SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
9th TWNIC IP Open Policy Meeting
                2007/12/5, Taipei

            Botnets & DDoS Introduction



Kae Hsu (IS-TW)
Agenda
•   Bot
•   Botnet and the mechanisms used in
•   Botnets activities and economics
•   Harms from Botnets
•   DDoS mitigation
•   Botnets detection and defense
•   Reference




          2007/12/5   2      Copyright 2007 - Trend Micro Inc.
Bot
• Brief history of Bot (summarized from “Botnets, THE KILLER WEB APP”)
    – GM (1989)
         • A robot user in an IRC channel.
    – PrettyPark (1999)
         • A Bot client on Windows95/98.
         • Malicious IRC Bots.
    – SubSeven Trojan/Bot
         • Create backdoor in the system.
         • SubSeven server could control SubSeven clients via IRC server.
    – GT Bot (2000)
         • Based on the mIRC client
              – could trigger mIRC client to run scripts from IRC server.
              – support raw TCP and UDP socket connections.
    – SDBot (2002)
         • Written in C++ and the author released the source code.
         • Exploits and infects.
             2007/12/5       3              Copyright 2007 - Trend Micro Inc.
Bot
• History brief (cont.)
   – Agobot (2002)
       • Modular design.
       • Using P2P file-sharing applications to spread.


   Characteristic-Based Families
   – Spybot (2003)
       • Open source Trojan and deviate from SDBot.
   – RBot (2003)
       • Most detections in Windows platform, with 1.9 million PCs. (2005)
   – Polybot (2004)
       • Derived from the AgoBot.
   – Mytob (2005)
       • Hybrid from MyDoom and bot IRC C&C functionality.



          2007/12/5     4             Copyright 2007 - Trend Micro Inc.
Botnet and the mechanisms used in
•   Botnet
    – Some Bots controlled by a single one/organization (botherder)
      and execute the commands from the botherder.
•   Botnet Life Cycle
    1. Exploit.
    2. Report to the botherder (via C&C channel).
    3. Retrieve the anti-antivirus module.
    4. Rally and secure the Bot client.
    5. Listen to the C&C channel and receive command.
    6. Retrieve the payload module.
    7. Execute the command.
    8. Report result to the C&C channel.
    9. Back to step 5.
    10. Erase all evidence and abandon the Bot client.

           2007/12/5   5           Copyright 2007 - Trend Micro Inc.
Botnet and the mechanisms used in
• C&C: Command and Control
  – Botherder use C&C to collect Bot client information and delivery
    the commands to Bot clients.
  – IRC server is the most early and widely used C&C
       •   Interactive.
       •   Easy to build a IRC server.
       •   Easy to create and control several Botnets using one server.
       •   Easy to create redundancy.
  –   Web-based C&C servers.
  –   P2P Botnets.
  –   Random.
  –   IM C&C.
  –   Remote Administration.
  –   Drop Zone and FTP-based C&C.


            2007/12/5     6             Copyright 2007 - Trend Micro Inc.
Botnets activities and economics
• Exploit new Bot client
• DDoS attack
    – DDoS ransom - $$$
• Software installation
    – adware - $$$
    – clicks4hire - $$$
•   Spam and phishing - $$$
•   Storage and distribution of stolen or illegal data
•   Ransomware - $$$
•   Data mining - $$$
•   Reporting results
•   Erase the evidence, abandon the client

           2007/12/5      7      Copyright 2007 - Trend Micro Inc.
Harms from Botnets
• Spam
   – Botherder control Bot clients to email spam.
• DDoS – Distributed Denial of Service
   – Flooding lots of anomaly traffic or launch lots of service request
     to the DDoS target
       • The service is blocked on victim cause of resource exhausted.
           – bandwidth resource
           – system resource
   – DDoS is hard to prevent
       • It is hard to classify normal or abnormal traffic.
           – Anomaly TCP/UDP/ICMP flooding is easy to detect.
           – Anomaly service access request is hard to detect.
       • ISP uplink congestion will impact other customer
           – Traffic scrubbing is helpless to uplink congestion.




           2007/12/5      8               Copyright 2007 - Trend Micro Inc.
Harms from Botnets
• Botnets: the source of DDoS
   – In a Botnet, zombie PCs would be used to generate the attack
     traffic to the victims.
   – If a Botnet have >100,000 zombie PCs, each PC generate
     50kbps attack traffic to the victim; The total attack traffic could
     reach more than 5Gbps!!!
       • 5Gbps traffic could congest lots of links of enterprise and ISP.
   – If a Botnet have >100,000 zombie PCs, each PC generate 1kpps
     attack traffic to the victim; The total attack traffic could reach
     more than 100Mpps!!!
       • 100Mpps traffic could shutdown lots of equipments of enterprise
         and ISP.
   – Most ISPs use “black-hole” mechanism to drop the attack traffic,
     but it will drop normal traffic flow to victim too
       • ISPs help the cyber-criminal complete the attack.


           2007/12/5     9             Copyright 2007 - Trend Micro Inc.
Harms from Botnets
• Scale of Botnet:
   – Telenor takes down 'massive' botnet – more than 10,000 zombie
     PC
       • http://www.theregister.co.uk/2004/09/09/telenor_botnet_dismantled/
   – Dutch Botnet suspects ran 1.5 million machines
       • http://www.techweb.com/wire/security/172303160
   – Of the 600 million computers currently on the internet, between
     100 and 150 million were already part of these botnet…
           – http://news.bbc.co.uk/1/hi/business/6298641.stm

• Strength of Botnet:
   – Estonian government websites were shutdown cause serious
     DDoS attack from Apr. 27, 2007
       • At its peak on May 9, the attack shut down up to 58 sites at once.
       • Computers from the United States, Canada, Brazil, Vietnam and
         others have been used in the attacks.


          2007/12/5      10             Copyright 2007 - Trend Micro Inc.
Harms from Botnets
• DDoS example
  – ISPs               Bot client
                                                                        BOTNETS




                                                                         attack
                                                                         traffic




                                                                        VICTIMS




                                                                           link
                                                                        congestion



           2007/12/5        11      Copyright 2007 - Trend Micro Inc.
Harms from Botnets
  – All of the packets forward to victim were dropped.


                                                                      BOTNETS




                                                                       attack
                                                                       traffic




                                                                      VICTIMS




         2007/12/5    12          Copyright 2007 - Trend Micro Inc.
DDoS mitigation
• Scrub the traffic, accept and forward the normal packets
  and drop the abnormal packets
   – Build the traffic scrubbing system in your netowrk
       • Congestion still would be happened on ISP border router.
                                                                                                      VICTIMS




                                                                                                         link
                                                                                                      congestion


   – Order scrubbing service from upstream ISP or scrubbing service
     provider.
                                                                         scrubbing service provider




                                                                                                      VICTIMS




                                                                                                         link
                                                                                                      congestion

          2007/12/5     13           Copyright 2007 - Trend Micro Inc.
Botnets detection and defense
  • Internet projects to detect Bot/Botnets
             – Darknet
                   • A subnet that no any machine host in.
                   • There should not be any normal traffic flow to this subnet
                             – Anomaly traffic flow sent by malware almost.
                   • It is possible to trace the compromised machine by analyzing those
                     anomaly traffic.



                                                                                            enable promiscuous mode
Bot client
                                  Internet

                                                                                           .4


                                                                                                                      analyze exploit traffic and catch Bot client IP
                                                                             .1
                                                                                           .3


              R(config)#ip route 172.17.12.128 255.255.255.128 172.17.12.4                 .2


                                                                             172.17.12.0/24


                           2007/12/5                     14                   Copyright 2007 - Trend Micro Inc.
Botnets detection and defense
  • Internet projects to detect Bot/Botnets
         – Honeypots
                   • A machine that exploit by malware on purpose.
                       – Botnets life cycle:
                              »   2) Report to the botherder (via C&C channel).
                              »   5) Listen to the C&C channel and receive command.
                              »   6) Retrieve the payload module.
                              »   8) Report result to the C&C channel.
                       – To sniff and analyze the connections of Bot, we could catch:
                              » the IP address of C&C
                              » the IP address of victims

             C&C
172.31.1.1
                          Internet
                                                                          .4

                                                                                                        catch the C&C IP: 172.31.1.1
                                                            .1

                                                                          .3
                                                                                                 port mirror
                                                                                                                            honeypot
                                                                                                        .2


                      2007/12/5          15                  Copyright 2007 - Trend Micro Inc.
Botnets detection and defense
  – Honeypot (cont.)
         • In theories, off-line the C&C would destroy the whole Botnet
                   – It is the vulnerability of centralized C&C.

   C&C


                        Internet

                                                                             .4



                                                               .1
                                                                             .3
                                                                                                    port mirror
                                                                                                                  honeypot
                                                                                                           .2
         R(config)#ip route 172.31.1.1 255.255.255.255 null0




         • Use black-hole to block the C&C IP on the Internet
                   – But botherder would not structure their Botnet by only one C&C
                             » Use DNS to improvement C&C surviving.




                 2007/12/5                      16              Copyright 2007 - Trend Micro Inc.
Botnets detection and defense
• BGP flow-spec
  – A new BGP NLRI
      • The reason to use BGP: re-use
          – protocol algorithms.
          – operational experience.
          – administrative processes such as inter-provider peering agreements.
  – Distribute traffic flow specifications and action.
      • Flow-spec NLRI
          –   Type 1 – destination prefix
          –   Type 2 – source prefix
          –   Type 3 – IP protocol
          –   Type 4 – port
          –   Type 5 – destination port
          –   Type 6 – source port
          –   Type 7 – ICMP type
          –   Type 8 – ICMP core



          2007/12/5       17                Copyright 2007 - Trend Micro Inc.
Botnets detection and defense
               • Flow-spec NLRI (cont.)
                    –   Type 9 –TCP flags
                    –   Type 10 – packet length
                    –   Type 11 – DSCP
                    –   Type 12 – fragment
               • Traffic filtering actions
                    – Traffic-rate
                    – Traffic-action
                           » Terminal action
                           » Sample
                    – Redirect
         – Use BGP flow-spec in your network

Bot client D

                                                                                      Normal
                                                                                      client B
   Normal
   client C



                                                      Server A

                   2007/12/5         18           Copyright 2007 - Trend Micro Inc.
Botnets detection and defense
         – Use BGP flow-spec in your network
               • Update BGP flow-spec route to border router
                   – ‘SRC=D, DST=A, action=drop’

Bot client D

                                                                                 Normal
                                                                                 client B
   Normal
   client C



                                                 Server A



               • Update BGP flow-spec route to peering partner
                   – ‘SRC=D, DST=A, action=drop’

Bot client D

                                                                                 Normal
                                                                                 client B
   Normal
   client C



                                                 Server A


                  2007/12/5     19           Copyright 2007 - Trend Micro Inc.
Reference
    • “Botnets, THE KILLER WEB APP”
        – by Craig A. Schiller etc.; Syngress Publishing Inc., 2007
    • The Team Cymru Darknet Project
        – http://www.cymru.com/Darknet/index.html
    • The Honeynet Project
        – http://www.honeynet.org/index.html
    • “Dissemination of flow specification rules”
        – draft-marques-idr-flow-spec-04.txt
    • “Configuring a flow route”
        – http://www.juniper.net/techpubs/software/junos/junos85/swconfig85-
          routing/id-10317421.html#id-10317421
    • “Inferring Internet Denial-of-Service Activity”
        – by David Moore etc.
    • “The Zombie Roundup: Understanding, Detecting, and Disrupting
      Botnets”
        – by Evan Cooke etc.
    • “How CNCERT/CC fighting to Botnets”
        – by Mingqi Chen.; CNCERT/CC
        2007/12/5      20             Copyright 2007 - Trend Micro Inc.
Thank You




Classification   2007/12/6
                 2007/12/5   21   Copyright 2007 - Trend Micro Inc.

Weitere ähnliche Inhalte

Andere mochten auch

4byte As Number Migration Suggestion
4byte As Number Migration Suggestion4byte As Number Migration Suggestion
4byte As Number Migration SuggestionKae Hsu
 
4 byte AS number workshop material
4 byte AS number workshop material4 byte AS number workshop material
4 byte AS number workshop materialKae Hsu
 
A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7Rawnet
 
4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios4 Byte As Ns Test Scenarios
4 Byte As Ns Test ScenariosKae Hsu
 
Noisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networksNoisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networksMichael Stumpf
 
Toward The Semantic Deep Web
Toward The Semantic Deep WebToward The Semantic Deep Web
Toward The Semantic Deep WebSamiul Hoque
 
Web 101 by Jennifer Lill
Web 101 by Jennifer LillWeb 101 by Jennifer Lill
Web 101 by Jennifer LillJennifer Lill
 
How internet works and how messages are transferred in Internet
How internet works and how messages are transferred in InternetHow internet works and how messages are transferred in Internet
How internet works and how messages are transferred in Internetpagetron
 
20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFVKae Hsu
 
Rawnet Lightning Talk - Anyone Can Draw.
Rawnet Lightning Talk - Anyone Can Draw.Rawnet Lightning Talk - Anyone Can Draw.
Rawnet Lightning Talk - Anyone Can Draw.Rawnet
 
CDN and ISP Operation
CDN and ISP OperationCDN and ISP Operation
CDN and ISP OperationKae Hsu
 
Network Design in Cloud-ready IDC
Network Design in Cloud-ready IDCNetwork Design in Cloud-ready IDC
Network Design in Cloud-ready IDCKae Hsu
 
How Internet Works
How Internet WorksHow Internet Works
How Internet WorksKae Hsu
 
Redundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpointRedundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpointKae Hsu
 
Rawnet Lightning talk - 'Thinking, Fast and Slow' review
Rawnet Lightning talk - 'Thinking, Fast and Slow' reviewRawnet Lightning talk - 'Thinking, Fast and Slow' review
Rawnet Lightning talk - 'Thinking, Fast and Slow' reviewRawnet
 
Multimedia- How Internet Works
Multimedia- How Internet WorksMultimedia- How Internet Works
Multimedia- How Internet Workssambhenilesh
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingRozitarmizi Mohammad
 

Andere mochten auch (17)

4byte As Number Migration Suggestion
4byte As Number Migration Suggestion4byte As Number Migration Suggestion
4byte As Number Migration Suggestion
 
4 byte AS number workshop material
4 byte AS number workshop material4 byte AS number workshop material
4 byte AS number workshop material
 
A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7
 
4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios
 
Noisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networksNoisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networks
 
Toward The Semantic Deep Web
Toward The Semantic Deep WebToward The Semantic Deep Web
Toward The Semantic Deep Web
 
Web 101 by Jennifer Lill
Web 101 by Jennifer LillWeb 101 by Jennifer Lill
Web 101 by Jennifer Lill
 
How internet works and how messages are transferred in Internet
How internet works and how messages are transferred in InternetHow internet works and how messages are transferred in Internet
How internet works and how messages are transferred in Internet
 
20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV
 
Rawnet Lightning Talk - Anyone Can Draw.
Rawnet Lightning Talk - Anyone Can Draw.Rawnet Lightning Talk - Anyone Can Draw.
Rawnet Lightning Talk - Anyone Can Draw.
 
CDN and ISP Operation
CDN and ISP OperationCDN and ISP Operation
CDN and ISP Operation
 
Network Design in Cloud-ready IDC
Network Design in Cloud-ready IDCNetwork Design in Cloud-ready IDC
Network Design in Cloud-ready IDC
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
Redundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpointRedundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpoint
 
Rawnet Lightning talk - 'Thinking, Fast and Slow' review
Rawnet Lightning talk - 'Thinking, Fast and Slow' reviewRawnet Lightning talk - 'Thinking, Fast and Slow' review
Rawnet Lightning talk - 'Thinking, Fast and Slow' review
 
Multimedia- How Internet Works
Multimedia- How Internet WorksMultimedia- How Internet Works
Multimedia- How Internet Works
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 

Ähnlich wie Botnets & DDoS Introduction

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeAPNIC
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introductionswang2010
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AlivePositive Hack Days
 
Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques SafiUllah Saikat
 
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...Eric Vanderburg
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay aliveqqlan
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveDefconRussia
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikPositive Hack Days
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC SecurityAlex Hunte
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTCQuobis
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...OWASP Delhi
 
Virtualization Monitoring Webinar
Virtualization Monitoring WebinarVirtualization Monitoring Webinar
Virtualization Monitoring Webinarkrkingsley
 
Distributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationDistributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationPavel Odintsov
 
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"Quobis
 
WebRTC Security Concerns, a real problem?
WebRTC Security Concerns, a real problem?WebRTC Security Concerns, a real problem?
WebRTC Security Concerns, a real problem?VOIP2DAY
 
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Julia Yu-Chin Cheng
 
Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Infradata
 
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEric Vanderburg
 
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannotapidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannotapidays
 

Ähnlich wie Botnets & DDoS Introduction (20)

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay Alive
 
Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques
 
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay alive
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTC
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
 
Virtualization Monitoring Webinar
Virtualization Monitoring WebinarVirtualization Monitoring Webinar
Virtualization Monitoring Webinar
 
Distributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationDistributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And Mitigation
 
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
 
WebRTC Security Concerns, a real problem?
WebRTC Security Concerns, a real problem?WebRTC Security Concerns, a real problem?
WebRTC Security Concerns, a real problem?
 
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
 
Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)
 
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
 
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannotapidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
 

Mehr von Kae Hsu

FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionKae Hsu
 
TWNIC 13th OPM session
TWNIC 13th OPM sessionTWNIC 13th OPM session
TWNIC 13th OPM sessionKae Hsu
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingKae Hsu
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingKae Hsu
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingKae Hsu
 

Mehr von Kae Hsu (6)

FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP Introduction
 
TWNIC 13th OPM session
TWNIC 13th OPM sessionTWNIC 13th OPM session
TWNIC 13th OPM session
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharing
 
r2
r2r2
r2
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharing
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharing
 

Kürzlich hochgeladen

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Kürzlich hochgeladen (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Botnets & DDoS Introduction

  • 1. 9th TWNIC IP Open Policy Meeting 2007/12/5, Taipei Botnets & DDoS Introduction Kae Hsu (IS-TW)
  • 2. Agenda • Bot • Botnet and the mechanisms used in • Botnets activities and economics • Harms from Botnets • DDoS mitigation • Botnets detection and defense • Reference 2007/12/5 2 Copyright 2007 - Trend Micro Inc.
  • 3. Bot • Brief history of Bot (summarized from “Botnets, THE KILLER WEB APP”) – GM (1989) • A robot user in an IRC channel. – PrettyPark (1999) • A Bot client on Windows95/98. • Malicious IRC Bots. – SubSeven Trojan/Bot • Create backdoor in the system. • SubSeven server could control SubSeven clients via IRC server. – GT Bot (2000) • Based on the mIRC client – could trigger mIRC client to run scripts from IRC server. – support raw TCP and UDP socket connections. – SDBot (2002) • Written in C++ and the author released the source code. • Exploits and infects. 2007/12/5 3 Copyright 2007 - Trend Micro Inc.
  • 4. Bot • History brief (cont.) – Agobot (2002) • Modular design. • Using P2P file-sharing applications to spread. Characteristic-Based Families – Spybot (2003) • Open source Trojan and deviate from SDBot. – RBot (2003) • Most detections in Windows platform, with 1.9 million PCs. (2005) – Polybot (2004) • Derived from the AgoBot. – Mytob (2005) • Hybrid from MyDoom and bot IRC C&C functionality. 2007/12/5 4 Copyright 2007 - Trend Micro Inc.
  • 5. Botnet and the mechanisms used in • Botnet – Some Bots controlled by a single one/organization (botherder) and execute the commands from the botherder. • Botnet Life Cycle 1. Exploit. 2. Report to the botherder (via C&C channel). 3. Retrieve the anti-antivirus module. 4. Rally and secure the Bot client. 5. Listen to the C&C channel and receive command. 6. Retrieve the payload module. 7. Execute the command. 8. Report result to the C&C channel. 9. Back to step 5. 10. Erase all evidence and abandon the Bot client. 2007/12/5 5 Copyright 2007 - Trend Micro Inc.
  • 6. Botnet and the mechanisms used in • C&C: Command and Control – Botherder use C&C to collect Bot client information and delivery the commands to Bot clients. – IRC server is the most early and widely used C&C • Interactive. • Easy to build a IRC server. • Easy to create and control several Botnets using one server. • Easy to create redundancy. – Web-based C&C servers. – P2P Botnets. – Random. – IM C&C. – Remote Administration. – Drop Zone and FTP-based C&C. 2007/12/5 6 Copyright 2007 - Trend Micro Inc.
  • 7. Botnets activities and economics • Exploit new Bot client • DDoS attack – DDoS ransom - $$$ • Software installation – adware - $$$ – clicks4hire - $$$ • Spam and phishing - $$$ • Storage and distribution of stolen or illegal data • Ransomware - $$$ • Data mining - $$$ • Reporting results • Erase the evidence, abandon the client 2007/12/5 7 Copyright 2007 - Trend Micro Inc.
  • 8. Harms from Botnets • Spam – Botherder control Bot clients to email spam. • DDoS – Distributed Denial of Service – Flooding lots of anomaly traffic or launch lots of service request to the DDoS target • The service is blocked on victim cause of resource exhausted. – bandwidth resource – system resource – DDoS is hard to prevent • It is hard to classify normal or abnormal traffic. – Anomaly TCP/UDP/ICMP flooding is easy to detect. – Anomaly service access request is hard to detect. • ISP uplink congestion will impact other customer – Traffic scrubbing is helpless to uplink congestion. 2007/12/5 8 Copyright 2007 - Trend Micro Inc.
  • 9. Harms from Botnets • Botnets: the source of DDoS – In a Botnet, zombie PCs would be used to generate the attack traffic to the victims. – If a Botnet have >100,000 zombie PCs, each PC generate 50kbps attack traffic to the victim; The total attack traffic could reach more than 5Gbps!!! • 5Gbps traffic could congest lots of links of enterprise and ISP. – If a Botnet have >100,000 zombie PCs, each PC generate 1kpps attack traffic to the victim; The total attack traffic could reach more than 100Mpps!!! • 100Mpps traffic could shutdown lots of equipments of enterprise and ISP. – Most ISPs use “black-hole” mechanism to drop the attack traffic, but it will drop normal traffic flow to victim too • ISPs help the cyber-criminal complete the attack. 2007/12/5 9 Copyright 2007 - Trend Micro Inc.
  • 10. Harms from Botnets • Scale of Botnet: – Telenor takes down 'massive' botnet – more than 10,000 zombie PC • http://www.theregister.co.uk/2004/09/09/telenor_botnet_dismantled/ – Dutch Botnet suspects ran 1.5 million machines • http://www.techweb.com/wire/security/172303160 – Of the 600 million computers currently on the internet, between 100 and 150 million were already part of these botnet… – http://news.bbc.co.uk/1/hi/business/6298641.stm • Strength of Botnet: – Estonian government websites were shutdown cause serious DDoS attack from Apr. 27, 2007 • At its peak on May 9, the attack shut down up to 58 sites at once. • Computers from the United States, Canada, Brazil, Vietnam and others have been used in the attacks. 2007/12/5 10 Copyright 2007 - Trend Micro Inc.
  • 11. Harms from Botnets • DDoS example – ISPs Bot client BOTNETS attack traffic VICTIMS link congestion 2007/12/5 11 Copyright 2007 - Trend Micro Inc.
  • 12. Harms from Botnets – All of the packets forward to victim were dropped. BOTNETS attack traffic VICTIMS 2007/12/5 12 Copyright 2007 - Trend Micro Inc.
  • 13. DDoS mitigation • Scrub the traffic, accept and forward the normal packets and drop the abnormal packets – Build the traffic scrubbing system in your netowrk • Congestion still would be happened on ISP border router. VICTIMS link congestion – Order scrubbing service from upstream ISP or scrubbing service provider. scrubbing service provider VICTIMS link congestion 2007/12/5 13 Copyright 2007 - Trend Micro Inc.
  • 14. Botnets detection and defense • Internet projects to detect Bot/Botnets – Darknet • A subnet that no any machine host in. • There should not be any normal traffic flow to this subnet – Anomaly traffic flow sent by malware almost. • It is possible to trace the compromised machine by analyzing those anomaly traffic. enable promiscuous mode Bot client Internet .4 analyze exploit traffic and catch Bot client IP .1 .3 R(config)#ip route 172.17.12.128 255.255.255.128 172.17.12.4 .2 172.17.12.0/24 2007/12/5 14 Copyright 2007 - Trend Micro Inc.
  • 15. Botnets detection and defense • Internet projects to detect Bot/Botnets – Honeypots • A machine that exploit by malware on purpose. – Botnets life cycle: » 2) Report to the botherder (via C&C channel). » 5) Listen to the C&C channel and receive command. » 6) Retrieve the payload module. » 8) Report result to the C&C channel. – To sniff and analyze the connections of Bot, we could catch: » the IP address of C&C » the IP address of victims C&C 172.31.1.1 Internet .4 catch the C&C IP: 172.31.1.1 .1 .3 port mirror honeypot .2 2007/12/5 15 Copyright 2007 - Trend Micro Inc.
  • 16. Botnets detection and defense – Honeypot (cont.) • In theories, off-line the C&C would destroy the whole Botnet – It is the vulnerability of centralized C&C. C&C Internet .4 .1 .3 port mirror honeypot .2 R(config)#ip route 172.31.1.1 255.255.255.255 null0 • Use black-hole to block the C&C IP on the Internet – But botherder would not structure their Botnet by only one C&C » Use DNS to improvement C&C surviving. 2007/12/5 16 Copyright 2007 - Trend Micro Inc.
  • 17. Botnets detection and defense • BGP flow-spec – A new BGP NLRI • The reason to use BGP: re-use – protocol algorithms. – operational experience. – administrative processes such as inter-provider peering agreements. – Distribute traffic flow specifications and action. • Flow-spec NLRI – Type 1 – destination prefix – Type 2 – source prefix – Type 3 – IP protocol – Type 4 – port – Type 5 – destination port – Type 6 – source port – Type 7 – ICMP type – Type 8 – ICMP core 2007/12/5 17 Copyright 2007 - Trend Micro Inc.
  • 18. Botnets detection and defense • Flow-spec NLRI (cont.) – Type 9 –TCP flags – Type 10 – packet length – Type 11 – DSCP – Type 12 – fragment • Traffic filtering actions – Traffic-rate – Traffic-action » Terminal action » Sample – Redirect – Use BGP flow-spec in your network Bot client D Normal client B Normal client C Server A 2007/12/5 18 Copyright 2007 - Trend Micro Inc.
  • 19. Botnets detection and defense – Use BGP flow-spec in your network • Update BGP flow-spec route to border router – ‘SRC=D, DST=A, action=drop’ Bot client D Normal client B Normal client C Server A • Update BGP flow-spec route to peering partner – ‘SRC=D, DST=A, action=drop’ Bot client D Normal client B Normal client C Server A 2007/12/5 19 Copyright 2007 - Trend Micro Inc.
  • 20. Reference • “Botnets, THE KILLER WEB APP” – by Craig A. Schiller etc.; Syngress Publishing Inc., 2007 • The Team Cymru Darknet Project – http://www.cymru.com/Darknet/index.html • The Honeynet Project – http://www.honeynet.org/index.html • “Dissemination of flow specification rules” – draft-marques-idr-flow-spec-04.txt • “Configuring a flow route” – http://www.juniper.net/techpubs/software/junos/junos85/swconfig85- routing/id-10317421.html#id-10317421 • “Inferring Internet Denial-of-Service Activity” – by David Moore etc. • “The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets” – by Evan Cooke etc. • “How CNCERT/CC fighting to Botnets” – by Mingqi Chen.; CNCERT/CC 2007/12/5 20 Copyright 2007 - Trend Micro Inc.
  • 21. Thank You Classification 2007/12/6 2007/12/5 21 Copyright 2007 - Trend Micro Inc.