A Multifaceted Approach to Undrstanding the Botnet Phenomenon為了了解僵尸網(wǎng)絡(luò)現(xiàn)象的一個(gè)多方面的方法_第1頁(yè)
A Multifaceted Approach to Undrstanding the Botnet Phenomenon為了了解僵尸網(wǎng)絡(luò)現(xiàn)象的一個(gè)多方面的方法_第2頁(yè)
A Multifaceted Approach to Undrstanding the Botnet Phenomenon為了了解僵尸網(wǎng)絡(luò)現(xiàn)象的一個(gè)多方面的方法_第3頁(yè)
A Multifaceted Approach to Undrstanding the Botnet Phenomenon為了了解僵尸網(wǎng)絡(luò)現(xiàn)象的一個(gè)多方面的方法_第4頁(yè)
A Multifaceted Approach to Undrstanding the Botnet Phenomenon為了了解僵尸網(wǎng)絡(luò)現(xiàn)象的一個(gè)多方面的方法_第5頁(yè)
已閱讀5頁(yè),還剩22頁(yè)未讀 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、a multifaceted approach to understanding the botnetphenomenonauthors :moheeb abu rajab, jay zarfoss, fabian monrose, andreas terziscomputer science departmentjohns hopkins universitypresented at : internet measurement conference, imc06, brazil, october 2006presented by :ramanarayanan ramanioutlinenw

2、orking of botnetsnmeasuring botnetsninference from measurementnstrengthsnweaknessesnsuggestionsbotnetsna botnet is a network of infected end-hosts (bots) under the command of a botmaster.n3 different protocols used:qircqhttpqp2pbotnets (contd.)3 steps of authenticationnbot to irc servernirc server t

3、o botnbotmaster to bot(*) : optional stepmeasuring botnetsnthree distinct phasesqmalware collectioncollect as many bot binaries as possibleqbinary analysis via gray-box testingextract the features of suspicious binariesqlongitudinal trackingtrack how bots spread and its reachmeasuring botnetsdarknet

4、 : denotes an allocated but unused portion of the ip address space.malware collectionnnepenthes is a low interaction honeypot nnepenthes mimics the replies generated by vulnerable services in order to collect the first stage exploitnmodules in nepenthesqresolve dns asynchronous qemulate vulnerabilit

5、ies qdownload files done here by the download stationqsubmit the downloaded files qtrigger events qshellcode handler malware collectionnhoneynets also used along with nepenthesncatches exploits missed by nepenthesnunpatched windows xp are run which is base copyninfected honeypot compared with base t

6、o identify botnet binarygatewaynrouting to different componentsnfirewall : prevent outbound attacks & self infection by honeypotsndetect & analyze outgoing traffic for infections in honeypotnonly 1 infection in a honeypotnseveral other functionsbinary analysisntwo logically distinct phasesqderive a

7、network fingerprint of the binaryqderive irc-specific features of the binarynirc server learns botnet “dialect” - templatenlearn how to correctly mimic bots behavior - subject bot to a barrage of commandsirc trackernuse template to mimic bot nconnect to real irc serverncommunicate with botmaster usi

8、ng bot “dialect”ndrones modified and used to act as irc client by the tracker to cover lot of ip addresssdns trackernbots issue dns queries to resolve the ip addresses of their irc serversntracker uses dns requestsnhas 800,000 entries after reductionnmaintain hits to a servermeasuring botnetsdarknet

9、 : denotes an allocated but unused portion of the ip address space.botnet traffic sharebotnet traffic sharedns tracker resultsbot scan methodn2 typesqimmediately start scanning the ip space looking for new victims after infection : 34 / 192qscan when issued some command by botmasterbotnet growth - d

10、nsbotnet growth irc trackerbotnet online populationbotnet online populationbotnet software taxonomyservices launched in victim machine os of exploited hostbotmaster analysisstrengthsnall aspects of a botnet analyzednno prior analysis of botsnability to model various types of botsweaknessnonly microsoft windows system

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論