AungThu Rha Hein (g5536871)
1
 What is a botnet?
 History of Botnet
 What are they used for?
 How do they work?
 Infection Procedure
 CommandTopologies
 Communication Methods
 Propagation Methods
 Defense
ď‚§ Detection methods
ď‚§ Defense Strategy
 Conclusion
2
 A botnet is a collection of internet-connected
programs communicating with other similar
programs in order to perform tasks.
ď‚– Wikipedia
 A collection of compromised computers that
is slowly built up then unleashed as a DDOS
attack or used to send very large quantities of
spam.
ď‚– WolframAlpha
3
 Bots originally used to automate tasks
ď‚§ IRC,IM, MUDS, online-games
 Evolved into a way to automate malicious
attacks
 Spam, control a pc, propagate etc…
 Botnets started with DOS against servers
ď‚§ Stacheldraht,Trinoo, Kelihos
4
 DOS attacks
 Spam
 Phishing
 Identity theft
 Click Fraud
 Others….
5
1. Botmaster infected victims with bot
botmaster victim
C&C server
6
2.bot connects to the C&C
server using HTTP,IRC or
other protocol
victim
C&C server
botmaster
7
3.Botmaster sends
commands
through C&C server to
zombie
botmaster victim
C&C server
8
4.Repeat these process and
botmaster have bot army to
Control from a single point
botmaster
Victims, zombies
C&C server
9
10
 Star
ď‚§ Bots tied to centralized C&C server
 Multi-Server
ď‚§ Same as Star but with multiple C&C server
 Hierarchical
ď‚§ Parent bot control child bots
 Random
ď‚§ Full P2P support
11
 HTTP
ď‚§ Easy for attacker to blend in
 IRC
ď‚§ Harder to hide compared with HTTP
 Custom
ď‚§ Makes use of new application protocols
12
 E-Mail attachments; Social Engineering
 Trojan horses
 Drive-by downloads
 Scanning
ď‚§ Horizontal: Single port
ď‚§ Vertical :Single IP address
13
 Three Main Issues
ď‚§ How to Detect them?
ď‚§ How to Response them?
ď‚§ How to Negate the threat?
14
 No single method
 “Defense in depth” principle
 Methods
ď‚§ Network traffic analysis (NetFlow)
ď‚§ Packet analysis(IDS)
ď‚§ Analysis of application log files (Antivirus, firewall)
ď‚§ Honeypots
 Others…
15
 DefenseAgainst infection by bot (DAIBB)
ď‚§ Prevent from entering into the system
ď‚§ Updates and patches, security levels
 Defense against attacks by bot (DAABB)
ď‚§ Prevent from being victim of botnet attacks
ď‚§ IPS,TLS, SSL
 Monitoring, detection & studying of Bot (MDSBB)
ď‚§ Detection methods, monitoring log files
16
 Education of users (EOU)
ď‚§ Raise the security awareness of users
 Legislative protection (LP)
ď‚§ legislative-punishment policies
THANKYOU!
17

Botnets 101

  • 1.
    AungThu Rha Hein(g5536871) 1
  • 2.
     What isa botnet?  History of Botnet  What are they used for?  How do they work?  Infection Procedure  CommandTopologies  Communication Methods  Propagation Methods  Defense  Detection methods  Defense Strategy  Conclusion 2
  • 3.
     A botnetis a collection of internet-connected programs communicating with other similar programs in order to perform tasks.  Wikipedia  A collection of compromised computers that is slowly built up then unleashed as a DDOS attack or used to send very large quantities of spam.  WolframAlpha 3
  • 4.
     Bots originallyused to automate tasks  IRC,IM, MUDS, online-games  Evolved into a way to automate malicious attacks  Spam, control a pc, propagate etc…  Botnets started with DOS against servers  Stacheldraht,Trinoo, Kelihos 4
  • 5.
     DOS attacks Spam  Phishing  Identity theft  Click Fraud  Others…. 5
  • 6.
    1. Botmaster infectedvictims with bot botmaster victim C&C server 6
  • 7.
    2.bot connects tothe C&C server using HTTP,IRC or other protocol victim C&C server botmaster 7
  • 8.
    3.Botmaster sends commands through C&Cserver to zombie botmaster victim C&C server 8
  • 9.
    4.Repeat these processand botmaster have bot army to Control from a single point botmaster Victims, zombies C&C server 9
  • 10.
  • 11.
     Star  Botstied to centralized C&C server  Multi-Server  Same as Star but with multiple C&C server  Hierarchical  Parent bot control child bots  Random  Full P2P support 11
  • 12.
     HTTP  Easyfor attacker to blend in  IRC  Harder to hide compared with HTTP  Custom  Makes use of new application protocols 12
  • 13.
     E-Mail attachments;Social Engineering  Trojan horses  Drive-by downloads  Scanning  Horizontal: Single port  Vertical :Single IP address 13
  • 14.
     Three MainIssues  How to Detect them?  How to Response them?  How to Negate the threat? 14
  • 15.
     No singlemethod  “Defense in depth” principle  Methods  Network traffic analysis (NetFlow)  Packet analysis(IDS)  Analysis of application log files (Antivirus, firewall)  Honeypots  Others… 15
  • 16.
     DefenseAgainst infectionby bot (DAIBB)  Prevent from entering into the system  Updates and patches, security levels  Defense against attacks by bot (DAABB)  Prevent from being victim of botnet attacks  IPS,TLS, SSL  Monitoring, detection & studying of Bot (MDSBB)  Detection methods, monitoring log files 16
  • 17.
     Education ofusers (EOU)  Raise the security awareness of users  Legislative protection (LP)  legislative-punishment policies THANKYOU! 17