Download presentation
Published byGwendolyn Hamilton Modified over 9 years ago
1
Sravanthi Vattikuti Sri Harsha Devabhaktuni
BOTNETS Sravanthi Vattikuti Sri Harsha Devabhaktuni
2
What will we cover? What are botnets? What are they used for?
How do they work? Attacks Detection Prevention Methods Future Challenges
3
Botnets “A botnet is a large collection of well-connected compromised machines, that interact to take part in some distributed task.” Bots (Zombies) Botmaster (Bot herder) Command and Control Server (C&C)
4
What are they used for? Communication Resource Sharing Curiosity Fun
Financial Gain
5
How do they work?
6
How do they work?
7
How do they work?
8
How do they work?
9
Botnet Attacks Distributed Denial of Service (DDoS)
Disable network services by consuming bandwidths Information Leakage Retrieve sensitive information by Key logging Click Fraud Obtain Higher click through rate (CTR) Identity Fraud Phishing Mail
10
Distributed Denial of Service (DDoS)
11
Click Fraud
12
Detection Methods Honeypot and Honeynet Prevent Detect Response
Monitor
13
Detection Methods IRC-based Detection
Detection based on traffic analysis Detection based on anomaly activities
14
Detection Methods DNS Tracking Monitor anti-virus and firewall logs
Distinguish botnet based on a similarity value Monitor anti-virus and firewall logs Use IDS to watch for: IRC/P2P/Botnet activity Attacks and DoS traffic coming FROM your network
15
You’ve detected it, now what?
Begin incident response Treat it like a virus infection First priority is removal of malware If possible, determine how it got on This will help prevent further infections Prevent it from happening again Patch, user awareness, etc.
16
Botnet Prevention Countermeasures for Public
Firewall Equipment Countermeasures for Home Users Use anti-virus Attention while downloading Back-up all systems Countermeasures for System Administrator Monitor logs regularly Use network packet sniffer Isolate the malicious subnet Scan individual machine
17
The Future of Botnets Attackers are going to get better
More complicated botnets will appear In-Depth analysis at different levels Flash Botnets Hard to distinguish malicious packages from regular traffic.
18
References www.korelogic.com/Resources/Presentations/botnets_issa.pdf
Nicholas Ianelli, Aaron Hackworth, Botnets as a Vehicle for Online Crime, Carnegie Mellon University 2005. Wikipedia, “Botnet,” R. Puri, “Bots and botnets: an overview,” Tech. Rep., SANS Institute, 2003. Google bots, botnets, botmaster
19
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.