SUMMARY. What is a Botnet?
|
|
|
- Maude Carson
- 5 years ago
- Views:
From this document you will learn the answers to the following questions:
What is one of the tasks that top network providers can do to help manage botnets?
Who has a key position as control points for botnet activity?
What made it easy for security researchers to easily identify and remove the communication path for botnets?
Transcription
1 WHITE PAPER GLOBAL NETWORK SERVICE PROVIDERS: SECURING A POSITION TO CHALLENGE THE BOTNET
2 SUMMARY Network attackers set out to disrupt, damage or takedown infrastructure. Breadth of reach and efficiency are keys to their success. As a result, botnets continue to be a favored attack vehicle, providing rapid control of several thousand or even more than a million devices at one time. While under control, hackers can perform mass identity theft or seek to flood critical communication paths, to the detriment of an organization s effectiveness. Detecting and remediating these botnets has become increasingly challenging, as the attackers find new mechanisms to hide the bots and to make the extent of the botnet invisible. However, Global Network Service Providers, such as Level 3 Communications, comprise a small group of professionals who have both the skills and the data to help combat this threat. In this paper, we provide the evidence that directly supports the fact that Global Network Service Providers are in a position to challenge the botnet. Furthermore, they have an obligation to invest, in order to step up to that challenge. A review of botnets, their evolution and methods of prevention, are also included. What is a Botnet? One of the largest threats to the Internet today is that of botnets. A botnet can be best described as a group of computers with a common control mechanism, often installed as software, which is directed towards a malicious goal. A botnet operator acts like a master and controls the botnet, with each device being a mindless zombie that carries out the master s commands. Botnets have many victims, and most are unaware that they are a part of this malware metropolis. Botnet architecture varies widely, as does the methodology used to carry out attacks, to remain intact or to avoid detection. They have long lives because they often mutate into new variants and attackers constantly evolve the structure of their botnets. Studies of dominant botnets from 2001 to 2011 showed the time from first observation to takedown ranging from seven months to ten years, with an average of a little over three years in existence. It is very hard to know the full size of a botnet because of questionable counting methods and attacker tactics to keep them hidden. For example, The Nugache botnet had a random topology and the attackers limited the number of connections to remote peers to no more than a dozen per day. It would therefore take a week of observation to see a few hundred hosts in the network. Estimates for the botnets studied from 2001 to 2011 ranged from roughly 6,600 nodes within the Waledec botnet to two million nodes for the Pushdo botnet. One would not want to become a victim of a botnet. Malware delivered to the victim s device can modify the Windows registry, create new files on the device or open network sockets that enable additional damage. Screenshots from applications being used can be made visible to the botnet operator. Personal information can also be sent to the botnet master. Victims are normally innocent and they often do not know that their computer is infected until real trouble begins. They are lured into action and become infected by clicking on a website ad, clicking on a malicious link in one of their s, accessing an external device or downloading a new application from a site that appears to be trusted. Countermeasures can often create even more victims. With the Mariposa botnet, which operated from May to December 2009 and infected millions of hosts, a working group was established to counter the botnet. When the attackers noticed that they were being wrestled with, they retaliated with a Distributed Denial of Service (DDoS) attack and directed 900 Mbps of traffic at the members of the working group. Innocent victims who were sharing networks with these working group members had their network service disrupted for hours. To appreciate today s new challenges around botnets, it is important to understand their evolution, which is summarized within the following section.
3 Botnet Evolution The first botnets were established to exploit the security flaws within networks in a very distributed manner. As an example, the Morris Worm became a household word in network circles in the late 1980s. By infecting hundreds of computers in universities across the United States, the attack was large enough to have an impact. In the earlier era of technology, Internet Relay Chat (IRC) was the common communication vehicle for computer criminals, and it was only natural that the botnet s communication channel was implemented using this highly resilient infrastructure. With a wide variety of open source implementations, this was a very easy way to enable bots to listen for commands, as well as to report back their status. Unfortunately for the attackers, IRC s well-defined implementation and well-known network of chat servers, made it very easy for security researchers to eventually identify and remove the communication path for these botnets. After there was no longer a way for the botnets to communicate, the victim machines could not participate in any malicious activity and ultimately they were no longer a botnet. Instead of taking the opportunity to find more protected methods of communication, most botnet creators found it simple enough to start their own IRC server networks to avoid detection and removal. This minor step of doing just enough to stay ahead, rather than holistically solving their problem, has been a common theme for botnet developers and operators over time. Staying one step ahead did not last long however, as these chat servers were often hard-configured into the botnet software. This meant that any security researcher who got access to the botnet software had the configured IP address, and could easily have the server removed. Also, because these botnets relied on a centralized Command and Control (C2) server, there was a central point of failure for the botnet. Not surprisingly, botnets continued to evolve and attackers invented other techniques to counter the efforts of security researchers. Security researchers again had to build new mechanisms to combat the threats. There became a need to find the botnet software live on an infected computer, so as to acquire more knowledge about the botnet. However, this had scalability complications because the technology did not exist to get this information across a widely dispersed botnet. The popular solution to this problem became the honeypot. A honeypot is a system configured to look like an easy victim for infection, but is actually bait, controlled by a security researcher. The security professional obtains quite a bit of knowledge when the honeypot is compromised, including the ability to obtain copies of malware and botnet software. By distributing honeypots around the Internet, the security community is able to have a higher likelihood of getting their hands on the software they are looking for. As in all security efforts, limitations exist with this technique. There is no guarantee that the honeypot will be infected within a reasonable time, or even at all. If the motivation of the attacker is not known, the honeypot may not be in the right place at the right time. Today s botnets are sometimes deployed with very specific targets. For example, a botnet may be developed and deployed to extract intellectual property from a specific company or industry. Attackers research which companies fit the sector profile, and target those employees and servers to plant the botnet software. If a researcher does not have a honeypot in one of these specific organizations, the security community may never see this botnet software or the botnet in its entirety. This is a frightening reality that demands new techniques for botnet detection.
4 Over the last decade, attackers have advanced their botnet implementations with end-to-end encryption and proprietary signaling protocols. Each of these types of implementations helps to hide the botnet s behavior from detection, which is referred to as obfuscation in the security community. Yet no approach has been as game changing as the Peer-to-Peer (P2P) capability. P2P communication, rather than centralized communication, has rendered the legacy techniques of botnet detection ineffective. P2P botnets enable every peer to act as a C2 server. Each peer bot can download the commands, configuration files and executables from other bots. Every compromised computer is capable of providing data to the other bots. The peers are setup to find each other within the botnet. There is a fundamental problem with combatting such botnets because the population of hosts is heterogeneous and they were never meant to behave like a cooperative network. Zeus, Kelihos and Alureon/TLD4 are examples of P2P botnets that can survive indefinitely, because they are extremely difficult to unravel. This has resulted in the need for researchers to focus much more on node enumeration, versus simply finding the C2 servers. Collecting IP addresses and additional information about the location of the individual hosts has become a requirement in botnet detection and remediation. In addition, botnets spread at an aggressive rate, which makes this task even more complex. It is common to see new victims joining the botnet at the average rate of over one million per month, ranging from a low of 600,000 to a high of over two million. The average security researcher does not have access to either host information or communication traffic that would enable proper node information to be collected. This indicates the need for more advanced detection methodologies and access to credible data. The researcher who does have these capabilities and access is able to be proactive about botnet activity and provides a unique value. A Global Network Service Provider like Level 3 is able to provide such value, because it holds the keys to network entry and visibility. Advantages of Working with a Global Network Service Provider Global Network Service Providers are strategically positioned to deal with the challenges of botnet threats, because the technology and resources to do the proper network filtering resides within their infrastructure. The required filtering comes from high-performance routers, at the most basic level, and through the advanced blocking inherent in deep packet inspection and analysis. This filtering is made available by way of advanced traffic shaping technology. Broadly stated, Global Network Service Providers can take advantage of information asymmetry and economies of scale to provide more security at a lower cost. A global provider of Internet services can truly impact the methodology of botnet research. In a 2010 study, The Role of Internet Service Providers in Botnet Mitigation, An Empirical Analysis based on Spam Data, it was discovered that the Service Providers included in the study had a key position as control points for botnet activity. Data on Service Providers who collectively possessed the bulk of the market share in 40 countries was analyzed. (30 of those countries are members of the Organization for Economic Co-operation and Development). This resulted in data on 200 ISPs. Using a global dataset of 63 billion spam messages and incoming SMTP connections from 138 million unique IP addresses during the period , it was found that just 10 of the 200 Service Providers accounted for about 30 percent of all unique IP addresses sending spam worldwide. In addition, just 50 Service Providers accounted for over half of all IP addresses sending spam worldwide. The graph below summarizes these findings.
5 Percent of Spam Sources located across top Service Providers Percent of global total 80% 70% 60% 50% 40% 30% 20% 10% 0% Top 10 Top 50 Top 100 Top 150 Top 200 Service Provider Category by Market Share An even more relevant and specific pattern was uncovered. Just 50 Service Providers consistently were found to be directly connected to more than half of the infected sources. These studies are supported by Cisco s Web Security Report of 2013, where a 30 percent decline was seen in unique malware hosts and IP address from January 2013 to September This suggests that malware is being concentrated in fewer hosts and fewer IP addresses across fewer Service Providers. To further substantiate the Service Provider s role in botnet mitigation, we can look at a report issued in January 2011 titled Internet Service Providers and Botnet Mitigation: A Fact-Finding Study on the Dutch Market. Results are based on a study done in the Netherlands between January 2009 and June The study set out to prove whether Service Providers can serve as a natural control point for botnet activity, based on the Dutch market. It also compared the findings within the Netherlands to that of other countries. In the Netherlands, over 60% of all infected machines were connected to the network of the three largest Dutch Service Providers. On average, across 40 countries, 80% of infected sources were connected to networks administrated by well-known Service Providers. The results of these reports are significant, because they indicate that Service Providers can be very effective enablers of botnet management, when compared to the hundreds of millions of end user machines and actors that are spread over hundreds of countries. The data from these studies indicate that the task of detecting and managing botnets can be funneled through top network providers, thereby achieving a greater chance of success in the control and eventual remediation of the botnets. These same studies suggest that more responsibility around botnet mitigation should be placed on the top Service Providers. This could be done through collective action, self-regulation or government intervention. Interestingly enough, in March 2012,
6 2013 Unique Malware Hosts and IP Addresses 60,000 50,000 40,000 30,000 20,000 Unique Host Unique IP 10,000 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Month the U.S. Communications Security, Reliability and Interoperability Council (CSRIC) tasked a working group to develop a set of voluntary practices where network broadband providers could help mitigate botnets. This Botnet Remediation working group did accomplish the task with a U.S. Anti-Bot Code of Conduct for ISPs, otherwise known as the ABCs for ISPs. Through an opt-in code of conduct, Service Providers are encouraged to take a leading role in combating the largest threats facing the Internet today. The Code of Conduct encourages network providers to, amongst other actions, detect bots operating within their own networks and to develop best practices for reducing bot infections. Outside of the U.S., there are public-private partnerships in countries such as Australia, The Netherlands, Germany and Japan that aim for similar goals. Gunter Ollmann (CTO, IOActive Inc) in the TMCnet article Detecting Botnets in Service Provider Networks: The Impact of CSRIC s U.S. Anti-Bot Code of Conduct on September 6, 2012, stated his view that the most impactful detection mechanisms lie within each Service Provider s own network and their willingness to take on this task. He believes that providers can measure the size of botnets and the rate they are growing or shrinking, so as to tune remediation advice to the victims. Further work is needed to strengthen the network providers incentives to mitigate botnets. Level 3 Communications has already established our role in this effort and has been able to detect botnet infections in the millions across a variety of botnets. Our study of C2 and P2P oriented botnets has proven to be powerful and credible in the remediation of industry-impacting botnets across the world. We are currently tracking a number of threats based on activity seen across IPs, ASNs and C2s in countries and cities globally, while also analyzing the traffic patterns across various measurements of time. By using advanced data feeds and analysis, Level 3 is able to improve our intelligence without having to install intrusive and controversial monitoring technologies in our network. Furthermore, we are able to provide better oversight for our customers with regard to their security posture, as well as mitigation guidance. The data Level 3 has access to comes from operation of one the world s largest IP networks, one of the worlds largest Content Delivery Networks (CDN) and one of the largest global open Domain Name Systems (DNS). In any month we see packets flowing to or from about 70% of every allocated IP address in the world.
7 Value of Level 3 s Approach While the ultimate goal of most botnet research is to take down the nodes, there are other objectives that the Security Operations Center at Level 3 is targeting. The learnings realized within the botnet battle provide a wealth of information about the C2 servers, along with the names and the locations that have been engulfed within the botnet. Leveraging our consulting services with customers and working with partners, Level 3 can obtain even more insight about the infected nodes, such as the operating system versions or the applications that attackers are targeting. Through more in-depth analysis, the software used or samples of the malware can also be discovered. This type of information is very difficult to come by and it requires a large investment in the analysis of host and network data from real intrusion events. Just as this information is important to the typical hacker in reconnaissance, those who are trying to learn more about the hackers and their intent can also use it. Level 3 is able to dissect and reverse-engineer the software used within the malware in order to determine the type of information being collected from the victim s machines. There are a small and very limited number of providers who have the skills and data at their fingertips to work at this level of sophistication. The value of this information cannot be overlooked since the Internet is starting to become one large botnet, in some respects. If a researcher is able to get control of a botnet by exploiting vulnerabilities within it, this provides an edge over the attacker that is unique in many ways. Rather than fighting the botnets, they can use the botnet to gather more intelligence about the attacker or the approach. The victim s information is useful when mapping the botnet and in learning about the communication tactics being used. Protecting Against Botnets The most effective methodology for enterprises to protect against botnets is to patch software, provide user education and monitor the network perimeter. By keeping software on all devices up to date, the simplest point of entry for attackers is removed. Patching software keeps a machine clean, not mean. The latest security software, browsers and operating systems must be maintained, and automatic updates are the safest policy to use. Also, viruses and malware can infect USBs and other external devices. Current security software should be used to scan these before they are accessed. User education is critical because users can execute the malware directly by accessing corrupted external devices, sharing their credentials or not protecting them appropriately, clicking on malicious links within s or websites and downloading applications from non-trusted sites. A policy of When in doubt, throw it out with regard to social media, s, website clicks and questionable external devices should be clear to all users. In addition, all devices that connect to the Internet need to have the same scrutiny, including computers, smartphones, gaming systems and those millions of sensors that are becoming collectively know as the Internet of Things. Vigilant monitoring by the security team can help protect against impacts from unknown vulnerabilities. Watching for irregular behavior at the network perimeter is a way to understand when hosts are communicating with external systems in a non-typical manner. Exfiltration of data, spamming, or DDoS attacks are all behaviors of a victim host participating in a botnet and each have a unique signature within the network. Monitoring this type of behavior requires extreme diligence. Finding and retaining skilled personnel to perform the investigations is difficult. Fortunately, the Global Network Service Provider is in the lead regarding this expertise and the ability to act. Level 3 is a Global Network Service Provider. Our Security Operations Centers track over one million potentially malicious packets per day and close to two million infected machines with in-house Threat
8 Intelligence Systems. We are able to investigate more than 10,000 sources of attacks per day, giving us the information to recommend takedown requests to our customers. As a direct compliment, we also offer Managed Security Services that specifically address the origins of attacks such as Managed Firewall, Secure Access, DDoS Service, and Web Protection Services and Consulting. Through our diverse security offerings and our network expertise, we control network threats before they impact customer operations. Conclusion In this paper, we reviewed the definition of a botnet and botnet evolution to the current time. Attackers are extremely persistent and they continue to design new technologies to obfuscate their botnets and make them harder to mitigate. This has placed new demands on security researchers, who now need more information about the individual hosts of the botnet. As several studies have shown, large global Service Providers are uniquely positioned to obtain this information. In addition, these providers normally have the necessary staff to successfully detect and mitigate these prevalent threats. Level 3 Communications, as a Global Network Service Provider, excels in these capabilities, with access to huge volumes of flow and connection data that is associated with the world s Internet traffic and multiple Security Operation Centers. These Centers are equipped with security experts who monitor the network around the clock with sophisticated Threat Intelligence Systems. The breadth and depth of these resources, along with our Managed Security Services offerings, secures our position to challenge the botnet one of the largest threats to the Internet in existence today. 1. OECD (2012), Proactive Policy Measures by Internet Service Providers against Botnets, OECD Digital Economy Papers, No. 199, OECD Publishing The Role of Internet Service Providers in Botnet Mitigation An Empirical Analysis Based on Spam Data1 Michel van Eetena), Johannes M. Bauerb), Hadi Asgharia), Shirin Tabatabaiea), Dave Randc) a) Delft University of Technology, the Netherlands, [email protected] b) Michigan State University, USA, [email protected] c) Trend Micro Incorporated, USA, trendmicro. com 3. So You Want to Take Over a Botnet David Dittrich Date unknown 4. Cisco 2014 Annual Security Report 5.Internet Service Providers and Botnet Mitigation: A Fact Finding Study on the Dutch Market January 2011 Michel JG van Eeten, Hadi Asghari, Johannes M Bauer, Shirin Tabattabaie 6. US Anti-Bot Code of Conduct (ABCs) for Internet Service Providers (ISPs) March Communications, Security, Reliability, and Interoperability Council (CSRIC) 7. Proactive Botnet Counter Measures An Offensive Approach Felix LEDER, Tillman WERNER, Peter MARTINI Date Unknown 8.Detecting Botnets in Service Provider Networks: The Impact of CSRIC s U.S. Anti-Bot Code of Conduct By TMCnet Special Guest Gunter Ollmann September 06, detecting-botnets-service-provider-networks-impact-csrics-us. htm
9 ABOUT LEVEL 3 We build, operate and take end-to-end responsibility for the network solutions that connect you to the world. We put customers first and take ownership of reliability and security across our broad portfolio LEVEL3 [email protected] level3.com Level 3 Communications, LLC. All Rights Reserved. Level 3, Level 3 Communications, the Level 3 Communications Logo, and Connecting and Protecting the Networked World are either registered service marks or service marks of Level 3 Communications, LLC and/or one of its Affiliates in the United States and/or other countries. Level 3 services are provided by wholly owned subsidiaries of Level 3 Communications, Inc. Any other service names, product names, company names or logos included herein are the trademarks or service marks of their respective owners.
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
IBM Security Intrusion Prevention Solutions
IBM Security Intrusion Prevention Solutions Sarah Cucuz [email protected] IBM Software Solution Brief IBM Security intrusion prevention solutions In-depth protection for networks, servers, endpoints
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
Symantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics.
Symantec enterprise security Symantec Internet Security Threat Report April 00 Regional Data Sheet Latin America An important note about these statistics The statistics discussed in this document are based
The Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Cloud Based Secure Web Gateway
Cloud Based Secure Web Gateway DR160203 March 2016 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Product Tested... 4 Test Focus... 4 How We Did It... 5 Test Bed Setup... 5 Test
Why a Network-based Security Solution is Better than Using Point Solutions Architectures
Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team The Internet is in the midst of a global network pandemic. Millions of computers
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network
Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: [email protected] The Reverse Firewall: Defeating
White Paper. Five Steps to Firewall Planning and Design
Five Steps to Firewall Planning and Design 1 Table of Contents Executive Summary... 3 Introduction... 3 Firewall Planning and Design Processes... 3 Step 1. Identify Security Requirements for Your Organization...
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
Using big data analytics to identify malicious content: a case study on spam emails
Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst [email protected] http://cybercrime.anu.edu.au 2 Outline Background Cybercrime
Open Source Software for Cyber Operations:
W H I T E P A P E R Open Source Software for Cyber Operations: Delivering Network Security, Flexibility and Interoperability Introduction For the last decade, the use of open source software (OSS) in corporate
Cisco & Big Data Security
Cisco & Big Data Security 巨 量 資 料 的 傳 輸 保 護 Joey Kuo Borderless Networks Manager [email protected] The any-to-any world and the Internet of Everything is an evolution in connectivity and collaboration that
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
Glasnost or Tyranny? You Can Have Secure and Open Networks!
AT&T is a proud sponsor of StaySafe Online Glasnost or Tyranny? You Can Have Secure and Open Networks! Steven Hurst CISSP Director - AT&T Security Services and Technology AT&T Chief Security Office 2009
POLIWALL: AHEAD OF THE FIREWALL
POLIWALL: AHEAD OF THE FIREWALL FIREWALL HISTORY Since the earliest days of the Internet, when hackers sat in their darkened basements dialing into networks with dial-up modems, both network threats and
POLIWALL: AHEAD OF THE FIREWALL
POLIWALL: AHEAD OF THE FIREWALL FIREWALL HISTORY Since the earliest days of the Internet, when hackers sat in their darkened basements dialing into networks with dial-up modems, both network threats and
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
Data Center security trends
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
How To Protect Yourself From A Dos/Ddos Attack
RELEVANT. INTELLIGENT. SECURITY White Paper In Denial?...Follow Seven Steps for Better DoS and DDoS Protection www.solutionary.com (866) 333-2133 In Denial?...Follow Seven Steps for Better DoS and DDoS
WHITE PAPER. Managed Security. Five Reasons to Adopt a Managed Security Service
WHITE PAPER Managed Security Five Reasons to Adopt a Managed Security Service Introduction Cyber security presents many organizations with a painful dilemma. On the one hand, they re increasingly vulnerable
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Achieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01
How to build and use a Honeypot By Ralph Edward Sutton, Jr DTEC 6873 Section 01 Abstract Everybody has gotten hacked one way or another when dealing with computers. When I ran across the idea of a honeypot
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Zscaler Cloud Web Gateway Test
Zscaler Cloud Web Gateway Test A test commissioned by Zscaler, Inc. and performed by AV-TEST GmbH. Date of the report: April15 th, 2016 Executive Summary In March 2016, AV-TEST performed a review of the
KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection
KASPERSKY DDoS PROTECTION Protecting your business against financial and reputational losses A Distributed Denial of Service (DDoS) attack is one of the most popular weapons in the cybercriminals arsenal.
Netsweeper Whitepaper
Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826-5222 F: +1 (519) 826-5228 Netsweeper Whitepaper The Evolution of Web Security June 2010
WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform
WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9
Managed Security Services
Managed Security Services 1 Table of Contents Possible Security Threats 3 ZSL s Security Services Model 4 Managed Security 4 Monitored Security 5 Self- Service Security 5 Professional Services 5 ZSL s
Threat and Vulnerability Management Plan
WHITE PAPER: ENTERPRISE SECURITY Threat and Vulnerability Management Plan Volker Rath Technical Lead, Consulting Services, EMEA Symantec Security Services December 2006 White Paper: Enterprise Security
White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.
TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
Countermeasures against Bots
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
Managing Security Risks in Modern IT Networks
Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
McAfee Total Protection Reduce the Complexity of Managing Security
McAfee Total Protection Reduce the Complexity of Managing Security Computer security has changed dramatically since the first computer virus emerged 25 years ago. It s now far more complex and time-consuming.
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.
SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,
Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model
White Paper Addressing the Full Attack Continuum: Before, During, and After an Attack It s Time for a New Security Model Today s threat landscape is nothing like that of just 10 years ago. Simple attacks
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?
A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed
Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.
Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
Achieve Deeper Network Security and Application Control
Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
TLP WHITE. Denial of service attacks: what you need to know
Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL
BOTNETS Douwe Leguit, Manager Knowledge Center GOVCERT.NL Agenda Bots: what is it What is its habitat How does it spread What are its habits Dutch cases Ongoing developments Visibility of malware vs malicious
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
CYBERSECURITY INESTIGATION AND ANALYSIS
CYBERSECURITY INESTIGATION AND ANALYSIS The New Crime of the Digital Age The Internet is not just the hotspot of all things digital and technical. Because of the conveniences of the Internet and its accessibility,
When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper
When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level
Cisco Security Intelligence Operations
Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks
TLP: GREEN Issue Date: 1.12.16 Threat Advisory: Continuous Uptick in SEO Attacks Risk Factor High The Akamai Threat Research Team has identified a highly sophisticated Search Engine Optimization (SEO)
White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks
White Paper Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks White Paper Executive Summary Around the world, organizations are investing massive amounts of their budgets
