Download presentation
Presentation is loading. Please wait.
Published byBenedict Reeves Modified over 9 years ago
1
SPAM/BOTNETS and Malware Neil Warner, CIO, GoDaddy.com Moderator: Dan Kaplan, deputy editor, SC Magazine
2
We Put Up Walls
3
Modern Day Fort
4
How do you Detect SPAM Mails? –Key words –Heuristics/Abnormal behavior What can you do to defend against it? –SPAM Filters –Reputation services to block traffic from those Spamming IP addresses –Take down the root cause War Against SPAM
5
SPAM
6
What are Botnets used for? How do we detect them? How can we defend Against it? Botnet lifecycle –Bot-herder configures initial bot parameters such as infection vectors, payload, stealth, C&C detailsinfection vectors –Register a DDNSDDNS –Register a static IP –Bot-herder launches or seeds new bot(s) –Bots spread –Causes an increase of DDoS being sent to the victimDDoS –Losing bots to rival botnets Bot Army
7
Botnets
8
Different types of Malware Broad Category –Trojans, Rootkits, Backdoors Malware for Fun and Profit –Spyware, Key loggers, Dialers, Bots, Proxies, SEO etc.. Grayware Camouflaged Attacks
9
Malware
10
Threat Landscape - Brute Force
11
Threat Landscape - FTP
12
Threat Landscape - SSH
13
Threat Landscape - Conficker
14
Threat Landscape - Slammer
15
Threat Landscape - Fake Search Agents
16
Threat Landscape - e107 bot
17
How Does Malware Happen
18
0 Day vulnerability in a web application or Web Server – Compromises the web sites – Redirects the end user to a malware site or competitors website. – Example: Fake AV Campaign Fake AV
19
What Can We Do? Network/Application Security tools –Firewalls –Intrusion Prevention Systems –Intrusion Detection Systems –Web Application Firewalls –Network Access Controls –Antivirus –Reputation based Access –Code Audits
20
The Most Important Deterent Security Professionals
21
Is The Internet Worth IT?
22
Thank You| Q&A Neil Warner, CIO GoDaddy.com nwarner@godaddy.com
23
https://zeustracker.abuse.ch/ https://zeustracker.abuse.ch/ http://www.malwaredomainlist.com/ http://www.malwaredomainlist.com/ http://www.phishtank.com/ http://www.phishtank.com/ http://www.clean-mx.de/ http://www.clean-mx.de/ http://en.wikipedia.org/wiki/Botnet http://en.wikipedia.org/wiki/Botnet http://en.wikipedia.org/wiki/Malware http://en.wikipedia.org/wiki/Malware References
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.