SlideShare a Scribd company logo
1 of 1
Botnets: Implementation, Detection, Countermeasures
and Analysis of Virtual Network Attacks
Introduction
The project is about the cyber security threat of botnets; which are used to
compromise computers (creating bots using malware giving the attacker a
remote control mechanism, without the owners’ knowledge) for illegal purposes,
for financial gain. E.g. phenomena such as key loggers for stealing online
banking details, phishing emails, bitcoin mining and disruption to Internet
services i.e. Distributed Denial of Service attacks (DDoS) which is also used as
ransomware (threatening for money otherwise launching DDoS attacks).
The problem of threats can be solved by determining provision of adequate
defences against botnets by investigating existing detection strategies and
countermeasures. Then contributing ideas, to suggest a new initiative of a Wide
Area Network that involves intrusion prevention systems and honeynets that
cover the whole network for members, of this system, joining for a small fee. The
aim is to put forward these suggestions for implementation to organisations that
can put this into practice in the future, by documenting improvements to policy.
Detection of Botnets
There are different techniques for botnet detection methods
that can be categorised. Detection is an important step which
precedes any countermeasures for the counteraction of
botnets, unless prevention strategies are taken and are
successful. This will involve intrusion prevention systems;
new and advanced systems improvise next-generation
firewalls such as the Palo Alto designed for enterprise level
protection. Specially crafted packets are designed by
attackers to evade detection by custom intrusion detection
systems, firewalls and intrusion prevention systems, but they
can be picked up by the monitoring done by a next-
generation firewall using stateful packet inspection
implemented alongside an intrusion prevention system.
Other detection techniques include honeynets, botnet
infiltration and malware reverse engineering. A honeynet is a
collection of honeypots that work and function cohesively
together as traps, which are network nodes that provide a
fake network but look real from the perspective of an
attacker, on the network at different points to optimise the
possibility of capturing data from an attack.
Botnet Technical Countermeasures
Most of them are focussed on the command-and-control
infrastructure of botnets, for example, by filtering botnet-
related traffic, sinkholing domains with the assistance of DNS
registrars and obtaining the shutdown of malicious servers in
data centres, to exemplify. The countermeasures can impose
perceived legal complications that can arise when the
techniques are applied. Collaboration of organisations and
governments are making use of initiatives to counteract
threats and develop countermeasures against organised
cyber crime.
Various countermeasures include: Blacklisting, Distribution of
Fake/Traceable Credentials, Border Gateway Protocol (BGP)
Blackholing, DNS Sinkholing, Direct Take Down of
Command-and-Control Server, Port 25 Blocking, Walled
Gardens, Infiltration and Remote Disinfection, Peer-to-Peer
Countermeasures and Packet Filtering on Network and
Application Level.
Results: Botnet Implementation
An artefact was developed creating and implementing the
Solar botnet. The attacks launched were on a specific virtual
network created for this purpose. This was achieved by
configuring an email server (SquirrelMail) with its supporting
DNS server (both configured in Linux), through which emails
sent to the user email accounts which contained the bot
executable file as an attachment, was used to infect the
machines; adding them to the botnet as bots. The data
captured from the login showed in the botnet’s logs revealing
passwords, similar to harvesting online banking credentials.
Figure 2: Solar Botnet Logs Email Login Data Capture
Information View
Student Name: Cevdet Basaran
Student No: 1203167
Supervisor Name: Dr Haider M. al-Khateeb
Course: BSc (Hons) Computer Security and Forensics
Problem Statement
There is a tremendous amount of financial damage due to botnets [1]. The
problem can be addressed by taking down as many botnets as possible. (Refer
to the thesis for more references).
Aim
To eliminate botnet threats and malware. To create and implement a botnet
attack to develop defensive strategies and replicate the psychology of a bot
master (attacker) to comprehend the mind-set of cyber criminals to outsmart
them.
Objectives
• To create and implement a botnet.
• To investigate techniques to detect botnets.
• To apply countermeasures to eliminate or mitigate botnet attacks.
• To investigate quantum botnet research.
Methodology
• Qualitative analysis in the survey of botnets describing
existing botnets, their properties and operation.
• Quantitative analysis on the artefact development, i.e.
number of bots, data capture analysis and statistics.
Figure 1: Typical Botnet Architecture Network Diagram [2]
(Microsoft Symantec Corporation; Dell Secure Works, 2013)
References
[1] Computer Economics (2014) Annual Worldwide Economic Damages from Malware Exceed $13 Billion.
Available at: http://www.computereconomics.com/article.cfm?id=1225 (Accessed: 17 October 2014).
[2] Microsoft Symantec Corporation; Dell SecureWorks (2013) Diagram showing the typical structure of a
Botnet computer network. Available at: https://uk.images.search.yahoo.com/images/view (Accessed: 23
December 2014).

More Related Content

What's hot

survey project-1
survey project-1survey project-1
survey project-1
NAVIT GAUR
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Corona - Ph.D. Defense Slides
Corona - Ph.D. Defense SlidesCorona - Ph.D. Defense Slides
Corona - Ph.D. Defense Slides
Pluribus One
 

What's hot (20)

survey project-1
survey project-1survey project-1
survey project-1
 
Bot net detection by using ssl encryption
Bot net detection by using ssl encryptionBot net detection by using ssl encryption
Bot net detection by using ssl encryption
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Cyber Security Cooperation
Cyber Security CooperationCyber Security Cooperation
Cyber Security Cooperation
 
Cyber warfare an architecture for deterrence
Cyber warfare an architecture for deterrenceCyber warfare an architecture for deterrence
Cyber warfare an architecture for deterrence
 
Digital Crime & Forensics - Report
Digital Crime & Forensics - ReportDigital Crime & Forensics - Report
Digital Crime & Forensics - Report
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
 
C018131821
C018131821C018131821
C018131821
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
Paper id 2820149
Paper id 2820149Paper id 2820149
Paper id 2820149
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc Networks
 
A secure network forensics system for cyber incidents analysis
A secure network forensics system for cyber incidents analysisA secure network forensics system for cyber incidents analysis
A secure network forensics system for cyber incidents analysis
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
 
CTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu MkandawireCTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu Mkandawire
 
CTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu MkandawireCTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu Mkandawire
 
Futuristic data mining technologies for cyber security
Futuristic data mining technologies for cyber securityFuturistic data mining technologies for cyber security
Futuristic data mining technologies for cyber security
 
Corona - Ph.D. Defense Slides
Corona - Ph.D. Defense SlidesCorona - Ph.D. Defense Slides
Corona - Ph.D. Defense Slides
 
Intelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack DetectionsIntelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack Detections
 

Viewers also liked

Systech Company Profile 2016 v2
Systech Company Profile 2016 v2Systech Company Profile 2016 v2
Systech Company Profile 2016 v2
Faiz Arif
 
Certificate of BE.EC
Certificate of BE.ECCertificate of BE.EC
Certificate of BE.EC
Zay Yar Kyaw
 
Green Posters
Green PostersGreen Posters
Green Posters
resumi2
 
Safety of machinery - Application of standard EN ISO 13849-1
Safety of machinery - Application of standard EN ISO 13849-1Safety of machinery - Application of standard EN ISO 13849-1
Safety of machinery - Application of standard EN ISO 13849-1
dnunez1984
 

Viewers also liked (15)

Systech Company Profile 2016 v2
Systech Company Profile 2016 v2Systech Company Profile 2016 v2
Systech Company Profile 2016 v2
 
Metodo s.j.f
Metodo s.j.fMetodo s.j.f
Metodo s.j.f
 
Clipping cnc 20092016 versão de impressão
Clipping cnc 20092016   versão de impressãoClipping cnc 20092016   versão de impressão
Clipping cnc 20092016 versão de impressão
 
Dança perde a 'construtora' Ivonice Satie
Dança perde a 'construtora' Ivonice SatieDança perde a 'construtora' Ivonice Satie
Dança perde a 'construtora' Ivonice Satie
 
20160704 rv presentation rca versus rcm
20160704 rv presentation rca versus rcm20160704 rv presentation rca versus rcm
20160704 rv presentation rca versus rcm
 
Certificate of BE.EC
Certificate of BE.ECCertificate of BE.EC
Certificate of BE.EC
 
Green Posters
Green PostersGreen Posters
Green Posters
 
Pe15 as
Pe15 asPe15 as
Pe15 as
 
BIODATA
BIODATABIODATA
BIODATA
 
clasificacion de los sistemas operativos
clasificacion de los sistemas operativosclasificacion de los sistemas operativos
clasificacion de los sistemas operativos
 
Pe21 as
Pe21 asPe21 as
Pe21 as
 
Safety of machinery - Application of standard EN ISO 13849-1
Safety of machinery - Application of standard EN ISO 13849-1Safety of machinery - Application of standard EN ISO 13849-1
Safety of machinery - Application of standard EN ISO 13849-1
 
4 major problems faced by shortfilm makers - shortfundly
4 major problems faced by shortfilm makers  - shortfundly4 major problems faced by shortfilm makers  - shortfundly
4 major problems faced by shortfilm makers - shortfundly
 
Resume/CV
Resume/CVResume/CV
Resume/CV
 
London by Estrella Sabán 5ºC pp
London by Estrella Sabán 5ºC ppLondon by Estrella Sabán 5ºC pp
London by Estrella Sabán 5ºC pp
 

Similar to Presentation Undergraduate Project

Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Editor IJCATR
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
IJCSIS Research Publications
 
Botnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdfBotnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdf
uzair
 
lab3cdga.ziplab3code.c#include stdio.h#include std.docx
lab3cdga.ziplab3code.c#include stdio.h#include std.docxlab3cdga.ziplab3code.c#include stdio.h#include std.docx
lab3cdga.ziplab3code.c#include stdio.h#include std.docx
smile790243
 

Similar to Presentation Undergraduate Project (20)

Cybersecurity -Terms.
Cybersecurity -Terms.Cybersecurity -Terms.
Cybersecurity -Terms.
 
Botnets
BotnetsBotnets
Botnets
 
A Survey of Botnet Detection Techniques
A Survey of Botnet Detection TechniquesA Survey of Botnet Detection Techniques
A Survey of Botnet Detection Techniques
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The Botmaster
 
A review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsA review botnet detection and suppression in clouds
A review botnet detection and suppression in clouds
 
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
 
Botnet detection by Imitation method
Botnet detection  by Imitation methodBotnet detection  by Imitation method
Botnet detection by Imitation method
 
Botnet
BotnetBotnet
Botnet
 
Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)
 
Botnet Architecture
Botnet ArchitectureBotnet Architecture
Botnet Architecture
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social Network
 
IRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash MatchingIRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash Matching
 
Detection of the botnets’ low-rate DDoS attacks based on self-similarity
Detection of the botnets’ low-rate DDoS attacks  based on self-similarity Detection of the botnets’ low-rate DDoS attacks  based on self-similarity
Detection of the botnets’ low-rate DDoS attacks based on self-similarity
 
A Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior AnalysisA Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior Analysis
 
Botnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdfBotnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdf
 
Botnets
BotnetsBotnets
Botnets
 
Detection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P BotnetsDetection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P Botnets
 
lab3cdga.ziplab3code.c#include stdio.h#include std.docx
lab3cdga.ziplab3code.c#include stdio.h#include std.docxlab3cdga.ziplab3code.c#include stdio.h#include std.docx
lab3cdga.ziplab3code.c#include stdio.h#include std.docx
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
 

Presentation Undergraduate Project

  • 1. Botnets: Implementation, Detection, Countermeasures and Analysis of Virtual Network Attacks Introduction The project is about the cyber security threat of botnets; which are used to compromise computers (creating bots using malware giving the attacker a remote control mechanism, without the owners’ knowledge) for illegal purposes, for financial gain. E.g. phenomena such as key loggers for stealing online banking details, phishing emails, bitcoin mining and disruption to Internet services i.e. Distributed Denial of Service attacks (DDoS) which is also used as ransomware (threatening for money otherwise launching DDoS attacks). The problem of threats can be solved by determining provision of adequate defences against botnets by investigating existing detection strategies and countermeasures. Then contributing ideas, to suggest a new initiative of a Wide Area Network that involves intrusion prevention systems and honeynets that cover the whole network for members, of this system, joining for a small fee. The aim is to put forward these suggestions for implementation to organisations that can put this into practice in the future, by documenting improvements to policy. Detection of Botnets There are different techniques for botnet detection methods that can be categorised. Detection is an important step which precedes any countermeasures for the counteraction of botnets, unless prevention strategies are taken and are successful. This will involve intrusion prevention systems; new and advanced systems improvise next-generation firewalls such as the Palo Alto designed for enterprise level protection. Specially crafted packets are designed by attackers to evade detection by custom intrusion detection systems, firewalls and intrusion prevention systems, but they can be picked up by the monitoring done by a next- generation firewall using stateful packet inspection implemented alongside an intrusion prevention system. Other detection techniques include honeynets, botnet infiltration and malware reverse engineering. A honeynet is a collection of honeypots that work and function cohesively together as traps, which are network nodes that provide a fake network but look real from the perspective of an attacker, on the network at different points to optimise the possibility of capturing data from an attack. Botnet Technical Countermeasures Most of them are focussed on the command-and-control infrastructure of botnets, for example, by filtering botnet- related traffic, sinkholing domains with the assistance of DNS registrars and obtaining the shutdown of malicious servers in data centres, to exemplify. The countermeasures can impose perceived legal complications that can arise when the techniques are applied. Collaboration of organisations and governments are making use of initiatives to counteract threats and develop countermeasures against organised cyber crime. Various countermeasures include: Blacklisting, Distribution of Fake/Traceable Credentials, Border Gateway Protocol (BGP) Blackholing, DNS Sinkholing, Direct Take Down of Command-and-Control Server, Port 25 Blocking, Walled Gardens, Infiltration and Remote Disinfection, Peer-to-Peer Countermeasures and Packet Filtering on Network and Application Level. Results: Botnet Implementation An artefact was developed creating and implementing the Solar botnet. The attacks launched were on a specific virtual network created for this purpose. This was achieved by configuring an email server (SquirrelMail) with its supporting DNS server (both configured in Linux), through which emails sent to the user email accounts which contained the bot executable file as an attachment, was used to infect the machines; adding them to the botnet as bots. The data captured from the login showed in the botnet’s logs revealing passwords, similar to harvesting online banking credentials. Figure 2: Solar Botnet Logs Email Login Data Capture Information View Student Name: Cevdet Basaran Student No: 1203167 Supervisor Name: Dr Haider M. al-Khateeb Course: BSc (Hons) Computer Security and Forensics Problem Statement There is a tremendous amount of financial damage due to botnets [1]. The problem can be addressed by taking down as many botnets as possible. (Refer to the thesis for more references). Aim To eliminate botnet threats and malware. To create and implement a botnet attack to develop defensive strategies and replicate the psychology of a bot master (attacker) to comprehend the mind-set of cyber criminals to outsmart them. Objectives • To create and implement a botnet. • To investigate techniques to detect botnets. • To apply countermeasures to eliminate or mitigate botnet attacks. • To investigate quantum botnet research. Methodology • Qualitative analysis in the survey of botnets describing existing botnets, their properties and operation. • Quantitative analysis on the artefact development, i.e. number of bots, data capture analysis and statistics. Figure 1: Typical Botnet Architecture Network Diagram [2] (Microsoft Symantec Corporation; Dell Secure Works, 2013) References [1] Computer Economics (2014) Annual Worldwide Economic Damages from Malware Exceed $13 Billion. Available at: http://www.computereconomics.com/article.cfm?id=1225 (Accessed: 17 October 2014). [2] Microsoft Symantec Corporation; Dell SecureWorks (2013) Diagram showing the typical structure of a Botnet computer network. Available at: https://uk.images.search.yahoo.com/images/view (Accessed: 23 December 2014).