Botnet with Browser Extensions
|
|
|
- Hugh Ryan
- 10 years ago
- Views:
Transcription
1 Botnet with Browser Extensions Lei Liu 1, Xinwen Zhang 2, and Songqing Chen 1, 1 George Mason University 2 Huawei Research Center Fairfax, VA Santa Clara, CA {lliu3, sqchen}@cs.gmu.edu [email protected] Abstract Botnets are responsible for many large scale organized Internet attacks today. Along with the fight between botnet developers and defenders, the battle field has significantly evolved from traditional centralized IRC to various new approaches, aiming to make bots and command and control channel more and more stealthy. In this work, through prototype implementations, we demonstrate that browser extension is a very effective botnet vehicle with very large installation base and the capability of accessing rich sensitive user data in the browser. The automatic update mechanism of browser extensions further offers a stealthy command and control channel between bots and a botmaster. Compared to many others, extension-based bots are more stealthy and harder to defeat since all mainstream browser architectures provide rich APIs for browser extensions to enrich users browsing experience with insufficient consideration of malicious extensions. Via both an IE add-on and a Chrome extension, we show that attacks like spamming, DDoS, and password sniffing are trivially feasible. Our study shows that an effective scheme is imperatively demanded to mitigate such threats. I. INTRODUCTION Botnets are one of the biggest threats to Internet security today. They are responsible for a majority of large scale organized Internet attacks, such as DDoS and spamming, credit card number and password harvesting [3]. Typically, a botnet consists of three key elements: a botmaster or botmasters, hundreds to thousands of bots (compromised computers), and a command and control channel via which the botmaster controls the bots. Therefore, the battle between botnet operators and defenders focuses on these aspects: a botmaster tries its best to hide itself from being identified by using stealthy command and control channels, and a bot tries to hide from being detected by host-side anti-malware systems and obtain as many privileges as possible. In early days, a botmaster often communicates with controlled bots through a centralized IRC server. This enables a botmaster to hide its communication with bots in normal users legitimate traffic. Therefore, it is natural to monitor TCP port 6667 which is for IRC traffic [24] in order to detect command and control information. Other solutions include building IRC server scanners to detect potential botnets by identifying nonhuman behavior characteristics in traffic [26], [27]. Driven by profit, botnet developers are constantly exploring new mechanisms for command and control channels and developing more stealthy bots that can easily infect large scale hosts. For example, with the scrutiny of the IRC channels, bots have been found to bind to other commonly used applications, such as a Web browser [5], and to use other protocols, such as HTTP [16]. Random delay can be added to command propagation among bots in order to avoid detection [12]. Since the centralized control through a IRC server could be easily detected and shut down, P2P based botnets have also been developed [18], [22], [28], [31], [29]. For example, Overbot [29] has demonstrated that P2P bots can be built on Kademlia-based P2P networks. In this work, we show another form of bots and command and control channels: browser extensions and their automatic update mechanisms implemented in mainstream browsers. Although the concept of developing or hiding bot in a browser extension has been mentioned recently [23], [30], to our best knowledge, we are the first to implement this botnet model and demonstrate its feasibility under the latest mainstream browser extension architectures. Via implementation, we show that potentially a malware developer can lure a user to install a malicious extension, which, under both Internet Explorer (IE) and Chrome s extension architectures, can easily steal user sensitive online data such as username/password, and send out to external servers. Furthermore, the extension can easily file cross-site HTTP requests to send spam s and launch DDoS attacks. More critically, by leveraging the builtin automatic update mechanism implemented in IE, Mozilla, and Chrome, a bot in the form of a browser extension can easily obtain command and control messages from a botmaster without triggering any anti-virus software. Several advances of browser development have motivated and enabled this new form of botnet. First of all, web browsers nowadays have become a major vehicle for common people to surf the Internet and consume web services, including e- commerce and online banking services. Therefore, plenty of sensitive information becomes the target for bots to harvest. Secondly, there exist a large number of browser extensions and plugins to enrich users browsing experience. For example, they can help browsers process different types of media contents, or automate user actions such as filling forms or remembering password. For this purpose, browsers provide lots of APIs for extension developers to access the core browser resources and web pages, including DOM, cookies, browsing history, bookmark, toolbar, etc. This opens a large attack window for malicious extensions and plugins. Thirdly, through our implementation, we find that although mainstream browsers have some built-in security mechanisms for securing extensions, they are far from sufficient to confine the behavior of malicious extensions. In particular, in IE, browser extensions such as menu extensions, custom toolbars,
2 explorer bars, and Browser Helper Objects (BHOs) share the same process space of the browser and thus can perform any action on the available windows and modules. A BHO even can modify the functionality of the browser by adding binary components. Therefore, it is very difficult to restrict the behavior of a malicious extension in IE without restricting the whole browser process s capability, e.g., running IE in protected mode [2]. Chrome adopts a multi-process architecture in which extensions run in separated processes from the main browser process. Chrome further defines individual permissions that can be assigned to extensions, such as the permissions to inject JavaScript into web pages, making cross-site access requests, accessing tab and window modules, cookies, local storage, etc. However, the design of Chrome extension security aims to prevent malicious web pages from leveraging extensions to obtain these permissions, and the coarse-grained permission management cannot prevent malicious extensions from accessing sensitive data in web pages and browser modules and making cross-site HTTP requests. Last and most importantly, the extension update mechanism implemented in mainstream browsers provides a very stealthy command and control channel for extension-based botnets. Specifically, in Chrome and Mozilla, each browser extension includes an update_url in its metadata, with which the browser uses to check updates, e.g., each time when the browser starts [4], [1]. Therefore, a botmaster can easily propagate attack command and victim information to a large number of bots without being detected by anti-virus software. Such an approach could be used to distributed bot binary as well. In IE, a malicious add-on even can implement its own update mechanism and download arbitrary code and data. Compared to other approaches, a malware developer can simply develop popular extensions with bot functions hidden. In this case, all browsers with such extensions installed become bots, and a botmaster can communicate with them with ease. With implemented malicious extensions on both IE and Chrome, we demonstrate three types of bot attacks, including spamming, DDoS, and password sniffing. For spamming, instead of sending spam s in a burst fashion, we implement silent and sporadic spamming that are harder to be detected. For DDoS, we launch DDoS attacks in the IE add-on and the Chrome extension with the same command file. For password sniffing, we demonstrate it is easy to sniff login password in e-transactions with different banks. Through these experiments, we show that such attacks could be practicably mounted with trivial efforts. Our study shows that we are in great need of some effective scheme to defeat such threats. II. SECURITY MODEL There are many different ways to distribute browser extension-based bots. As aforementioned, a botmaster can develop popular extensions with normal functions that can be discovered and downloaded by users. Although browser development communities encourage users to download extensions from trusted sources, e.g., in Chrome and Firefox extension galleries, it s usually very difficult to evaluate if an extension is benign [8], partially due to the large number of extensions from third-party developers and the very dynamic behavior of the programming languages used in extensions, typically JavaScript and HTML. On the other hand, there is no effective mechanism yet to prevent a user from installing extensions downloaded from other sources, e.g., embedded links from spam s or phishing web pages. The recent Trojan posed as a fake Chrome extension suggests that such threats are not fictitious [7]. Alternatively, a bot extension does not need to have malicious code and functions when it is firstly installed, e.g., to escape from offline code analysis tools [8]. After the installation base reaches a certain level, the developer or the extension owner can leverage the stealthy update mechanism to include malicious code and data into the extension, hence tuning it to a bot whenever needed. Therefore, in this study, we do not make a specific assumption for distributing and installing bot extensions. Instead, we evaluate how an extension can harvest sensitive information in a browser environment, and obtain network access capability to launch botnet attacks. We further explore how a botmaster leverages the automatic extension update mechanism for command and control channel. We implement bot extensions on both IE and Chrome, which represent two mainstream browser architectures with different extension security models. III. ATTACK CASES WITH IE ADD-ONS Microsoft Internet Explorer (IE) is the most popular browser. To demonstrate the threat of malicious extensions, we have implemented an IE add-on for various attacks. An IE add-on runs in the same process space and has the same privileges as the IE browser. As a result, it can access resources like all other native applications without any restriction. More specifically, an IE BHO has the privilege to 1) access Internet, 2) access disks, 3) access browser resources such as cookies and bookmarks, and 4) access web page objects such as all DOM elements. IE add-ons can also implement their own update mechanisms in an ad-hoc manner as they can access local filesystems and network resources freely. In this study, we have implemented a BHO named HDV for IE8 on Windows 7 with a hardcoded update URL. This BHO is claimed to help process video files and it periodically checks an update server via the URL. It downloads the update files whenever they are available. The hidden bot thus can receive commands distributed by the botmaster with the update server we have set. A. Silent Spamming Today botnets are notoriously responsible for most of spam s on the Internet [3]. A spammer controls or rents a botnet and sends spamming commands to bots. After receiving spamming commands, bots send spam s to victims. To defeat various malware detection mechanisms, a bot, instead of keeping sending spam s at a high rate, can be instructed 2
3 to send spam s only sporadically, which makes detection more difficult. Our implementation below works in such a way. Because an IE add-on has full privileges to access the DOM elements of a web page, we leverage this feature for spamming attacks. When a user is accessing a web system, the user often composes content in an edit area and sends out when editing is done. In this case, the content is saved in the DOM element. Thus, for spamming attacks, right before the is actually sent out, HDV can modify the DOM element by injecting some spam content to the content. When the victim opens the tampered , she will read the embedded spam content. In this implementation, we experiment with the popular iplanet system [6]. Fig. 1. IE BHO for Spam: Step 1 Prepare the spam content Figure 1 shows the update file we prepare for the update for HDV. To inject the spam content, the BHO only needs to tamper with the DOM element that stores the content at a proper time. In our implementation, the content is saved in a TextArea element with name text. Thus, the attack steps are as follows. First, the BHO retrieves the update file and reads spam content and a specific web URL. Second, the BHO waits for the given URL to be accessed and listens to various browser events to monitor user behaviors. Third, when the user sends out the , which is usually triggered by a click event, the BHO accesses the DOM element with name text and appends the spam content at the end of . Fig. 2. IE BHO for Spam: Step 2 User sends out the Figure 2 shows the snapshot when the user finishes editing and is ready to send out the . When a user clicks a button to send out an , in IE, there is a click event with a button as the source and sometimes it can further lead to a form submission event. For the spamming purpose, HDV needs to capture these events in order to tamper with spam content. To capture the sending action, HDV does the following in our implementation. It keeps listening to DISPID_DOCUMENTCOMPLETE event; when the document loading is complete, it walks through all DOM elements recursively and registers form events. When it captures a form event DISPID_HTMLFORMELEMENTEVENTS2_ONSUBMIT or a button event DISPID_HTMLELEMENTEVENTS2_ ONCLICK, it searches for the TextArea element with name text and appends the spam information to the content. In our implementation, in order to precisely capture sending moment, we have instructed HDV to listen to both click and submission events and carefully analyze the event source. Different web systems may have different implementation because they could use different components for editing and different approaches to send . Thus other events may need to be monitored in other systems. Fig. 3. IE BHO for Spam: Step 3 The actual received Figure 3 shows the actual received. In this attack, the spam content is appended to a legitimate , and thus it is difficult to filter such an even the embedded link is known to be malicious. On the other hand, it is not easy to automatically split the content into two parts and remove the spam part eventually. Once this approach is widely taken, we believe that existing spam filtering systems need enhancements to prevent it. B. DDoS Attack With HDV, we can also launch DDoS attacks. The DDoS attack is implemented in a similar approach as before. We use the update file as shown in Figure 4(a). In this example, the DDoS information includes the victim s URL ( attack start time (12:35), request interval (1 second), and attack duration (1000 seconds). After obtaining the victim s URL, the extension can send 3
4 HTTP requests to the victim as instructed by the DDoS command. Upon receiving the update file, HDV will parse the command. When the specified attack time comes, it will start to send DDoS traffic. Figure 4(b) shows the captured traffic information of this BHO once the attack starts. Figure 5 shows the update file we prepare for HDV on the update server, which specifies information about when to steal the password: upon the access of a particular URL. (a) Step 1: receiving DDoS command via BHO update Fig. 6. IE BHO for Password Sniffing: Step2 Password sniffing in progress Fig. 4. (b) Step 2: sending DDoS packets IE BHO for DDoS: Attack in progress C. Password Sniffing on Chase Login Nowadays, many Internet surfers use web browsers to do online shopping and access online bank accounts and financial services. Sensitive information such as bank account and password in these transactions is often saved by the web browser, temporarily or permanently, which makes web browsers a major target of spyware. Recent research has shown that many spyware are in the form of malicious browser plugins [32]. In our experiment, the example attack is against chaseonline.chase.com. An IE add-on runs in the same memory space as the browser, and it can directly read all web page DOM elements. Therefore, one can leverage this for password sniffing trivially. Fig. 5. IE BHO for Password Sniffing: Step1 the command When the BHO detects that the web browser is accessing the URL shown in Figure 6, it will read the password DOM element from the web page in the method of OnDocumentComplete(IDispatch *pdisp, VARIANT *pvarurl) as follows: CComQIPtr<IWebBrowser2> sptempwebbrowser = pdisp;... CComPtr<IDispatch> spdispdoc; hr = m_spwebbrowser->get_document(&spdispdoc);... CComPtr<IHTMLElementCollection> spall; hr = pdocument->get_all(&spall); hr = spall->item(svaritemindex, svarempty, &spdispall); CComQIPtr<IHTMLElement> spelement = spdispall; if (hr == S_OK && pwid == "Password") { BSTR innertext; spelement->get_innertext(&innertext); } After reading the password, HDV can save it to local disk or send it out with any networking protocol. Usually the password sniffing attack only starts when the user finishes all input and submits data to a server. In most cases a form is used to input and submit the account information. Thus the BHO can use a similar mechanism as that in the spamming attack to monitor form submission events. When the form data is finally submitted, the account and password information is read stealthily. IV. ATTACK CASES WITH CHROME EXTENSIONS Chrome is relatively new. It uses a multi-process architecture, where a single browser kernel process runs in the privileged mode to access platform and system resources, on behalf of multiple renderer processes. Each renderer process corresponds to a web page running as a tab. A renderer process runs in a sandboxed environment so it cannot directly access system resources such as the filesystem and the network. It can only send such requests to the browser kernel process. 4
5 (a) Step 1: receiving spam content via extension update (b) Step 2: passively monitoring user s login with Bang! extension (c) Step 3: automatically sending out the spam (d) Step 4: received spam Fig. 7. Chrome Extension for Spam A Chrome extension usually includes an extension core and one or more content scripts. A content script is written in JavaScript that can be injected into a web page when the page is loaded. It then runs in the renderer process space to access the DOM tree. The extension core includes one or more background web pages written in HTML and JavaScript, and runs in a separate renderer process. A content script has the least privileges so it cannot access any object out of its renderer process space and has to communicate with the extension core via Chrome s inter-process communication (IPC). While the extension core contains the bulk of the extension privileges, it runs in a sandboxed environment. Therefore, it cannot access resources of the host platform and the network directly, and can only communicate with external web resources via XMLHttpRequest. Although binary code can be included in a Chrome extension, it can be run in a sandboxed plugin process; therefore we focus on JavaScript and HTML based extensions only in our study. Different from IE, Chrome defines a set of of permissions for extensions, such as the permission to inject JavaScript into web pages, make cross-site access requests, and access tab and window modules, cookies, local storage. The desired permissions of an extension are specified in a manifest.json file by its developer, and prompted to the user when it is installed. The design of Chrome extension architecture is based on the assumption that extensions are benign-but-buggy; that is, the goal of the security architecture is to protect extensions from being exploited by malicious web pages and control the potential damage done to the browser kernel process if an extension is exploited. As Chrome is gaining increasingly popularity, we further develop a Chrome extension Bang! that is again claimed for video processing but includes bot functions. We demonstrate that even with very normal permission specifications, a malicious Chrome extension can conduct typical botnet attacks. A Chrome browser checks the update information of an extension from embedded update_url every a few hours. If an update is available, the browser downloads the update and updates the extension. Similar to IE, we utilize this mechanism to distribute bot commands. A. Sporadic Spamming To send out spam s, Bang! has the following permission specification: "permissions": [ "tabs", " " ] The and permissions are very common in popular extensions. Among the top 30 popular 5
6 extensions from Chrome extension galley, 19 extensions (out of 30) have been granted such permissions. These permissions enable Bang! to send HTTP requests to all destinations. With such permissions for Bang!, we store the spam information in a file called spam.txt under the extension directory on our update server. Every time when the extension is activated, it will check and read this file and then obtain spam information including victims addresses and spam content. Figure 7 shows the spam attack we have implemented via this extension. Basically, after acquiring the spam information that is shown in Figure 7(a), to send out spam s, the extension still needs additional information such as an account to login into a mail server. There are different ways to achieve the access to an account. For example, this information can be saved in spam.txt that has been provided by the botmaster, or the spammer may have registered some free accounts. In our example, the Chrome extension does not need account information beforehand. Instead, it utilizes the user s legitimate account when the user logins into her system. This approach can evade detection more effectively, because spam s are sent out when the user logins into her web system as shown in Figure 7(b). In the figure, the extension Bang! is our bot extension to monitor the user login. As the extension is granted the privilege of "tabs", it listens to the update notification of the tabs with the method of chrome.tabs.onupdated.addlistener(). When the user logins into a web system, the credential is represented by the session id (sid) and rewritten to the URL of the subsequent HTTP requests. As the bot extension has the tab permission, it can listen to the tab update notice. With this credential information, an HTTP request to the iplanet server is authorized to take any action on behalf of the user, instead of sending the user name and password in each transaction. The following code snippet shows the skeleton of obtaining the sid of a login session and sending the spam to the victim address. var begin_index = tab.url.indexof( sid= ); if(begin_index >= 0) { var end_index = tab.url.indexof( &, begin_index+4); var sid = tab.url.substring(begin_index, end_index); var mailhttp = new XMLHttpRequest(); var mailurl = tab.url.substring(0, tab.url.indexof(? )); var victim = ***%40***; var subject = "RE: Balenciaga"; var spam = "Dear Sir/Madam..."; vvar params = sid + "&subject=" + subject + "&to=" + victim + "&cc=&bcc=&text=" + spam + "&html=&mbox=inbox&uid=&parts=&answer=false &attachments=©=sent&smtp=true&draft=&priority=1 &xpriority=3&receipt=&remove=false&replyto= &tzoffset=4&security=false&vcard="; mailhttp.open("post", mailurl, true); mailhttp.setrequestheader("content-type", "application/x-www-form-urlencoded"); mailhttp.setrequestheader("content-length", params.length); mailhttp.setrequestheader("connection", "close"); mailhttp.send(params); } Figure 7(c) shows the sent in the sent box of the user. In this example, the extension sends out the spam with this mechanism through the mail server with the user s legitimate account. Figure 7(d) shows the received spam in the victim account. In this spamming attack, our extension sends out the HTTP requests, which in turn triggers the web server to send spam s to the victim. As the victim address can be embedded in the extension (as in spam.txt), the bot can always obtain new victim s by updating the extension from the botnet master s server, which is allowed by default in Chrome ecosystem. B. DDoS Attack with the Same Update File Fig. 8. Chrome Extension for DDoS Attacks With a very similar mechanism, our extension can command its bots to launch DDoS attacks against a victim server. We use the same update file as shown in Figure 4(a) as the command information that is obtained from an extension update. Figure 8 shows the packet level traffic after the DDoS is initiated. C. Password Sniffing on Citi Bank Login In order to access sensitive information in the Chrome browser, our extension needs to access the DOM tree of a web page. Therefore it needs the cross-site permission to insert the content script when a web page is rendered. The following manifest shows the permission specification. "content_scripts": [ { "matches": [" "js": ["jquery.js", "myscript.js"] } 6
7 (a) Step 1: receiving command from the botmaster via extension update (b) Step 2: passively monitoring the user login (c) Step 3: ing the password to the botmaster Fig. 9. Chrome Extension for Password Sniffing ], "permissions": [ "tabs", " ],... Figure 9(a) shows the command the extension received. The command instructs the extension to steal the password and send it to the designated address. With the above specification, when the user browses the page of online.citibank.com, the content script is injected into the target web page, i.e., and the JavaScript has full privileges to access all DOM elements including the form with user name and password. It reads these values when the user inputs her password as shown in Figure 9(b). Figure 9(c) shows that the password information is successfully sent to the designated address. Note the content script can also send sensitive information to the extension core, which in turn sends the data to the outside network. V. DISCUSSION In practice, a botnet may consist of different types of bots, some bots could be IE add-ons and some bots could be Chrome extensions. The botmaster is capable of using the automatic update mechanism to prepare and distribute various command and control information and deliver to all bots. For example, even the same update file could be used for both the IE add-on and the Chrome extension as we have demonstrated. IE and Chrome use different architectures. It is difficult to argue the trade-off between single-process architectures and multi-process architectures for browsers, considering many design factors such as performance, parallelization, and security. For security and reliability, we tend to believe that a multi-process architecture such as Chrome has more advantages. However, the current Chrome extension security model assumes all extensions are benign and only target at preventing malicious web pages. We believe it is far from sufficient to defend extension-based botnets, especially with very coarse-grained permission management. On protection side, we believe efforts are demanded in the following aspects. First of all, while the permission specification for an extension is good to confine the behavior of the extension, we believe more fine-grained permission management and enforcement in browsers is mandatory. The default extension update mechanism should be improved to make it more user-aware. However, research efforts are needed to make the trade-off between users interferences and friendly usage. Alternatively, taint analysis or code verification tools can be used to study every update file downloaded from the network. The downside, however, is the significant cost, as the entire update package needs to be tracked and software updates may be very frequent. Thus, more research is required in this aspect. Offloading expensive taint analysis and software verification operations to cloud can be another option for a regular use. With the cloud computing facilities, a user may submit the downloaded software to some software verification service on a cloud to validate its functions through static and/or dynamic analysis, and uses it only after it has been thoroughly analyzed. On the other hand, a software credit system could be established to let users score the security perspective of software. The popular online social networks can also help in this regard. However, this approach may take a while to be effective as it purely relies on common user s efforts for validation. In addition, such a system could also be attacked by malware developers. 7
8 VI. RELATED WORK With the increasing amount of bots and botnets on the Internet, lots of research has been conducted in understanding and defending botnets. For example, Barford et al. have analyzed in-depth bot software source code [10] and provided insights from different perspectives. Furthermore, a Botnet Evaluation Environment (BEE) is constructed for understanding botnet activities [9]. Recently, case studies have been performed to analyze spam bot [13], HTTP based Clickbot.A [16], and P2P based Kademlia-based Trojan.Peacomm bot [18]. Potential mechanisms for P2P based botnets have also been studied in [31] with some defense mechanisms. On the defense side, since traditionally botnets are controlled through IRC by a botmaster, one natural detection method is to monitor the standard TCP port 6667 for IRC traffic [24]. Rishi has been proposed to identify IRC based bots through IRC nicknames [17]. Identifying non-human behavior characteristics in traffic and building IRC server scanners to identify potential botnets have also been studied [26], [27], while authors in [14] measured the elapsed time before an un-patched system was infected by a botnet. Basic misuse detection system [20] and IRC traces [11] have also been used and analyzed for botnet detection. To defend against DDoS attacks launched through botnets, Turing tests are designed so that users must solve to access over-taxed resources [21]. The arms race between the malware developers and defenders is endless. It is not surprising that botnets continuously adopt new technologies like web and P2P, to make them more and more stealthy. HTTP based botnets have been studied in [16]. In [18], [31], [22], P2P botnets are analyzed. While many detection schemes [30], [19], [15], [25], [33] have been developed and are continuously being developed, we believe that the key to the shutdown of botnets is the discovery of their command and control channels. VII. CONCLUSION Botnet developers are constantly improving their development in order to produce more and more stealthy malware for all kinds of attacks to make profit. While various approaches have been studied or used for botnet attacks, the risk of exploiting widely used browser extensions and their automatic browser extension update mechanisms for command and control channel has not been practically investigated. In this study, we show that it is not difficult to construct stealthy botnet via browser extensions. Given the large user base of browser extensions, it is imperative to devise an effective prevention scheme to mitigate such risks. REFERENCES [1] Chrome extension autoupdating. extensions/autoupdate.html. [2] Internet explorer protected mode. library/bb250462(v=vs.85).aspx. [3] Most spam comes from just six botnets, Usage share of web browsers. [4] Mozilla extension versioning, update and compatibility. Versioning, Update and Compatibility. [5] One of the most prolific pieces of windows malware has expired. One-of-the-Most-Prolific-Piece-of-Windows-Malware-Has-Expired shtml. [6] Sun software product map, sun-products-map html. [7] Trojan poses as fake google chrome extension. Trojan-Poses-as-Fake-Google- Chrome-Extension.html. [8] S. Bandhakavi, S. T. King, P. Madhusudan, and M. Winslett. Vex: Vetting browser extensions for security vulnerabilities. In Proc. of USENIX Security, [9] P. Barford and M. Blodgett. Toward botnet mesocosms. In Proc. of the First Workshop on Hot Topics in Understanding Botnets, [10] P. Barford and V. Yagneswaran. An inside look at botnets, [11] D. Brumely. Tracking hackers on irc. ircmirc/trackinghackersonirc.htm, [12] Z. Chen, C. Chen, and Q. Wang. Delay-tolerant botnets. In Proceedings of IEEE SecureCPN, [13] K. Chiang and L. Lloyd. A case study of the rustock rootkit and spam bot. In Proc. of the First Workshop on Hot Topics in Understanding Botnets, [14] E. Cooke, F. Jahanian, and D. McPherson. The zombie roundup: Unsterstanding, detecting, and disrupting botnets. In Proc. of the first Workshop of Steps to Reducing Unwanted Traffic on the Internet, [15] W. Cui, R. H. Katz, and W. Tan. Binder: An extrusion-based break-in detector for personal computers. In Proceedings of USENIX, [16] N. Daswani, M. Stoppelman, the Google Click Quality, and Security Teams. The anatomy of clickbot.a. In Proceedings of the First Workshop on Hot Topics in Understanding Botnets, Cambridge, MA, April [17] J. Goebel and T. Holz. Rishi: Identify bot contaminated hosts by irc nickname evaluation. In Proc. of the First Workshop on Hot Topics in Understanding Botnets, [18] J. Grizzard, V. Sharma, C. Nunnery, B. Kang, and D. Dagon. Peer-topeer botnets: Overview and case study. In Proc. of the First Workshop on Hot Topics in Understanding Botnets, [19] G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. Bothunter: Detecting malware infection through ids-driven dialog correlation. In Proc. USENIX Security, [20] C. Hanna. Using snort to detect rogue irc bot programs. Technical report, October [21] S. Kandula, D. Katabi, M. Jacob, and A. Berger. Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds. In Proc. of NSDI, [22] A. Karasaridis, B. Rexroad, and D. Hoeflin. Wide-scale botnet detection and characterization. In Proc. of the First Workshop on Hot Topics in Understanding Botnets, [23] Kristjan Krips. The security analysis of browser extensions. report/downloader.php?file= 43f05a1a6fa7981ca3422bc3d73b66b8711bc006. [24] J. Kristoff. Botnets. In The 32nd Meeting of the North American Network Operators Group, October [25] A. Moshchuk, T. Bragin, D. Deville, S. Gribble, and H. Levy. Spyproxy: Execution-based detection of malicious web content. In Proc. USENIX Security, [26] The Honeynet Project. Know your enemy: Tracking botnets. March [27] Stephane Racine. Analysis of internet relay chat usage by ddos zombies, April [28] R. Schoof and R. Koning. Detecting peer-to-peer botnets. science.uva.nl/ delaat/sne /p17/report.pdf, Feburary [29] G. Starnberger, C. Kruegel, and E. Kirda. Overbot: a botnet protocol based on kademlia. In Proceedings of SecureComm, [30] E. Stinson and J. C. Mitchell. Characterizing the remote control behavior of bots. In Proceedings of DIMVA, [31] P. Wang, S. Sparks, and C. Zou. An advanced hybrid peer-to-peer botnet. In Proceedings of the First Workshop on Hot Topics in Understanding Botnets, Cambridge, MA, April [32] Y. Wang, R. Roussev, C. Verbowski, A. Johnson, M. Wu, Y. Huang, and S. Kuo. Gatekeeper: Monitoring auto-start extensibility points (aseps) for spyware management. In Proc. of LISA, [33] H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In Proc ACM CCS,
Chrome Extensions: Threat Analysis and Countermeasures
Chrome Extensions: Threat Analysis and Countermeasures Lei Liu Xinwen Zhang Vuclip Inc. Huawei R&D Center Milpitas, CA 95035 Santa Clara, CA 95050 [email protected] [email protected] Guanhua Yan Songqing
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Chrome Extensions: Threat Analysis and Countermeasures
Chrome Extensions: Threat Analysis and Countermeasures Lei Liu, Xinwen Zhang*, Guanhua Yan*, and Songqing Chen George Mason University Huawei R&D Center Los Alamos NaIonal Laboratory NDSS 12 * Does not
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets Sajjad Arshad 1, Maghsoud Abbaspour 1, Mehdi Kharrazi 2, Hooman Sanatkar 1 1 Electrical and Computer Engineering Department,
BotTracer: Execution-based Bot-like Malware Detection
BotTracer: Execution-based Bot-like Malware Detection Lei Liu 1, Songqing Chen 1, Guanhua Yan 2, and Zhao Zhang 3 1 Dept. of Computer Science 2 Information Sciences 3 Dept. of Electrical and Computer Engineering
Detecting P2P-Controlled Bots on the Host
Detecting P2P-Controlled Bots on the Host Antti Nummipuro Helsinki University of Technology anummipu # cc.hut.fi Abstract Storm Worm is a trojan that uses a Peer-to-Peer (P2P) protocol as a command and
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
Symptoms Based Detection and Removal of Bot Processes
Symptoms Based Detection and Removal of Bot Processes 1 T Ravi Prasad, 2 Adepu Sridhar Asst. Prof. Computer Science and engg. Vignan University, Guntur, India 1 [email protected], 2 [email protected]
Detection of Botnets Using Honeypots and P2P Botnets
Detection of Botnets Using Honeypots and P2P Botnets Rajab Challoo Dept. of Electrical Engineering & Computer Science Texas A&M University Kingsville Kingsville, 78363-8202, USA Raghavendra Kotapalli Dept.
An Efficient Methodology for Detecting Spam Using Spot System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
Multifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware
What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware Contents Introduction.................................2 Installation: Social engineering
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
An Evaluation of the Google Chrome Extension Security Architecture
An Evaluation of the Google Chrome Extension Security Architecture Nicholas Carlini, Adrienne Porter Felt, and David Wagner University of California, Berkeley [email protected], [email protected],
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.
Faqs > Spyware Doctor Q1. What is Spyware Doctor? Ans.: Spyware Doctor is an easy-to-use, award winning, comprehensive software suite designed to protect your computer against stealthy spyware, aggressive
Five Tips to Reduce Risk From Modern Web Threats
Five Tips to Reduce Risk From Modern Web Threats By Chris McCormack, Senior Product Marketing Manager and Chester Wisniewski, Senior Security Advisor Modern web threats can infect your network, subvert
Guideline for Prevention of Spyware and other Potentially Unwanted Software
Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions
The evolution of virtual endpoint security Comparing vsentry with traditional endpoint virtualization security solutions Executive Summary First generation endpoint virtualization based security solutions
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
Spyware. Summary. Overview of Spyware. Who Is Spying?
Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee USENIX Security Symposium (Security 07) Presented by Nawanol
CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks
CSE 3482 Introduction to Computer Security Denial of Service (DoS) Attacks Instructor: N. Vlajic, Winter 2015 Learning Objectives Upon completion of this material, you should be able to: Explain the basic
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009
Proxy Blocking: Preventing Tunnels Around Your Web Filter Information Paper August 2009 Table of Contents Introduction... 3 What Are Proxies?... 3 Web Proxies... 3 CGI Proxies... 4 The Lightspeed Proxy
Social Networking for Botnet Command and Control
Social Networking for Botnet Command and Control Ashutosh Singh, Annie H. Toderici, Kevin Ross, and Mark Stamp San Jose State University, San Jose, California Email: [email protected], [email protected],
Protecting DNS Query Communication against DDoS Attacks
Protecting DNS Query Communication against DDoS Attacks Ms. R. Madhuranthaki 1, Ms. S. Umarani, M.E., (Ph.D) 2 II M.Tech (IT), IT Department, Maharaja Engineering College, Avinashi, India 1 HOD, IT Department,
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
KUB Website Troubleshooting
KUB Website Troubleshooting Are you having problems getting to the KUB website at http://www.kub.org/? If you type in your user ID and password and press the login button, are you routed right back to
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
A Review on IRC Botnet Detection and Defence
A Review on IRC Botnet Detection and Defence Bernhard Waldecker St. Poelten University of Applied Sciences, Austria Bachelor programme: IT-Security 1 Introduction Nowadays botnets pose an enormous security
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
Storm Worm & Botnet Analysis
Storm Worm & Botnet Analysis Jun Zhang Security Researcher, Websense Security Labs June 2008 Introduction This month, we caught a new Worm/Trojan sample on ours labs. This worm uses email and various phishing
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
F-Secure Anti-Virus for Windows Servers. Administrator's Guide
F-Secure Anti-Virus for Windows Servers Administrator's Guide F-Secure Anti-Virus for Windows Servers TOC 3 Contents Chapter 1: Introduction...5 Product license...6 Disclaimer...6 Installation...7 System
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
Trend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
Measuring Botnets in the Wild: Some New Trends
Measuring Botnets in the Wild: Some New Trends Wentao Chang 1 Aziz Mohaisen An Wang 1 Songqing Chen 1 1 George Mason University Verisign Labs {wchang7, awang1, sqchen}@gmu.edu [email protected] ABSTRACT
RTC-Web Security Considerations
RTC-Web Security Considerations IETF 80 Eric Rescorla [email protected] IETF 80 RTC-Web Security Issues 1 The Browser Threat Model Core Web Security Guarantee: users can safely visit arbitrary web sites and
F-Secure Internet Security 2012
F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection
GlobalSign Malware Monitoring
GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...
Security features of ZK Framework
1 Security features of ZK Framework This document provides a brief overview of security concerns related to JavaScript powered enterprise web application in general and how ZK built-in features secures
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Securing Secure Browsers
Securing Secure Browsers SESSION ID: TRM-T11 Prashant Kumar Verma Sr. Consultant & Head (Security Testing) Paladion Networks @prashantverma21 Agenda Browser Threats Secure Browsers to address threats Secure
Seven for 7: Best practices for implementing Windows 7
Seven for 7: Best practices for implementing Windows 7 The early reports are in, and it s clear that Microsoft s Windows 7 is off to a fast start thanks in part to Microsoft s liberal Windows 7 beta program
Cross-site site Scripting Attacks on Android WebView
IJCSN International Journal of Computer Science and Network, Vol 2, Issue 2, April 2013 1 Cross-site site Scripting Attacks on Android WebView 1 Bhavani A B 1 Hyderabad, Andhra Pradesh-500050, India Abstract
White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
Information Security Threat Trends
Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: [email protected] 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing
DDoS Attacks Can Take Down Your Online Services
DDoS Attacks Can Take Down Your Online Services Dr. Bill Highleyman Managing Editor, Availability Digest Continuity Insights New York 2014 October 8, 2014 [email protected] Who Am I? Dr. Bill
SECURING APACHE : DOS & DDOS ATTACKS - II
SECURING APACHE : DOS & DDOS ATTACKS - II How DDoS attacks are performed A DDoS attack has to be carefully prepared by the attackers. They first recruit the zombie army, by looking for vulnerable machines,
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
F-Secure Anti-Virus for Mac 2015
F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park
21. Botnets ENEE 757 CMSC 818V Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park http://ter.ps/757 https://www.facebook.com/sdsatumd Today s Lecture Where we ve been AuthenDcaDon
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...
Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...
VMware Software Manager - Download Service User's Guide
VMware Software Manager - Download Service User's Guide VMware Software Manager 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
How to easily clean an infected computer (Malware Removal Guide)
How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director [email protected]
The Fundamental Failures of End-Point Security Stefan Frei Research Analyst Director [email protected] Agenda The Changing Threat Environment Malware Tools & Services Why Cybercriminals Need No 0-Days
Botnet Detection by Abnormal IRC Traffic Analysis
Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National
How to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
P2P-BDS: Peer-2-Peer Botnet Detection System
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. V (Sep Oct. 2014), PP 28-33 P2P-BDS: Peer-2-Peer Botnet Detection System Navjot Kaur 1, Sunny
User Guide for the Identity Shield
User Guide for the Identity Shield Copyright Webroot SecureAnywhere User Guide for the Identity Shield January, 2013 2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and
LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic
LASTLINE WHITEPAPER The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic Abstract A distinguishing characteristic of bots is their ability to establish a command and
End-to-End Application Security from the Cloud
Datasheet Website Security End-to-End Application Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
