 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Bots and Botnets CS-431 Dick Steflik. DDoS ● One of the most common ways to mount a Distributed Denial of Service attacks is done via networks of zombie.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Sravanthi Vattikuti Sri Harsha Devabhaktuni
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Botnets An Introduction Into the World of Botnets Tyler Hudak
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
APT29 HAMMERTOSS Jayakrishnan M.
BotNet Detection Techniques By Shreyas Sali
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Attack Vectors and Mitigations. Attack Vectors ? Network Security2T. A. Yang
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Omar Hemmali CAP 6135 Paul Barford Vinod Yegneswaran Computer Sciences Department University of Wisconsen, Madison.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Understand Malware LESSON Security Fundamentals.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
Course Title: WEB SECURITY Chapter No: 01 “Introduction to Web-Security” 1 Maiwand Institute Of Higher Education.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Presented by : Matthew Sulkosky COSC 316 (Host Security) BOTNETS A.K.A ZOMBIE COMPUTING.
Network System Security - Task 2. Russell Johnston.
Botnets A collection of compromised machines
IT Security  .
Instructor Materials Chapter 7 Network Security
Network security threats
Botnets A collection of compromised machines
ISNE101 Dr. Ken Cosh Week 13.
Malware CJ
HOW DO I KEEP MY COMPUTER SAFE?
An overview over Botnets
Presentation transcript:

 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for?  Preventions of getting a bot.

 According to Cisco (2007), “Botnets: The New Threat Landscape”, They are the primary threat on the internet today.  They have no limit to there size… › Used for large scale attacks such as digital vandalism (SPAM) or financial gain (click fraud).

To understand botnets, we need to know what a bot is… › A bot is a malicious application, short for software robot. › An automated program that runs silently on an infected host (Drone). › Bot waits for command from creator (bot master) › Communication between the master and drone are through a IRC, such as IM.

 A network of bot infected computers. Consisting of hundreds or thousands of drones (zombie army).  Central control by a 3 rd party.  Acting on a single purpose, depending on the motive of the bot master.  Often use for a large scale attack

 Simply point/click software  Set up a C&C (Command & Control)  Need many bot infected computers (drones). The more bots in the zombie army, the more power/capiablity  High speed internet connection to communicate with the drones via IRC.

Internet Relay Chat (Centralized) eXtensible Messaging and Presence Protocol (Decentralized)  Real time message eg. Text or chat  botnets are controlled by an Internet relay Chat(IRC) system.  IRC operates on an open protocol (port) that use TCP.  IRC network can be expanded to other IRC network.  IM are easier to detected in the IRC  IRC networks are taking measures to block access to botnets, Bot master must find their own servers  Decentralized central control  Requires no open port  Messages are encrypted, making it difficult to detect.  Able to work behind firewalls  Similar to how work, can be used anywhere.

 With about 600 million system connected to the internet, about 150 million are infected by a bot software.  1 out 4 computers connected to the internet are comprised by a bot.

 Bots are acquire like any other malicious program/software e.g. trojans and virus. › Piggybacked software installations › Drive-by downloads › Browser add-ons such as plug-in › Downloads from an untrusted site

 Botnets are flexible and are capable of many attack such as… › Distributed Denial of Service attacks (DOS) › SPAM › Click Fraud › Spyware AND many more!!!

Digital vandalism Target site becomes slowed or unavailable due to…  interruption of physical network mechanism.  use of computational resources, eg. bandwidth, disk space.  Overwhelm the target by sending many digital package. The target site wouldn’t be available to perform normal functions Even though targets are sites, routers and switches also fails.

1. A spammer sends money/request to a bot master. 2. Botnet master generates spam details. 3. Spam details is sent to the zombie army. 4. Drones execute the command. 5. Spams are forward to SMPT servers. 6. Spam is delivered to in boxes 7. Info is sent back to the botmaster, if recipients open mail and compromise their computer. * Wikipedia/spam

 Online advertising pays affiliates for generating clicks per advertisings, also known as pay per clicks advertising (PPC).  What if… › Ad clicking were simulating › Manipulated by botnets

 An application installed on your computer without your consent, spyware can monitor your activities by… › screen shot capture › Network packet captures › keystroke logger › data theft

Keystroke Loggers Network packet Sniffer  Keystroke logger are able to capture… › Passwords › Communications e.g. IM and s › CC Info › Personal data (identity theft)  A program that is able to intercept a data package, route it to the interceptor and analyzed the data.  Also, this program can be use to see if competing botnets are with proximity. › Bot master can steal that certain bot to make it part of his/her botnet.

Screen Shot capture Data theft  Works just like keystroke logger  Capture image  Able to enable webcam and mic  Search protected storage credentails  Search for other valuable data such as passwords  Obtaining IM contacts and contacts (SPAM list)  Able to obtain files such as word and pptx

 First discover in January 2007  One source says that the network consisting of 1 to 50 million drones by September 2007, another sources says between 250,000 to 1 million.  Is responsible of 8% of malware for Windows OS and 8% of spam.  Powerful enough to shut down a country’s internet.  Using only 10%-20% of its network.

 Regularly update browser and anti-virus.  Switch browser and/or OS › Most botnets are written for the most commonly used browser such as IE. The same goes for OS. The safer ones are MAC’s, most botnets target Windows OS.  Hire a Web-filtering service › Service that informs user of a site of acting unusual and sites that are known for malicious activity and then blocks them from the user.  Deploy intrusion-detection and intrusion- prevention systems › IDS: An application that monitors network and/or system activities for malicious activities or policy violations. › IPS: Same as IDS, but the application filters the malicious package and allow the rest of the content to stream to the user.

 side1.html?page=1 side1.html?page=1    “Net Living Dead”, 2008, David Harley, pg13-16,  html  ,00.html  d_html/  side1.html?page=1   _software _software 