SPAM/BOTNETS and Malware  Neil Warner, CIO, GoDaddy.com  Moderator: Dan Kaplan, deputy editor, SC Magazine.

Slides:



Advertisements
Similar presentations
Intrusion Prevention anno 2012: Widening the IPS concept.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
By Hiranmayi Pai Neeraj Jain
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Lecture 14 Malicious Software (cont) modified from slides of Lawrie Brown.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Introduction to Security Computer Networks Computer Networks Term B10.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland
LittleOrange Internet Security an Endpoint Security Appliance.
Course 201 – Administration, Content Inspection and SSL VPN
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Norman SecureSurf Protect your users when surfing the Internet.
Botnets An Introduction Into the World of Botnets Tyler Hudak
Internet Vulnerabilities & Criminal Activities Malware 3.2 9/26/2011.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Article presentation for: The Dark Cloud: Understanding and Defending against Botnets and Stealthy Malware Based on article by: Jaideep Chandrashekar,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
BotNet Detection Techniques By Shreyas Sali
Internet Security facilities for secure communication.
CERN’s Computer Security Challenge
Honeypot and Intrusion Detection System
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Jeong, Hyun-Cheol. 2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Proof-Of-Concept: Signature Based Malware Detection for Websites and Domain Administrators - Anant Kochhar.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Smart Protection Network Kelvin Liu AVP, Core Tech Development.
Return to the PC Security web page Lesson 5: Dealing with Malware.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Host and Application Security Lesson 17: Botnets.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Integration Framework: QRadar 7.2 MR1.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Malware in the 21 st Century – Is your identity secure? Jason Bruce, Detection development manager SophosLabs UK December 2005.
Internet security  Definition  Types of internet security  Firewalls  Anti spyware  Buffer overflow attack  Phishing  Summary.
Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
The hidden part of TDSS Sergey (k1k) Golovanov, Malware Expert Global Research and Analysis Team Kaspersky Lab.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
E Safety & Security Tools 13 th March 2009 Martin Quinn - The Westfield Centre.
Botnets A collection of compromised machines
Internet Vulnerabilities & Criminal Activities
Instructor Materials Chapter 7 Network Security
EN Lecture Notes Spring 2016
Botnets A collection of compromised machines
Securing Information Systems
Internet Worm propagation
Malware CJ
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

SPAM/BOTNETS and Malware  Neil Warner, CIO, GoDaddy.com  Moderator: Dan Kaplan, deputy editor, SC Magazine

We Put Up Walls

Modern Day Fort

 How do you Detect SPAM Mails? –Key words –Heuristics/Abnormal behavior  What can you do to defend against it? –SPAM Filters –Reputation services to block traffic from those Spamming IP addresses –Take down the root cause War Against SPAM

SPAM

 What are Botnets used for?  How do we detect them?  How can we defend Against it?  Botnet lifecycle –Bot-herder configures initial bot parameters such as infection vectors, payload, stealth, C&C detailsinfection vectors –Register a DDNSDDNS –Register a static IP –Bot-herder launches or seeds new bot(s) –Bots spread –Causes an increase of DDoS being sent to the victimDDoS –Losing bots to rival botnets Bot Army

Botnets

 Different types of Malware  Broad Category –Trojans, Rootkits, Backdoors  Malware for Fun and Profit –Spyware, Key loggers, Dialers, Bots, Proxies, SEO etc..  Grayware Camouflaged Attacks

Malware

Threat Landscape - Brute Force

Threat Landscape - FTP

Threat Landscape - SSH

Threat Landscape - Conficker

Threat Landscape - Slammer

Threat Landscape - Fake Search Agents

Threat Landscape - e107 bot

How Does Malware Happen

 0 Day vulnerability in a web application or Web Server – Compromises the web sites – Redirects the end user to a malware site or competitors website. – Example: Fake AV Campaign Fake AV

What Can We Do? Network/Application Security tools –Firewalls –Intrusion Prevention Systems –Intrusion Detection Systems –Web Application Firewalls –Network Access Controls –Antivirus –Reputation based Access –Code Audits

The Most Important Deterent Security Professionals

Is The Internet Worth IT?

Thank You| Q&A Neil Warner, CIO GoDaddy.com

      References