1 / 10

Botnets

Daniul Byrd. Botnets. What are bots?. Software that automates tasks Can network to share data and act in coordination. Deployment. “Drive-by-Downloads” Social Engineering Spread through network. Structure. Bots answer to Botmaster Centralized Structure Decentralized Structure. Uses.

overton
Download Presentation

Botnets

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Daniul Byrd Botnets

  2. What are bots? • Software that automates tasks • Can network to share data and act in coordination

  3. Deployment • “Drive-by-Downloads” • Social Engineering • Spread through network

  4. Structure • Bots answer to Botmaster • Centralized Structure • Decentralized Structure

  5. Uses • Spam email • Distributed Denial of Service attacks (DDoS) • Harvesting information • Keyloggers • Email Addresses • Passwords • Click Fraud • Selling or Leasing their services

  6. Detection • Can be difficult • Slow/non-responsive system or crashes • Monitor network traffic • Some will try to defend themselves

  7. Prevention • Similar to avoiding other types of malware • Avoid unknown emails or attachments • Avoid questionable sites • Be aware of social engineering tactics There are bots for non-Windows platforms too!

  8. Legality & Ethics • CAN-SPAM Act (2003) • False header information • Inclusion of sender’s valid physical address • Use of other’s computers without permission • Harvesting email addresses • More… • Theft • Financial information, ID Theft • Passwords

  9. How It Relates • Awareness of malicious botnets can aid in avoiding them • Coworkers… • Botnets can be a powerful tool when used legally

  10. References • “Botnet Sharing and Linking”. Eggheads.org. Web. Apr. 2014. <http://cvs.eggheads.org/viewvc/eggdrop1.6/doc/BOTNET?view=markup> • “About BotHunter”. BotHunter.net. Web. Apr. 2014 <http://www.bothunter.net/about.html> • Mashevsky, Yuri. “The Bagle botnet”. SecureList. Web. Apr. 2014. <http://www.securelist.com/en/analysis/162656090/The_Bagle_botnet> • Namestnikov, Yury. “The Economics of Botnets”. SecureList. Web. Apr. 2014. <http://www.securelist.com/en/analysis/204792068/The_economics_of_Botnets> • “Spam Laws: The United States CAN-SPAM Act”. SpamLaws. Web. Apr. 2014. <http://www.spamlaws.com/spam-laws.html> • Liao, Qi, and Zhen Li. “Portfolio Optimization of Computer and Mobile Botnets”. International Journal of Information Security 13.1 (2014): 1-14. Academic Search Complete. Web. Apr. 2014 • RODRÍGUEZ-GÓMEZ, RAFAEL A., GABRIEL MACIÁ -FERNÁNDEZ, and PEDRO GARCíA- TEODORO. "Survey And Taxonomy Of Botnet Research Through Life-Cycle." ACM Computing Surveys 45.4 (2013): 45-45:33. Academic Search Complete. Web. Apr. 2014 • Davis, Lidja. “Is Your PC Part of a Botnet?”. Readwrite.com. Web. Apr 2014. <http://readwrite.com/2009/03/15/is_your_pc_part_of_a_botnet#awesm=~oCMKDXyIwi4FRc>

More Related