introduction to botnet

19
PRESENTATION ON BOTNET

Upload: yogendra-singh

Post on 22-Nov-2014

233 views

Category:

Engineering


0 download

DESCRIPTION

a brief description about bot nets and working of Bots

TRANSCRIPT

Page 1: introduction to Botnet

PRESENTATIONON

BOTNET

Page 2: introduction to Botnet

OUTLINE

Introduction to Botnet Botnet Life-cycle Botnet in Network Security Botnet Uses Botnet Detection Preventing Botnet Infection Botnet Research Conclusion

Page 3: introduction to Botnet

INTRODUCTION

A Botnet is a network of compromised computers under the control of a remote attacker

controller of a botnet is able to direct the activities of these compromised computers

Botnet Terminology Bot Herder (Bot Master) Bot Bot Client IRC Server Command and Control Channel (C&C)

Page 4: introduction to Botnet

INTRODUCTION TO BOTNET(TERMINOLOGY)

IRC ChannelIRC Server

Code Server

IRC ChannelC&C Traffic

Updates

Victim

Attack

Bot Master

Page 5: introduction to Botnet

BOTNET LIFE-CYCLE

Page 6: introduction to Botnet

BOTNET LIFE-CYCLE

Page 7: introduction to Botnet

BOTNET LIFE-CYCLE

Page 8: introduction to Botnet

BOTNET LIFE-CYCLE

Page 9: introduction to Botnet

BOTNET IN NETWORK SECURITY

Internet users are getting infected by bots Many times corporate and end users are

trapped in botnet attacks Today 16-25% of the computers connected to

the internet are members of a botnet In this network bots are located in various

locations It will become difficult to track illegal

activities This behavior makes botnet an attractive

tool for intruders and increase threat against network security

Page 10: introduction to Botnet

BOTNET IS USED FOR-

Bot MasterMoney

Page 11: introduction to Botnet

HOW BOTNET IS USED??

Distributed Denial of Service (DDoS) attacks

Sending Spams Phishing Addware Spyware Click Fraud

Page 12: introduction to Botnet

BOTNET DETECTION

Two approaches for botnet detection based on

Setting up honeynets Passive traffic monitoring

Signature based Anomaly based DNS based

Page 13: introduction to Botnet

BOTNET DETECTION:SETTING UP HONEYNETS

Windows Honey pot

Honeywall Responsibilities:

DNS/IP-address of IRC server and port number(optional) password to connect to IRC-serverNickname of botChannel to join and (optional) channel-password

Page 14: introduction to Botnet

BOTNET DETECTION:SETTING UP HONEYNETSBot

1. Malicious Traffic

Sensor

3. Authorize2. Inform bot’s IP

Bot Master

Page 15: introduction to Botnet

BOTNET DETECTION:TRAFFIC MONITORING

Signature based: Detection of known botnets

Anomaly based: Detect botnet using following anomalies

High network latency High volume of traffic Traffic on unusual port Unusual system behaviour

DNS based: Analysis of DNS traffic generated by botnets

Page 16: introduction to Botnet

BOTNET DETECTION

Determining the source of a botnet-based attack is challenging:

Traditional approach:Every zombie host is an attackerBotnets can exist in a benign

state for an arbitrary amount of time before they are used for a specific attack

New trend: P2P networks

Page 17: introduction to Botnet

PREVENTING BOTNET INFECTIONS

Use a Firewall

Use Antivirus (AV) software

Deploy an Intrusion Prevention System (IPS)

Define a Security Policy and

Share Policies with your users systematically

Page 18: introduction to Botnet

CONCLUSION

Botnets pose a significant and growing threat against cyber security

It provides key platform for many cyber crimes (DDOS)

As network security has become integral part of our life and botnets have become the most serious threat to it

It is very important to detect botnet attack and find the solution for it

Page 19: introduction to Botnet