SlideShare a Scribd company logo
9th TWNIC IP Open Policy Meeting
                2007/12/5, Taipei

            Botnets & DDoS Introduction



Kae Hsu (IS-TW)
Agenda
•   Bot
•   Botnet and the mechanisms used in
•   Botnets activities and economics
•   Harms from Botnets
•   DDoS mitigation
•   Botnets detection and defense
•   Reference




          2007/12/5   2      Copyright 2007 - Trend Micro Inc.
Bot
• Brief history of Bot (summarized from “Botnets, THE KILLER WEB APP”)
    – GM (1989)
         • A robot user in an IRC channel.
    – PrettyPark (1999)
         • A Bot client on Windows95/98.
         • Malicious IRC Bots.
    – SubSeven Trojan/Bot
         • Create backdoor in the system.
         • SubSeven server could control SubSeven clients via IRC server.
    – GT Bot (2000)
         • Based on the mIRC client
              – could trigger mIRC client to run scripts from IRC server.
              – support raw TCP and UDP socket connections.
    – SDBot (2002)
         • Written in C++ and the author released the source code.
         • Exploits and infects.
             2007/12/5       3              Copyright 2007 - Trend Micro Inc.
Bot
• History brief (cont.)
   – Agobot (2002)
       • Modular design.
       • Using P2P file-sharing applications to spread.


   Characteristic-Based Families
   – Spybot (2003)
       • Open source Trojan and deviate from SDBot.
   – RBot (2003)
       • Most detections in Windows platform, with 1.9 million PCs. (2005)
   – Polybot (2004)
       • Derived from the AgoBot.
   – Mytob (2005)
       • Hybrid from MyDoom and bot IRC C&C functionality.



          2007/12/5     4             Copyright 2007 - Trend Micro Inc.
Botnet and the mechanisms used in
•   Botnet
    – Some Bots controlled by a single one/organization (botherder)
      and execute the commands from the botherder.
•   Botnet Life Cycle
    1. Exploit.
    2. Report to the botherder (via C&C channel).
    3. Retrieve the anti-antivirus module.
    4. Rally and secure the Bot client.
    5. Listen to the C&C channel and receive command.
    6. Retrieve the payload module.
    7. Execute the command.
    8. Report result to the C&C channel.
    9. Back to step 5.
    10. Erase all evidence and abandon the Bot client.

           2007/12/5   5           Copyright 2007 - Trend Micro Inc.
Botnet and the mechanisms used in
• C&C: Command and Control
  – Botherder use C&C to collect Bot client information and delivery
    the commands to Bot clients.
  – IRC server is the most early and widely used C&C
       •   Interactive.
       •   Easy to build a IRC server.
       •   Easy to create and control several Botnets using one server.
       •   Easy to create redundancy.
  –   Web-based C&C servers.
  –   P2P Botnets.
  –   Random.
  –   IM C&C.
  –   Remote Administration.
  –   Drop Zone and FTP-based C&C.


            2007/12/5     6             Copyright 2007 - Trend Micro Inc.
Botnets activities and economics
• Exploit new Bot client
• DDoS attack
    – DDoS ransom - $$$
• Software installation
    – adware - $$$
    – clicks4hire - $$$
•   Spam and phishing - $$$
•   Storage and distribution of stolen or illegal data
•   Ransomware - $$$
•   Data mining - $$$
•   Reporting results
•   Erase the evidence, abandon the client

           2007/12/5      7      Copyright 2007 - Trend Micro Inc.
Harms from Botnets
• Spam
   – Botherder control Bot clients to email spam.
• DDoS – Distributed Denial of Service
   – Flooding lots of anomaly traffic or launch lots of service request
     to the DDoS target
       • The service is blocked on victim cause of resource exhausted.
           – bandwidth resource
           – system resource
   – DDoS is hard to prevent
       • It is hard to classify normal or abnormal traffic.
           – Anomaly TCP/UDP/ICMP flooding is easy to detect.
           – Anomaly service access request is hard to detect.
       • ISP uplink congestion will impact other customer
           – Traffic scrubbing is helpless to uplink congestion.




           2007/12/5      8               Copyright 2007 - Trend Micro Inc.
Harms from Botnets
• Botnets: the source of DDoS
   – In a Botnet, zombie PCs would be used to generate the attack
     traffic to the victims.
   – If a Botnet have >100,000 zombie PCs, each PC generate
     50kbps attack traffic to the victim; The total attack traffic could
     reach more than 5Gbps!!!
       • 5Gbps traffic could congest lots of links of enterprise and ISP.
   – If a Botnet have >100,000 zombie PCs, each PC generate 1kpps
     attack traffic to the victim; The total attack traffic could reach
     more than 100Mpps!!!
       • 100Mpps traffic could shutdown lots of equipments of enterprise
         and ISP.
   – Most ISPs use “black-hole” mechanism to drop the attack traffic,
     but it will drop normal traffic flow to victim too
       • ISPs help the cyber-criminal complete the attack.


           2007/12/5     9             Copyright 2007 - Trend Micro Inc.
Harms from Botnets
• Scale of Botnet:
   – Telenor takes down 'massive' botnet – more than 10,000 zombie
     PC
       • http://www.theregister.co.uk/2004/09/09/telenor_botnet_dismantled/
   – Dutch Botnet suspects ran 1.5 million machines
       • http://www.techweb.com/wire/security/172303160
   – Of the 600 million computers currently on the internet, between
     100 and 150 million were already part of these botnet…
           – http://news.bbc.co.uk/1/hi/business/6298641.stm

• Strength of Botnet:
   – Estonian government websites were shutdown cause serious
     DDoS attack from Apr. 27, 2007
       • At its peak on May 9, the attack shut down up to 58 sites at once.
       • Computers from the United States, Canada, Brazil, Vietnam and
         others have been used in the attacks.


          2007/12/5      10             Copyright 2007 - Trend Micro Inc.
Harms from Botnets
• DDoS example
  – ISPs               Bot client
                                                                        BOTNETS




                                                                         attack
                                                                         traffic




                                                                        VICTIMS




                                                                           link
                                                                        congestion



           2007/12/5        11      Copyright 2007 - Trend Micro Inc.
Harms from Botnets
  – All of the packets forward to victim were dropped.


                                                                      BOTNETS




                                                                       attack
                                                                       traffic




                                                                      VICTIMS




         2007/12/5    12          Copyright 2007 - Trend Micro Inc.
DDoS mitigation
• Scrub the traffic, accept and forward the normal packets
  and drop the abnormal packets
   – Build the traffic scrubbing system in your netowrk
       • Congestion still would be happened on ISP border router.
                                                                                                      VICTIMS




                                                                                                         link
                                                                                                      congestion


   – Order scrubbing service from upstream ISP or scrubbing service
     provider.
                                                                         scrubbing service provider




                                                                                                      VICTIMS




                                                                                                         link
                                                                                                      congestion

          2007/12/5     13           Copyright 2007 - Trend Micro Inc.
Botnets detection and defense
  • Internet projects to detect Bot/Botnets
             – Darknet
                   • A subnet that no any machine host in.
                   • There should not be any normal traffic flow to this subnet
                             – Anomaly traffic flow sent by malware almost.
                   • It is possible to trace the compromised machine by analyzing those
                     anomaly traffic.



                                                                                            enable promiscuous mode
Bot client
                                  Internet

                                                                                           .4


                                                                                                                      analyze exploit traffic and catch Bot client IP
                                                                             .1
                                                                                           .3


              R(config)#ip route 172.17.12.128 255.255.255.128 172.17.12.4                 .2


                                                                             172.17.12.0/24


                           2007/12/5                     14                   Copyright 2007 - Trend Micro Inc.
Botnets detection and defense
  • Internet projects to detect Bot/Botnets
         – Honeypots
                   • A machine that exploit by malware on purpose.
                       – Botnets life cycle:
                              »   2) Report to the botherder (via C&C channel).
                              »   5) Listen to the C&C channel and receive command.
                              »   6) Retrieve the payload module.
                              »   8) Report result to the C&C channel.
                       – To sniff and analyze the connections of Bot, we could catch:
                              » the IP address of C&C
                              » the IP address of victims

             C&C
172.31.1.1
                          Internet
                                                                          .4

                                                                                                        catch the C&C IP: 172.31.1.1
                                                            .1

                                                                          .3
                                                                                                 port mirror
                                                                                                                            honeypot
                                                                                                        .2


                      2007/12/5          15                  Copyright 2007 - Trend Micro Inc.
Botnets detection and defense
  – Honeypot (cont.)
         • In theories, off-line the C&C would destroy the whole Botnet
                   – It is the vulnerability of centralized C&C.

   C&C


                        Internet

                                                                             .4



                                                               .1
                                                                             .3
                                                                                                    port mirror
                                                                                                                  honeypot
                                                                                                           .2
         R(config)#ip route 172.31.1.1 255.255.255.255 null0




         • Use black-hole to block the C&C IP on the Internet
                   – But botherder would not structure their Botnet by only one C&C
                             » Use DNS to improvement C&C surviving.




                 2007/12/5                      16              Copyright 2007 - Trend Micro Inc.
Botnets detection and defense
• BGP flow-spec
  – A new BGP NLRI
      • The reason to use BGP: re-use
          – protocol algorithms.
          – operational experience.
          – administrative processes such as inter-provider peering agreements.
  – Distribute traffic flow specifications and action.
      • Flow-spec NLRI
          –   Type 1 – destination prefix
          –   Type 2 – source prefix
          –   Type 3 – IP protocol
          –   Type 4 – port
          –   Type 5 – destination port
          –   Type 6 – source port
          –   Type 7 – ICMP type
          –   Type 8 – ICMP core



          2007/12/5       17                Copyright 2007 - Trend Micro Inc.
Botnets detection and defense
               • Flow-spec NLRI (cont.)
                    –   Type 9 –TCP flags
                    –   Type 10 – packet length
                    –   Type 11 – DSCP
                    –   Type 12 – fragment
               • Traffic filtering actions
                    – Traffic-rate
                    – Traffic-action
                           » Terminal action
                           » Sample
                    – Redirect
         – Use BGP flow-spec in your network

Bot client D

                                                                                      Normal
                                                                                      client B
   Normal
   client C



                                                      Server A

                   2007/12/5         18           Copyright 2007 - Trend Micro Inc.
Botnets detection and defense
         – Use BGP flow-spec in your network
               • Update BGP flow-spec route to border router
                   – ‘SRC=D, DST=A, action=drop’

Bot client D

                                                                                 Normal
                                                                                 client B
   Normal
   client C



                                                 Server A



               • Update BGP flow-spec route to peering partner
                   – ‘SRC=D, DST=A, action=drop’

Bot client D

                                                                                 Normal
                                                                                 client B
   Normal
   client C



                                                 Server A


                  2007/12/5     19           Copyright 2007 - Trend Micro Inc.
Reference
    • “Botnets, THE KILLER WEB APP”
        – by Craig A. Schiller etc.; Syngress Publishing Inc., 2007
    • The Team Cymru Darknet Project
        – http://www.cymru.com/Darknet/index.html
    • The Honeynet Project
        – http://www.honeynet.org/index.html
    • “Dissemination of flow specification rules”
        – draft-marques-idr-flow-spec-04.txt
    • “Configuring a flow route”
        – http://www.juniper.net/techpubs/software/junos/junos85/swconfig85-
          routing/id-10317421.html#id-10317421
    • “Inferring Internet Denial-of-Service Activity”
        – by David Moore etc.
    • “The Zombie Roundup: Understanding, Detecting, and Disrupting
      Botnets”
        – by Evan Cooke etc.
    • “How CNCERT/CC fighting to Botnets”
        – by Mingqi Chen.; CNCERT/CC
        2007/12/5      20             Copyright 2007 - Trend Micro Inc.
Thank You




Classification   2007/12/6
                 2007/12/5   21   Copyright 2007 - Trend Micro Inc.

More Related Content

Viewers also liked

4byte As Number Migration Suggestion
4byte As Number Migration Suggestion4byte As Number Migration Suggestion
4byte As Number Migration Suggestion
Kae Hsu
 
4 byte AS number workshop material
4 byte AS number workshop material4 byte AS number workshop material
4 byte AS number workshop material
Kae Hsu
 
A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7
Rawnet
 
4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios
Kae Hsu
 
Noisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networksNoisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networks
Michael Stumpf
 
Toward The Semantic Deep Web
Toward The Semantic Deep WebToward The Semantic Deep Web
Toward The Semantic Deep Web
Samiul Hoque
 
Web 101 by Jennifer Lill
Web 101 by Jennifer LillWeb 101 by Jennifer Lill
Web 101 by Jennifer Lill
Jennifer Lill
 
How internet works and how messages are transferred in Internet
How internet works and how messages are transferred in InternetHow internet works and how messages are transferred in Internet
How internet works and how messages are transferred in Internet
pagetron
 
20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV
Kae Hsu
 
Rawnet Lightning Talk - Anyone Can Draw.
Rawnet Lightning Talk - Anyone Can Draw.Rawnet Lightning Talk - Anyone Can Draw.
Rawnet Lightning Talk - Anyone Can Draw.
Rawnet
 
CDN and ISP Operation
CDN and ISP OperationCDN and ISP Operation
CDN and ISP Operation
Kae Hsu
 
Network Design in Cloud-ready IDC
Network Design in Cloud-ready IDCNetwork Design in Cloud-ready IDC
Network Design in Cloud-ready IDC
Kae Hsu
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
Kae Hsu
 
Redundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpointRedundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpoint
Kae Hsu
 
Rawnet Lightning talk - 'Thinking, Fast and Slow' review
Rawnet Lightning talk - 'Thinking, Fast and Slow' reviewRawnet Lightning talk - 'Thinking, Fast and Slow' review
Rawnet Lightning talk - 'Thinking, Fast and Slow' review
Rawnet
 
Multimedia- How Internet Works
Multimedia- How Internet WorksMultimedia- How Internet Works
Multimedia- How Internet Works
sambhenilesh
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Rozitarmizi Mohammad
 

Viewers also liked (17)

4byte As Number Migration Suggestion
4byte As Number Migration Suggestion4byte As Number Migration Suggestion
4byte As Number Migration Suggestion
 
4 byte AS number workshop material
4 byte AS number workshop material4 byte AS number workshop material
4 byte AS number workshop material
 
A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7
 
4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios
 
Noisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networksNoisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networks
 
Toward The Semantic Deep Web
Toward The Semantic Deep WebToward The Semantic Deep Web
Toward The Semantic Deep Web
 
Web 101 by Jennifer Lill
Web 101 by Jennifer LillWeb 101 by Jennifer Lill
Web 101 by Jennifer Lill
 
How internet works and how messages are transferred in Internet
How internet works and how messages are transferred in InternetHow internet works and how messages are transferred in Internet
How internet works and how messages are transferred in Internet
 
20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV
 
Rawnet Lightning Talk - Anyone Can Draw.
Rawnet Lightning Talk - Anyone Can Draw.Rawnet Lightning Talk - Anyone Can Draw.
Rawnet Lightning Talk - Anyone Can Draw.
 
CDN and ISP Operation
CDN and ISP OperationCDN and ISP Operation
CDN and ISP Operation
 
Network Design in Cloud-ready IDC
Network Design in Cloud-ready IDCNetwork Design in Cloud-ready IDC
Network Design in Cloud-ready IDC
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
Redundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpointRedundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpoint
 
Rawnet Lightning talk - 'Thinking, Fast and Slow' review
Rawnet Lightning talk - 'Thinking, Fast and Slow' reviewRawnet Lightning talk - 'Thinking, Fast and Slow' review
Rawnet Lightning talk - 'Thinking, Fast and Slow' review
 
Multimedia- How Internet Works
Multimedia- How Internet WorksMultimedia- How Internet Works
Multimedia- How Internet Works
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 

Similar to Botnets & DDoS Introduction

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
researchinventy
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
APNIC
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
swang2010
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay Alive
Positive Hack Days
 
Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques
SafiUllah Saikat
 
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
Eric Vanderburg
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
DefconRussia
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay alive
qqlan
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
Positive Hack Days
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
Alex Hunte
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTC
Quobis
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
OWASP Delhi
 
Virtualization Monitoring Webinar
Virtualization Monitoring WebinarVirtualization Monitoring Webinar
Virtualization Monitoring Webinar
krkingsley
 
Distributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationDistributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And Mitigation
Pavel Odintsov
 
WebRTC Security Concerns, a real problem?
WebRTC Security Concerns, a real problem?WebRTC Security Concerns, a real problem?
WebRTC Security Concerns, a real problem?
VOIP2DAY
 
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
Quobis
 
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Julia Yu-Chin Cheng
 
Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)
Infradata
 
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eric Vanderburg
 
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannotapidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays
 

Similar to Botnets & DDoS Introduction (20)

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay Alive
 
Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques
 
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay alive
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTC
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
 
Virtualization Monitoring Webinar
Virtualization Monitoring WebinarVirtualization Monitoring Webinar
Virtualization Monitoring Webinar
 
Distributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationDistributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And Mitigation
 
WebRTC Security Concerns, a real problem?
WebRTC Security Concerns, a real problem?WebRTC Security Concerns, a real problem?
WebRTC Security Concerns, a real problem?
 
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
 
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
 
Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)
 
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
 
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannotapidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
 

More from Kae Hsu

FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP Introduction
Kae Hsu
 
TWNIC 13th OPM session
TWNIC 13th OPM sessionTWNIC 13th OPM session
TWNIC 13th OPM session
Kae Hsu
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Kae Hsu
 
r2
r2r2
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Kae Hsu
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Kae Hsu
 

More from Kae Hsu (6)

FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP Introduction
 
TWNIC 13th OPM session
TWNIC 13th OPM sessionTWNIC 13th OPM session
TWNIC 13th OPM session
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharing
 
r2
r2r2
r2
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharing
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharing
 

Recently uploaded

ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Ukraine
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 

Recently uploaded (20)

ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 

Botnets & DDoS Introduction

  • 1. 9th TWNIC IP Open Policy Meeting 2007/12/5, Taipei Botnets & DDoS Introduction Kae Hsu (IS-TW)
  • 2. Agenda • Bot • Botnet and the mechanisms used in • Botnets activities and economics • Harms from Botnets • DDoS mitigation • Botnets detection and defense • Reference 2007/12/5 2 Copyright 2007 - Trend Micro Inc.
  • 3. Bot • Brief history of Bot (summarized from “Botnets, THE KILLER WEB APP”) – GM (1989) • A robot user in an IRC channel. – PrettyPark (1999) • A Bot client on Windows95/98. • Malicious IRC Bots. – SubSeven Trojan/Bot • Create backdoor in the system. • SubSeven server could control SubSeven clients via IRC server. – GT Bot (2000) • Based on the mIRC client – could trigger mIRC client to run scripts from IRC server. – support raw TCP and UDP socket connections. – SDBot (2002) • Written in C++ and the author released the source code. • Exploits and infects. 2007/12/5 3 Copyright 2007 - Trend Micro Inc.
  • 4. Bot • History brief (cont.) – Agobot (2002) • Modular design. • Using P2P file-sharing applications to spread. Characteristic-Based Families – Spybot (2003) • Open source Trojan and deviate from SDBot. – RBot (2003) • Most detections in Windows platform, with 1.9 million PCs. (2005) – Polybot (2004) • Derived from the AgoBot. – Mytob (2005) • Hybrid from MyDoom and bot IRC C&C functionality. 2007/12/5 4 Copyright 2007 - Trend Micro Inc.
  • 5. Botnet and the mechanisms used in • Botnet – Some Bots controlled by a single one/organization (botherder) and execute the commands from the botherder. • Botnet Life Cycle 1. Exploit. 2. Report to the botherder (via C&C channel). 3. Retrieve the anti-antivirus module. 4. Rally and secure the Bot client. 5. Listen to the C&C channel and receive command. 6. Retrieve the payload module. 7. Execute the command. 8. Report result to the C&C channel. 9. Back to step 5. 10. Erase all evidence and abandon the Bot client. 2007/12/5 5 Copyright 2007 - Trend Micro Inc.
  • 6. Botnet and the mechanisms used in • C&C: Command and Control – Botherder use C&C to collect Bot client information and delivery the commands to Bot clients. – IRC server is the most early and widely used C&C • Interactive. • Easy to build a IRC server. • Easy to create and control several Botnets using one server. • Easy to create redundancy. – Web-based C&C servers. – P2P Botnets. – Random. – IM C&C. – Remote Administration. – Drop Zone and FTP-based C&C. 2007/12/5 6 Copyright 2007 - Trend Micro Inc.
  • 7. Botnets activities and economics • Exploit new Bot client • DDoS attack – DDoS ransom - $$$ • Software installation – adware - $$$ – clicks4hire - $$$ • Spam and phishing - $$$ • Storage and distribution of stolen or illegal data • Ransomware - $$$ • Data mining - $$$ • Reporting results • Erase the evidence, abandon the client 2007/12/5 7 Copyright 2007 - Trend Micro Inc.
  • 8. Harms from Botnets • Spam – Botherder control Bot clients to email spam. • DDoS – Distributed Denial of Service – Flooding lots of anomaly traffic or launch lots of service request to the DDoS target • The service is blocked on victim cause of resource exhausted. – bandwidth resource – system resource – DDoS is hard to prevent • It is hard to classify normal or abnormal traffic. – Anomaly TCP/UDP/ICMP flooding is easy to detect. – Anomaly service access request is hard to detect. • ISP uplink congestion will impact other customer – Traffic scrubbing is helpless to uplink congestion. 2007/12/5 8 Copyright 2007 - Trend Micro Inc.
  • 9. Harms from Botnets • Botnets: the source of DDoS – In a Botnet, zombie PCs would be used to generate the attack traffic to the victims. – If a Botnet have >100,000 zombie PCs, each PC generate 50kbps attack traffic to the victim; The total attack traffic could reach more than 5Gbps!!! • 5Gbps traffic could congest lots of links of enterprise and ISP. – If a Botnet have >100,000 zombie PCs, each PC generate 1kpps attack traffic to the victim; The total attack traffic could reach more than 100Mpps!!! • 100Mpps traffic could shutdown lots of equipments of enterprise and ISP. – Most ISPs use “black-hole” mechanism to drop the attack traffic, but it will drop normal traffic flow to victim too • ISPs help the cyber-criminal complete the attack. 2007/12/5 9 Copyright 2007 - Trend Micro Inc.
  • 10. Harms from Botnets • Scale of Botnet: – Telenor takes down 'massive' botnet – more than 10,000 zombie PC • http://www.theregister.co.uk/2004/09/09/telenor_botnet_dismantled/ – Dutch Botnet suspects ran 1.5 million machines • http://www.techweb.com/wire/security/172303160 – Of the 600 million computers currently on the internet, between 100 and 150 million were already part of these botnet… – http://news.bbc.co.uk/1/hi/business/6298641.stm • Strength of Botnet: – Estonian government websites were shutdown cause serious DDoS attack from Apr. 27, 2007 • At its peak on May 9, the attack shut down up to 58 sites at once. • Computers from the United States, Canada, Brazil, Vietnam and others have been used in the attacks. 2007/12/5 10 Copyright 2007 - Trend Micro Inc.
  • 11. Harms from Botnets • DDoS example – ISPs Bot client BOTNETS attack traffic VICTIMS link congestion 2007/12/5 11 Copyright 2007 - Trend Micro Inc.
  • 12. Harms from Botnets – All of the packets forward to victim were dropped. BOTNETS attack traffic VICTIMS 2007/12/5 12 Copyright 2007 - Trend Micro Inc.
  • 13. DDoS mitigation • Scrub the traffic, accept and forward the normal packets and drop the abnormal packets – Build the traffic scrubbing system in your netowrk • Congestion still would be happened on ISP border router. VICTIMS link congestion – Order scrubbing service from upstream ISP or scrubbing service provider. scrubbing service provider VICTIMS link congestion 2007/12/5 13 Copyright 2007 - Trend Micro Inc.
  • 14. Botnets detection and defense • Internet projects to detect Bot/Botnets – Darknet • A subnet that no any machine host in. • There should not be any normal traffic flow to this subnet – Anomaly traffic flow sent by malware almost. • It is possible to trace the compromised machine by analyzing those anomaly traffic. enable promiscuous mode Bot client Internet .4 analyze exploit traffic and catch Bot client IP .1 .3 R(config)#ip route 172.17.12.128 255.255.255.128 172.17.12.4 .2 172.17.12.0/24 2007/12/5 14 Copyright 2007 - Trend Micro Inc.
  • 15. Botnets detection and defense • Internet projects to detect Bot/Botnets – Honeypots • A machine that exploit by malware on purpose. – Botnets life cycle: » 2) Report to the botherder (via C&C channel). » 5) Listen to the C&C channel and receive command. » 6) Retrieve the payload module. » 8) Report result to the C&C channel. – To sniff and analyze the connections of Bot, we could catch: » the IP address of C&C » the IP address of victims C&C 172.31.1.1 Internet .4 catch the C&C IP: 172.31.1.1 .1 .3 port mirror honeypot .2 2007/12/5 15 Copyright 2007 - Trend Micro Inc.
  • 16. Botnets detection and defense – Honeypot (cont.) • In theories, off-line the C&C would destroy the whole Botnet – It is the vulnerability of centralized C&C. C&C Internet .4 .1 .3 port mirror honeypot .2 R(config)#ip route 172.31.1.1 255.255.255.255 null0 • Use black-hole to block the C&C IP on the Internet – But botherder would not structure their Botnet by only one C&C » Use DNS to improvement C&C surviving. 2007/12/5 16 Copyright 2007 - Trend Micro Inc.
  • 17. Botnets detection and defense • BGP flow-spec – A new BGP NLRI • The reason to use BGP: re-use – protocol algorithms. – operational experience. – administrative processes such as inter-provider peering agreements. – Distribute traffic flow specifications and action. • Flow-spec NLRI – Type 1 – destination prefix – Type 2 – source prefix – Type 3 – IP protocol – Type 4 – port – Type 5 – destination port – Type 6 – source port – Type 7 – ICMP type – Type 8 – ICMP core 2007/12/5 17 Copyright 2007 - Trend Micro Inc.
  • 18. Botnets detection and defense • Flow-spec NLRI (cont.) – Type 9 –TCP flags – Type 10 – packet length – Type 11 – DSCP – Type 12 – fragment • Traffic filtering actions – Traffic-rate – Traffic-action » Terminal action » Sample – Redirect – Use BGP flow-spec in your network Bot client D Normal client B Normal client C Server A 2007/12/5 18 Copyright 2007 - Trend Micro Inc.
  • 19. Botnets detection and defense – Use BGP flow-spec in your network • Update BGP flow-spec route to border router – ‘SRC=D, DST=A, action=drop’ Bot client D Normal client B Normal client C Server A • Update BGP flow-spec route to peering partner – ‘SRC=D, DST=A, action=drop’ Bot client D Normal client B Normal client C Server A 2007/12/5 19 Copyright 2007 - Trend Micro Inc.
  • 20. Reference • “Botnets, THE KILLER WEB APP” – by Craig A. Schiller etc.; Syngress Publishing Inc., 2007 • The Team Cymru Darknet Project – http://www.cymru.com/Darknet/index.html • The Honeynet Project – http://www.honeynet.org/index.html • “Dissemination of flow specification rules” – draft-marques-idr-flow-spec-04.txt • “Configuring a flow route” – http://www.juniper.net/techpubs/software/junos/junos85/swconfig85- routing/id-10317421.html#id-10317421 • “Inferring Internet Denial-of-Service Activity” – by David Moore etc. • “The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets” – by Evan Cooke etc. • “How CNCERT/CC fighting to Botnets” – by Mingqi Chen.; CNCERT/CC 2007/12/5 20 Copyright 2007 - Trend Micro Inc.
  • 21. Thank You Classification 2007/12/6 2007/12/5 21 Copyright 2007 - Trend Micro Inc.