Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Similar documents
Security A to Z the most important terms

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Networking for Caribbean Development

Cisco RSA Announcement Update

Top tips for improved network security

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Section 12 MUST BE COMPLETED BY: 4/22

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Almost 400 million people 1 fall victim to cybercrime every year.

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Attacks from the Inside

BotNets- Cyber Torrirism

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Automate your IT Security Services

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Network attack and defense

Firewall Firewall August, 2003

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Stopping zombies, botnets and other - and web-borne threats

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Agenda , Palo Alto Networks. Confidential and Proprietary.

MALWARE THREATS AND TRENDS. Chris Blow, Director Dustin Hutchison, Director

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

Phone Fax

DDoS Attacks Can Take Down Your Online Services

DDoS Attacks & Defenses

Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

How To Understand A Network Attack

PART D NETWORK SERVICES

Mobile Malware Network View. Kevin McNamee : Alcatel-Lucent

A Case for Managed Security

IBM Protocol Analysis Module

The Hillstone and Trend Micro Joint Solution

Chapter 9 Firewalls and Intrusion Prevention Systems

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Fighting Advanced Threats

The HoneyNet Project Scan Of The Month Scan 27

Malicious Network Traffic Analysis

THE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing

How Attackers are Targeting Your Mobile Devices. Wade Williamson

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

CS Network Security: Botnets

Current Threat Scenario and Recent Attack Trends

What you can do prevent virus infections on your computer

isheriff CLOUD SECURITY

Firewalls, IDS and IPS

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

AVeS Cloud Security powered by SYMANTEC TM

Security Incident Management Essentials Compiled as a service to the community by Internet2, EDUCAUSE, and REN-ISAC

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

About Botnet, and the influence that Botnet gives to broadband ISP

Korea s experience of massive DDoS attacks from Botnet

On and off premises technologies Which is best for you?

1 Introduction. Agenda Item: Work Item:

Integrated Protection for Systems. João Batista Territory Manager

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Promoting Network Security (A Service Provider Perspective)

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Xerox Next Generation Security: Partnering with McAfee White Paper

ViRobot Desktop 5.5. User s Guide

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

Detecting peer-to-peer botnets

Top 5 Essential Log Reports

CTS2134 Introduction to Networking. Module Network Security

Threat Events: Software Attacks (cont.)

Data Center security trends

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

CERT-GOV-GE Activities & International Partnerships

Countermeasures against Bots

Top Ten Cyber Threats

Operation Liberpy : Keyloggers and information theft in Latin America

Next Generation IPS and Reputation Services

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Transcription:

Security workshop Belnet Aris Adamantiadis Brussels 18 th April 2013

Agenda What is a botnet? Symptoms How does it work? Life cycle How to fight against botnets? Proactive and reactive NIDS 2

What is a botnet? Specific kind of network Network operated by a special kind of malware Gets on computer like other malwares (drive-by, piracy, trojan horses, vulnerabilities, ) Connects to a central «Command and control server» Sits and awaits for orders 3

What is a botnet? Goal of the botnet Operated by cyber criminals to sell resources Network, CPU, accounts, Botnets were doing cloud computing before it was a trend! Targets Spam Click frauds, spamdexing (SEO «optimization») DDOS Brute force (SSH, FTP, SMTP, ) Coupled with typical malware actions (stealing credentials, adware, spyware, scareware, ) 4

What is a botnet? 5

Botnets: symptoms Symptoms of a Botnet attack Network is slow SMTP server answering slowly Some computers too slow or unusable Huge spikes in traffic Receiving complaints at the abuse@ address Addresses / range blacklisted by spamcop, spamhaus, Legitimate emails lost in spam 6

How does it work? The botnet is operated through a C&C server Typically using IRC (port 6667), HTTP This kind of botnet can be easily shut down But sometimes uses a P2P network Using web 2.0 (twitter, google, ) Using P2P protocols Sometimes, custom DNS servers are used 7

Life cycle (I) Infection The malware is copied on the victim s computer Activation The malware makes itself part of the botnet (registers on the C&C) Update The authors of these malwares write updates to fix bugs, to fight against AV software or add functionalities Self-protection Hides itself from the user and security software, and makes itself persistent (resistant to erasure) 8

Life cycle (II) Propagation Uses its exploit kit to propagate on other targets: By spam campaigns, scans and exploitation of known vulnerabilities, infection of shared drives & brute force of accounts Operation The malware is ready to attack and to be sold to the highest bidder The pricing model depends on the number of PCs and the available bandwidth 9

Size of botnets Number of botnets Today s estimation: between 1800 and 1900 Hard to count since some botnets are very quiet Changes a lot when botnets are shut down Size of single botnets Varies with botnets Some botnets had more than 30M zombies Check out on http://www.shadowserver.org 10

Fighting against botnets Proactive measures Block common botnet ports IRC(6667), DNS to outside Throttle single user s access to internet Install AV (and maintained) software on desktops Use a proper network segmentation Use an NIDS/Layer 7 firewall Reactive measures Find the infected hosts and quarantine / clean them Remove yourself from blacklists (when you re 100% clean) 11

NIDS? Network Intrusion Detection System Taps on and listens to network traffic and generates alarms based on signatures Lot of commercial and free solutions, most of them based on Snort (http://www.snort.org) and Suricata (http://www.suricata-ids.org) Botnets are generally very noisy when active and generate a lot of alerts Generates a lot of events, so fine-tuning is necessary 12

Finding and cleaning infected PC Yes but it s a Wi-Fi user You should have enough logging in place to trace back an event (abuse report) to an IP address (Firewall logs, NIDS) Finding the user is hard, but finding is MAC is easy (DHCP logs) Put him on a quarantine VLAN (or deny access to the network). If you can t find the user, the user will find you. If it s not your device You have no right to install AV software or clean it yourself Prepare a procedure for them and wait for the user to do the cleaning before unblocking him again. 13

In brief Botnets attack your resources and reputation Protect using firewalls, AV and patching policy Inspect with logs and NIDS React with cleaning and quarantine 14

Q&A 15