MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
Palo Alto Networks Threat Prevention. Palo Alto Networks at a Glance Corporate Highlights Founded in 2005; First Customer Shipment in 2007 Safely Enabling.
Threat Overview: The Italian Job / HTML_IFRAME.CU June 18, 2007.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Botnets Usman Jafarey Including slides from The Zombie Roundup by Cooke, Jahanian, McPherson of the University of Michigan.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Worms By: Aaron Stahler. Difference Between a Worm and A Virus Viruses are computer programs that are designed to spread themselves from one file to another.
Enterprise Network Security Accessing the WAN Lecture week 4.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
 Discovered in June/July 2010  Targeted Siemens software and equipment running Microsoft Windows  First malware for SCADA systems to spy and subvert.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
eScan Total Security Suite with Cloud Security
Tyler’s Malware Jeopardy $100 VirusWormSpyware Trojan Horses Ransomware /Rootkits $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500.
Introduction to Honeypot, Botnet, and Security Measurement
DroidKungFu and AnserverBot
Data Security.
By, Anish Shanmugasundaram Yashwanth Sainath Jammi.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Jeong, Hyun-Cheol. 2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Nullcon Goa 2010http://nullcon.net Botnet Mitigation, Monitoring and Management - Harshad Patil.
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Malware Analysis Jaimin Shah & Krunal Patel Vishal Patel & Shreyas Patel Georgia Institute of Technology School of Electrical and Computer Engineering.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Conficker Update John Crain. What is Conficker? An Internet worm  Malicious code that is self-replicating and distributed over a network A blended threat.
W elcome to our Presentation. Presentation Topic Virus.
Phishing with Worms Twenty Years of Digital Threats—What Have We Learned and Where Are We Now?
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
NEXT GENERATION ATTACKS & EXPLOIT MITIGATIONS TECHNIQUES ID No: 1071 Name: Karthik GK ID: College: Sathyabama university.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Final Project: Advanced Security Blade IPS and DLP blades.
Presented by : Matthew Sulkosky COSC 316 (Host Security) BOTNETS A.K.A ZOMBIE COMPUTING.
Published: USENIX HotBots, 2007 Presented: Wei-Cheng Xiao 2016/10/11.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Chapter 40 Internet Security.
Botnets A collection of compromised machines
Botnets Usman Jafarey Including slides from The Zombie Roundup by Cooke, Jahanian, McPherson of the University of Michigan.
Malware Reverse Engineering Process
Botnets A collection of compromised machines
Botnets Usman Jafarey Including slides from The Zombie Roundup by Cooke, Jahanian, McPherson of the University of Michigan.
Presentation transcript:

MSIT 458 – The Chinchillas

Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their writers’ ability to predict methods of evasion. Botnet creators are aware of the taxonomies created by organizations to detect, prevent and remove botnets. Therefore, systems will always be at risk because attacks can be orchestrated in new, dangerous and undetectable ways. 2

Detection Considering that so many bots now use ubiquitous protocols such as HTTP, the importance of detection is overshadowed by the importance of countermeasure and mitigation Example: Various bots are capable of auto- updates, so a detected bot could easily morph to a version that has no current method of removal or suppression (ie. Kraken) 3

Detection (cont’d) Trend Micro goes so far as to say that botnets are “easy to expose when they attack other hosts”. Botnet creators now commonly use methods to make attacking behavior less anomalous. – Infrequent, smaller data transfers – Use of ubiquitous, generally trusted protocols like HTTP 4

Attacking Behavior Many common attacking behaviors have not been addressed in the taxonomy: Frequent infection of new hosts through social networking and other websites. Also spread by flash drive use and open shared network drives. Stealing sensitive information by injecting malicious web code or redirecting to malicious web sites Installing fake anti-virus software to provoke the need to purchase bogus malware repair tools Rootkit techniques used to load bot code into system memory, hide files and hide registry keys Setting systems up to download new malware once it has been developed 5

The IPv6 Opportunity The next version of the Internet Protocol is enabled by default on Windows Vista, Server 2003 and later operating systems IPv6 is not widely monitored yet, and is tunneled without inspection in IPv4 IPv6 also enables direct access into a network from the Internet and has means to easily discover neighbors and network IP addresses These features will support improved evasion, P2P infection, attacks, and C&C Trend Micro underestimates the potential of IPv6 despite its existence since 1996 or earlier 6

Command and Control C & C is moving away from plain text IRC to proprietary encrypted protocols that are not recognized by network monitoring tools – “International Foundation for Information Processing, 2009” Trend Micro notes the existence of commands that are included in plain text HTTP URLs. Commands can easily be moved to an encrypted payload that is interpreted by a server side script 7

Command and Control (cont’d) Trend Micro fails to describe at least two other methods of C&C that are now widely used in place of IRC and HTTP – Social networking sites can host text command messages but are rarely blocked due to their entertainment and relationship building qualities – Steganography is used to hide messages in other content such as images or streaming media 8

The Conficker Dilemma Even if people did follow Trend Micro’s recommendations, highly evolved worms like Conficker use many means such as multiple attack vectors not described in the taxonomy Conficker propagates via LANs, network shares, and removable media, so it will still propagate even if some of the vectors are secured Conficker also downloads new versions that evade detection and exploit new vulnerabilities before all bot hosts can be fixed 9

The Conficker Dilemma (cont’d) 10 Image source: Microsoft