BotNet Attacks
Presented by:
M.A.Rangana Lakmal Jayaweera (1331733)
BSc.(HONS) in Computer Network (Top Up)
University Of Wolverhampton (CINEC)
(8th
February 2015)
What are the Botnets?
A computer is a network of compromised computers
called zombie computer or Bots under the control
remote attackers.
Bot began as a useful tool, They ware originally
developed as a virtual individual that could sit on a IRC
channel & monitor network traffic.
They are significant contributors to the malicious &
criminal activities on the internet today and for impotently
an underground network whose size & scope is not fully
known.
Botnet Terminology.
(1).Bot master (2).Bots
(3).IRC Server (4).Command & Control server (C&C)
Botnet Life Cycle (1)
Botnet Life Cycle (2)
Botnet Life Cycle (3)
Botnet Life Cycle (4)
Botnet in Network security
Internet users are getting infected by bots.
Many time corporate and end users are trapped in
botnet attack.
According to the Doballa’s technical repot 83% of
global spam in March 2011 was sent by botnet.
Computers Security experts estimate that most
spam is sent by home computers that are contributed
remotely & malicious of these computers are part of
Botnet.
Most Wanted Botnet
TR/Dldr.agent.JKH - compromised U.S. 1.2millions of PCs
Zeus – Compromised U.S.3.6 millions PCs
Koobface - Compromised U.S.2.9 millions PCs
Tidserv - Compromised U.S.1.5 millions PCs
Trogen.Fakeavalert – Compromised U.S. 1.4 miilions PCs
Botnet Detection
Botnet Detection base on two approaches
(1).Setting up Honey net
(2).passive Traffic monitoring
*Signature based
* Anomaly based
*DNS based
How to preventing Botnet
Infection
*Use a firewall
*Use anti-Bot
*Use Anti virus software's
*Deploy an intrusion detection system (IDS)
*Deploy an intrusion prevention system (IPS)
*Define a security policy and share policies with
your users systematically
Conclusion
*Botnet pose a significant and growing threat against
cyber security
*It provide key platform for many cyber crimes (DDOS)
*As Network security has become integral part of our life
and botnets have become the most serious threat to it
*It is very important to detect botnet attack and find the
solution for it.
THANK YOU.
&
?????

BotNet Attacks

  • 1.
    BotNet Attacks Presented by: M.A.RanganaLakmal Jayaweera (1331733) BSc.(HONS) in Computer Network (Top Up) University Of Wolverhampton (CINEC) (8th February 2015)
  • 2.
    What are theBotnets? A computer is a network of compromised computers called zombie computer or Bots under the control remote attackers. Bot began as a useful tool, They ware originally developed as a virtual individual that could sit on a IRC channel & monitor network traffic. They are significant contributors to the malicious & criminal activities on the internet today and for impotently an underground network whose size & scope is not fully known.
  • 3.
    Botnet Terminology. (1).Bot master(2).Bots (3).IRC Server (4).Command & Control server (C&C)
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
    Botnet in Networksecurity Internet users are getting infected by bots. Many time corporate and end users are trapped in botnet attack. According to the Doballa’s technical repot 83% of global spam in March 2011 was sent by botnet. Computers Security experts estimate that most spam is sent by home computers that are contributed remotely & malicious of these computers are part of Botnet.
  • 9.
    Most Wanted Botnet TR/Dldr.agent.JKH- compromised U.S. 1.2millions of PCs Zeus – Compromised U.S.3.6 millions PCs Koobface - Compromised U.S.2.9 millions PCs Tidserv - Compromised U.S.1.5 millions PCs Trogen.Fakeavalert – Compromised U.S. 1.4 miilions PCs
  • 10.
    Botnet Detection Botnet Detectionbase on two approaches (1).Setting up Honey net (2).passive Traffic monitoring *Signature based * Anomaly based *DNS based
  • 11.
    How to preventingBotnet Infection *Use a firewall *Use anti-Bot *Use Anti virus software's *Deploy an intrusion detection system (IDS) *Deploy an intrusion prevention system (IPS) *Define a security policy and share policies with your users systematically
  • 12.
    Conclusion *Botnet pose asignificant and growing threat against cyber security *It provide key platform for many cyber crimes (DDOS) *As Network security has become integral part of our life and botnets have become the most serious threat to it *It is very important to detect botnet attack and find the solution for it.
  • 13.