Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.

Slides:



Advertisements
Similar presentations
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Advertisements

A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Threat Overview: The Italian Job / HTML_IFRAME.CU June 18, 2007.
Cyber X-Force-SMS alert system for threats.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
Threats To A Computer Network
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Computers Going Online Internet Resources and Applications Finding information on the Web browsing: just looking around searching: trying to find specific.
Lesson 19 Internet Basics.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Introduction to Honeypot, Botnet, and Security Measurement
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Demystifying Backdoor Shells and IRC Bots: The Risk … By : Jonathan.
BotNet Detection Techniques By Shreyas Sali
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Introduction to Computers Section 8A. home How the Internet Works Anyone with access to the Internet can exchange text, data files, and programs with.
Trend Micro Confidential 9/23/2015 Threat Rules Sharing Advanced Threats Research.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
Attack Vectors and Mitigations. Attack Vectors ? Network Security2T. A. Yang
Smart Protection Network Kelvin Liu AVP, Core Tech Development.
PLUG IT IN SIX Protecting Your Information Assets.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
Host and Application Security Lesson 17: Botnets.
Internet Security and Your Computer Welcome to Boot Camp.
Internet security  Definition  Types of internet security  Firewalls  Anti spyware  Buffer overflow attack  Phishing  Summary.
THE INTERNET. TABLE OF CONTENT CONNECTING TO THE INTERNET ELECTRONIC MAIL WORLD WIDE WEB INTERNET SERVICES.
Computer Skills and Applications Computer Security.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Cybersecurity Test Review Introduction to Digital Technology.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Basic Internet Skills. What is the internet? A large group of computers connected to one another Its purpose is to send information back and forth to.
Network System Security - Task 2. Russell Johnston.
2 Computer JEOPARDY How’s Your Inbox? Computers Get Sick Too See You in Cyberspace W Cubed ScatteredBits
Botnets A collection of compromised machines
IT Security  .
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Some bits on how it works
Botnets A collection of compromised machines
Risk of the Internet At Home
Staying safe on the internet
Wireless Spoofing Attacks on Mobile Devices
An overview over Botnets
INTERNET SECURITY.
Presentation transcript:

Bots Used to Facilitate Spam Matt Ziemniak

Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done

Build more complex rules Provide more interaction with snort.conf file and installation Explain how snort works in real-world setting Make both labs snort-related

Phishing Spyware Nigerian scams Child pornography

Loss of employee production Money spent on hardware/software Dissemination of viruses, spyware, and phishing schemes

Open relay mail servers Open HTTP proxies Worms/mass mailers

Find a way to automate the spamming process while remaining anonymous

Short for robot. A computer program that performs a function such as forwarding , responding to newsgroup messages, or searching for information. Source:

Web crawlers/search agents Interacting with online games Monitoring IRC channels Only limited by imagination

Keylogging Denial-of-Service Attacks Identity Theft (hosting spoofed websites) Spread malware GENERATE SPAM!

Internet Relay Chat (IRC) Hyper-Text Transfer Protocol (HTTP) P2P (Peer-to-Peer file sharing)

An online system that allows real-time communications Consists of an IRC server and an IRC client; the connection between the two is called a channel Members join chat rooms to discuss various topics (may be password protected) Can be used for file sharing

Program that interacts with an IRC server in an automated fashion Typically used to monitor a channel when an individual is away from the computer Can be modified by anyone with programming skills (C++, PERL, DELPHI ) IRC has its own scripting language

An individual gains control of many bots that reside on different users’ computers Controlled by a “bot master” who uses a command/control The bots connect to the IRC server and wait for commands from the bot master Bot Master Bot

Commonly used to generate spam User typically visits website and downloads a trojan or other piece of malware Connection is made to a web server operated by a bot master More software is downloaded onto user’s computer

Browser Exploit Trojan Download Bot Client Downloaded

Use compromised computer as spam proxy Use compromised computer as mail relay Obtain addresses from compromised computer (harvesting)

HTTP redirects Path to actual site leads to IP’s across different countries (bouncing) Compromised proxies don’t log connections Tank farms act like middlemen by pushing the spam through proxies

"At the end of last year we knew of about 2,000 botnets. Towards the end of this year, we're looking at about 300,000,". Source: Jesse Villa, Frontbridge Technologies

Gathering intelligence regarding botnet activity Use tools such as honeypots, intrusion detection systems, packet sniffers Perform trends analysis on data, source information, log files (firewall and IDS)

Educate employees Increase security measures Develop security products Share information and resources