading files from s you receive.  Using a firewall to protect your computer from hacking attacks while it is connected to the Internet. Cont…

 Disconnecting from the Internet when you're away from your computer.  Downloading free software only from sites you know and trust.  Taking action immediately if your computer is infected. PREVENTION

CONCLUSION  Botnet a large army of networked computers.  Used in many malicious activities.  Works automatically and autonomously.  Hence biggest threat to INTERNET

THANK YOU