SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
9th TWNIC IP Open Policy Meeting
                2007/12/5, Taipei

            Botnets & DDoS Introduction



Kae Hsu (IS-TW)
Agenda
•   Bot
•   Botnet and the mechanisms used in
•   Botnets activities and economics
•   Harms from Botnets
•   DDoS mitigation
•   Botnets detection and defense
•   Reference




          2007/12/5   2      Copyright 2007 - Trend Micro Inc.
Bot
• Brief history of Bot (summarized from “Botnets, THE KILLER WEB APP”)
    – GM (1989)
         • A robot user in an IRC channel.
    – PrettyPark (1999)
         • A Bot client on Windows95/98.
         • Malicious IRC Bots.
    – SubSeven Trojan/Bot
         • Create backdoor in the system.
         • SubSeven server could control SubSeven clients via IRC server.
    – GT Bot (2000)
         • Based on the mIRC client
              – could trigger mIRC client to run scripts from IRC server.
              – support raw TCP and UDP socket connections.
    – SDBot (2002)
         • Written in C++ and the author released the source code.
         • Exploits and infects.
             2007/12/5       3              Copyright 2007 - Trend Micro Inc.
Bot
• History brief (cont.)
   – Agobot (2002)
       • Modular design.
       • Using P2P file-sharing applications to spread.


   Characteristic-Based Families
   – Spybot (2003)
       • Open source Trojan and deviate from SDBot.
   – RBot (2003)
       • Most detections in Windows platform, with 1.9 million PCs. (2005)
   – Polybot (2004)
       • Derived from the AgoBot.
   – Mytob (2005)
       • Hybrid from MyDoom and bot IRC C&C functionality.



          2007/12/5     4             Copyright 2007 - Trend Micro Inc.
Botnet and the mechanisms used in
•   Botnet
    – Some Bots controlled by a single one/organization (botherder)
      and execute the commands from the botherder.
•   Botnet Life Cycle
    1. Exploit.
    2. Report to the botherder (via C&C channel).
    3. Retrieve the anti-antivirus module.
    4. Rally and secure the Bot client.
    5. Listen to the C&C channel and receive command.
    6. Retrieve the payload module.
    7. Execute the command.
    8. Report result to the C&C channel.
    9. Back to step 5.
    10. Erase all evidence and abandon the Bot client.

           2007/12/5   5           Copyright 2007 - Trend Micro Inc.
Botnet and the mechanisms used in
• C&C: Command and Control
  – Botherder use C&C to collect Bot client information and delivery
    the commands to Bot clients.
  – IRC server is the most early and widely used C&C
       •   Interactive.
       •   Easy to build a IRC server.
       •   Easy to create and control several Botnets using one server.
       •   Easy to create redundancy.
  –   Web-based C&C servers.
  –   P2P Botnets.
  –   Random.
  –   IM C&C.
  –   Remote Administration.
  –   Drop Zone and FTP-based C&C.


            2007/12/5     6             Copyright 2007 - Trend Micro Inc.
Botnets activities and economics
• Exploit new Bot client
• DDoS attack
    – DDoS ransom - $$$
• Software installation
    – adware - $$$
    – clicks4hire - $$$
•   Spam and phishing - $$$
•   Storage and distribution of stolen or illegal data
•   Ransomware - $$$
•   Data mining - $$$
•   Reporting results
•   Erase the evidence, abandon the client

           2007/12/5      7      Copyright 2007 - Trend Micro Inc.
Harms from Botnets
• Spam
   – Botherder control Bot clients to email spam.
• DDoS – Distributed Denial of Service
   – Flooding lots of anomaly traffic or launch lots of service request
     to the DDoS target
       • The service is blocked on victim cause of resource exhausted.
           – bandwidth resource
           – system resource
   – DDoS is hard to prevent
       • It is hard to classify normal or abnormal traffic.
           – Anomaly TCP/UDP/ICMP flooding is easy to detect.
           – Anomaly service access request is hard to detect.
       • ISP uplink congestion will impact other customer
           – Traffic scrubbing is helpless to uplink congestion.




           2007/12/5      8               Copyright 2007 - Trend Micro Inc.
Harms from Botnets
• Botnets: the source of DDoS
   – In a Botnet, zombie PCs would be used to generate the attack
     traffic to the victims.
   – If a Botnet have >100,000 zombie PCs, each PC generate
     50kbps attack traffic to the victim; The total attack traffic could
     reach more than 5Gbps!!!
       • 5Gbps traffic could congest lots of links of enterprise and ISP.
   – If a Botnet have >100,000 zombie PCs, each PC generate 1kpps
     attack traffic to the victim; The total attack traffic could reach
     more than 100Mpps!!!
       • 100Mpps traffic could shutdown lots of equipments of enterprise
         and ISP.
   – Most ISPs use “black-hole” mechanism to drop the attack traffic,
     but it will drop normal traffic flow to victim too
       • ISPs help the cyber-criminal complete the attack.


           2007/12/5     9             Copyright 2007 - Trend Micro Inc.
Harms from Botnets
• Scale of Botnet:
   – Telenor takes down 'massive' botnet – more than 10,000 zombie
     PC
       • http://www.theregister.co.uk/2004/09/09/telenor_botnet_dismantled/
   – Dutch Botnet suspects ran 1.5 million machines
       • http://www.techweb.com/wire/security/172303160
   – Of the 600 million computers currently on the internet, between
     100 and 150 million were already part of these botnet…
           – http://news.bbc.co.uk/1/hi/business/6298641.stm

• Strength of Botnet:
   – Estonian government websites were shutdown cause serious
     DDoS attack from Apr. 27, 2007
       • At its peak on May 9, the attack shut down up to 58 sites at once.
       • Computers from the United States, Canada, Brazil, Vietnam and
         others have been used in the attacks.


          2007/12/5      10             Copyright 2007 - Trend Micro Inc.
Harms from Botnets
• DDoS example
  – ISPs               Bot client
                                                                        BOTNETS




                                                                         attack
                                                                         traffic




                                                                        VICTIMS




                                                                           link
                                                                        congestion



           2007/12/5        11      Copyright 2007 - Trend Micro Inc.
Harms from Botnets
  – All of the packets forward to victim were dropped.


                                                                      BOTNETS




                                                                       attack
                                                                       traffic




                                                                      VICTIMS




         2007/12/5    12          Copyright 2007 - Trend Micro Inc.
DDoS mitigation
• Scrub the traffic, accept and forward the normal packets
  and drop the abnormal packets
   – Build the traffic scrubbing system in your netowrk
       • Congestion still would be happened on ISP border router.
                                                                                                      VICTIMS




                                                                                                         link
                                                                                                      congestion


   – Order scrubbing service from upstream ISP or scrubbing service
     provider.
                                                                         scrubbing service provider




                                                                                                      VICTIMS




                                                                                                         link
                                                                                                      congestion

          2007/12/5     13           Copyright 2007 - Trend Micro Inc.
Botnets detection and defense
  • Internet projects to detect Bot/Botnets
             – Darknet
                   • A subnet that no any machine host in.
                   • There should not be any normal traffic flow to this subnet
                             – Anomaly traffic flow sent by malware almost.
                   • It is possible to trace the compromised machine by analyzing those
                     anomaly traffic.



                                                                                            enable promiscuous mode
Bot client
                                  Internet

                                                                                           .4


                                                                                                                      analyze exploit traffic and catch Bot client IP
                                                                             .1
                                                                                           .3


              R(config)#ip route 172.17.12.128 255.255.255.128 172.17.12.4                 .2


                                                                             172.17.12.0/24


                           2007/12/5                     14                   Copyright 2007 - Trend Micro Inc.
Botnets detection and defense
  • Internet projects to detect Bot/Botnets
         – Honeypots
                   • A machine that exploit by malware on purpose.
                       – Botnets life cycle:
                              »   2) Report to the botherder (via C&C channel).
                              »   5) Listen to the C&C channel and receive command.
                              »   6) Retrieve the payload module.
                              »   8) Report result to the C&C channel.
                       – To sniff and analyze the connections of Bot, we could catch:
                              » the IP address of C&C
                              » the IP address of victims

             C&C
172.31.1.1
                          Internet
                                                                          .4

                                                                                                        catch the C&C IP: 172.31.1.1
                                                            .1

                                                                          .3
                                                                                                 port mirror
                                                                                                                            honeypot
                                                                                                        .2


                      2007/12/5          15                  Copyright 2007 - Trend Micro Inc.
Botnets detection and defense
  – Honeypot (cont.)
         • In theories, off-line the C&C would destroy the whole Botnet
                   – It is the vulnerability of centralized C&C.

   C&C


                        Internet

                                                                             .4



                                                               .1
                                                                             .3
                                                                                                    port mirror
                                                                                                                  honeypot
                                                                                                           .2
         R(config)#ip route 172.31.1.1 255.255.255.255 null0




         • Use black-hole to block the C&C IP on the Internet
                   – But botherder would not structure their Botnet by only one C&C
                             » Use DNS to improvement C&C surviving.




                 2007/12/5                      16              Copyright 2007 - Trend Micro Inc.
Botnets detection and defense
• BGP flow-spec
  – A new BGP NLRI
      • The reason to use BGP: re-use
          – protocol algorithms.
          – operational experience.
          – administrative processes such as inter-provider peering agreements.
  – Distribute traffic flow specifications and action.
      • Flow-spec NLRI
          –   Type 1 – destination prefix
          –   Type 2 – source prefix
          –   Type 3 – IP protocol
          –   Type 4 – port
          –   Type 5 – destination port
          –   Type 6 – source port
          –   Type 7 – ICMP type
          –   Type 8 – ICMP core



          2007/12/5       17                Copyright 2007 - Trend Micro Inc.
Botnets detection and defense
               • Flow-spec NLRI (cont.)
                    –   Type 9 –TCP flags
                    –   Type 10 – packet length
                    –   Type 11 – DSCP
                    –   Type 12 – fragment
               • Traffic filtering actions
                    – Traffic-rate
                    – Traffic-action
                           » Terminal action
                           » Sample
                    – Redirect
         – Use BGP flow-spec in your network

Bot client D

                                                                                      Normal
                                                                                      client B
   Normal
   client C



                                                      Server A

                   2007/12/5         18           Copyright 2007 - Trend Micro Inc.
Botnets detection and defense
         – Use BGP flow-spec in your network
               • Update BGP flow-spec route to border router
                   – ‘SRC=D, DST=A, action=drop’

Bot client D

                                                                                 Normal
                                                                                 client B
   Normal
   client C



                                                 Server A



               • Update BGP flow-spec route to peering partner
                   – ‘SRC=D, DST=A, action=drop’

Bot client D

                                                                                 Normal
                                                                                 client B
   Normal
   client C



                                                 Server A


                  2007/12/5     19           Copyright 2007 - Trend Micro Inc.
Reference
    • “Botnets, THE KILLER WEB APP”
        – by Craig A. Schiller etc.; Syngress Publishing Inc., 2007
    • The Team Cymru Darknet Project
        – http://www.cymru.com/Darknet/index.html
    • The Honeynet Project
        – http://www.honeynet.org/index.html
    • “Dissemination of flow specification rules”
        – draft-marques-idr-flow-spec-04.txt
    • “Configuring a flow route”
        – http://www.juniper.net/techpubs/software/junos/junos85/swconfig85-
          routing/id-10317421.html#id-10317421
    • “Inferring Internet Denial-of-Service Activity”
        – by David Moore etc.
    • “The Zombie Roundup: Understanding, Detecting, and Disrupting
      Botnets”
        – by Evan Cooke etc.
    • “How CNCERT/CC fighting to Botnets”
        – by Mingqi Chen.; CNCERT/CC
        2007/12/5      20             Copyright 2007 - Trend Micro Inc.
Thank You




Classification   2007/12/6
                 2007/12/5   21   Copyright 2007 - Trend Micro Inc.

Mais conteúdo relacionado

Destaque

4byte As Number Migration Suggestion
4byte As Number Migration Suggestion4byte As Number Migration Suggestion
4byte As Number Migration SuggestionKae Hsu
 
4 byte AS number workshop material
4 byte AS number workshop material4 byte AS number workshop material
4 byte AS number workshop materialKae Hsu
 
A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7Rawnet
 
4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios4 Byte As Ns Test Scenarios
4 Byte As Ns Test ScenariosKae Hsu
 
Noisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networksNoisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networksMichael Stumpf
 
Toward The Semantic Deep Web
Toward The Semantic Deep WebToward The Semantic Deep Web
Toward The Semantic Deep WebSamiul Hoque
 
Web 101 by Jennifer Lill
Web 101 by Jennifer LillWeb 101 by Jennifer Lill
Web 101 by Jennifer LillJennifer Lill
 
How internet works and how messages are transferred in Internet
How internet works and how messages are transferred in InternetHow internet works and how messages are transferred in Internet
How internet works and how messages are transferred in Internetpagetron
 
20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFVKae Hsu
 
Rawnet Lightning Talk - Anyone Can Draw.
Rawnet Lightning Talk - Anyone Can Draw.Rawnet Lightning Talk - Anyone Can Draw.
Rawnet Lightning Talk - Anyone Can Draw.Rawnet
 
CDN and ISP Operation
CDN and ISP OperationCDN and ISP Operation
CDN and ISP OperationKae Hsu
 
Network Design in Cloud-ready IDC
Network Design in Cloud-ready IDCNetwork Design in Cloud-ready IDC
Network Design in Cloud-ready IDCKae Hsu
 
How Internet Works
How Internet WorksHow Internet Works
How Internet WorksKae Hsu
 
Redundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpointRedundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpointKae Hsu
 
Rawnet Lightning talk - 'Thinking, Fast and Slow' review
Rawnet Lightning talk - 'Thinking, Fast and Slow' reviewRawnet Lightning talk - 'Thinking, Fast and Slow' review
Rawnet Lightning talk - 'Thinking, Fast and Slow' reviewRawnet
 
Multimedia- How Internet Works
Multimedia- How Internet WorksMultimedia- How Internet Works
Multimedia- How Internet Workssambhenilesh
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingRozitarmizi Mohammad
 

Destaque (17)

4byte As Number Migration Suggestion
4byte As Number Migration Suggestion4byte As Number Migration Suggestion
4byte As Number Migration Suggestion
 
4 byte AS number workshop material
4 byte AS number workshop material4 byte AS number workshop material
4 byte AS number workshop material
 
A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7
 
4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios
 
Noisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networksNoisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networks
 
Toward The Semantic Deep Web
Toward The Semantic Deep WebToward The Semantic Deep Web
Toward The Semantic Deep Web
 
Web 101 by Jennifer Lill
Web 101 by Jennifer LillWeb 101 by Jennifer Lill
Web 101 by Jennifer Lill
 
How internet works and how messages are transferred in Internet
How internet works and how messages are transferred in InternetHow internet works and how messages are transferred in Internet
How internet works and how messages are transferred in Internet
 
20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV
 
Rawnet Lightning Talk - Anyone Can Draw.
Rawnet Lightning Talk - Anyone Can Draw.Rawnet Lightning Talk - Anyone Can Draw.
Rawnet Lightning Talk - Anyone Can Draw.
 
CDN and ISP Operation
CDN and ISP OperationCDN and ISP Operation
CDN and ISP Operation
 
Network Design in Cloud-ready IDC
Network Design in Cloud-ready IDCNetwork Design in Cloud-ready IDC
Network Design in Cloud-ready IDC
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
Redundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpointRedundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpoint
 
Rawnet Lightning talk - 'Thinking, Fast and Slow' review
Rawnet Lightning talk - 'Thinking, Fast and Slow' reviewRawnet Lightning talk - 'Thinking, Fast and Slow' review
Rawnet Lightning talk - 'Thinking, Fast and Slow' review
 
Multimedia- How Internet Works
Multimedia- How Internet WorksMultimedia- How Internet Works
Multimedia- How Internet Works
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 

Semelhante a Botnets & DDoS Introduction

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeAPNIC
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introductionswang2010
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AlivePositive Hack Days
 
Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques SafiUllah Saikat
 
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...Eric Vanderburg
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveDefconRussia
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay aliveqqlan
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikPositive Hack Days
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC SecurityAlex Hunte
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTCQuobis
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...OWASP Delhi
 
Virtualization Monitoring Webinar
Virtualization Monitoring WebinarVirtualization Monitoring Webinar
Virtualization Monitoring Webinarkrkingsley
 
Distributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationDistributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationPavel Odintsov
 
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"Quobis
 
WebRTC Security Concerns, a real problem?
WebRTC Security Concerns, a real problem?WebRTC Security Concerns, a real problem?
WebRTC Security Concerns, a real problem?VOIP2DAY
 
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Julia Yu-Chin Cheng
 
Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Infradata
 
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEric Vanderburg
 
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannotapidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannotapidays
 

Semelhante a Botnets & DDoS Introduction (20)

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay Alive
 
Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques
 
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay alive
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTC
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
 
Virtualization Monitoring Webinar
Virtualization Monitoring WebinarVirtualization Monitoring Webinar
Virtualization Monitoring Webinar
 
Distributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationDistributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And Mitigation
 
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
 
WebRTC Security Concerns, a real problem?
WebRTC Security Concerns, a real problem?WebRTC Security Concerns, a real problem?
WebRTC Security Concerns, a real problem?
 
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
 
Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)
 
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
 
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannotapidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
 

Mais de Kae Hsu

FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionKae Hsu
 
TWNIC 13th OPM session
TWNIC 13th OPM sessionTWNIC 13th OPM session
TWNIC 13th OPM sessionKae Hsu
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingKae Hsu
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingKae Hsu
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingKae Hsu
 

Mais de Kae Hsu (6)

FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP Introduction
 
TWNIC 13th OPM session
TWNIC 13th OPM sessionTWNIC 13th OPM session
TWNIC 13th OPM session
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharing
 
r2
r2r2
r2
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharing
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharing
 

Último

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Último (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Botnets & DDoS Introduction

  • 1. 9th TWNIC IP Open Policy Meeting 2007/12/5, Taipei Botnets & DDoS Introduction Kae Hsu (IS-TW)
  • 2. Agenda • Bot • Botnet and the mechanisms used in • Botnets activities and economics • Harms from Botnets • DDoS mitigation • Botnets detection and defense • Reference 2007/12/5 2 Copyright 2007 - Trend Micro Inc.
  • 3. Bot • Brief history of Bot (summarized from “Botnets, THE KILLER WEB APP”) – GM (1989) • A robot user in an IRC channel. – PrettyPark (1999) • A Bot client on Windows95/98. • Malicious IRC Bots. – SubSeven Trojan/Bot • Create backdoor in the system. • SubSeven server could control SubSeven clients via IRC server. – GT Bot (2000) • Based on the mIRC client – could trigger mIRC client to run scripts from IRC server. – support raw TCP and UDP socket connections. – SDBot (2002) • Written in C++ and the author released the source code. • Exploits and infects. 2007/12/5 3 Copyright 2007 - Trend Micro Inc.
  • 4. Bot • History brief (cont.) – Agobot (2002) • Modular design. • Using P2P file-sharing applications to spread. Characteristic-Based Families – Spybot (2003) • Open source Trojan and deviate from SDBot. – RBot (2003) • Most detections in Windows platform, with 1.9 million PCs. (2005) – Polybot (2004) • Derived from the AgoBot. – Mytob (2005) • Hybrid from MyDoom and bot IRC C&C functionality. 2007/12/5 4 Copyright 2007 - Trend Micro Inc.
  • 5. Botnet and the mechanisms used in • Botnet – Some Bots controlled by a single one/organization (botherder) and execute the commands from the botherder. • Botnet Life Cycle 1. Exploit. 2. Report to the botherder (via C&C channel). 3. Retrieve the anti-antivirus module. 4. Rally and secure the Bot client. 5. Listen to the C&C channel and receive command. 6. Retrieve the payload module. 7. Execute the command. 8. Report result to the C&C channel. 9. Back to step 5. 10. Erase all evidence and abandon the Bot client. 2007/12/5 5 Copyright 2007 - Trend Micro Inc.
  • 6. Botnet and the mechanisms used in • C&C: Command and Control – Botherder use C&C to collect Bot client information and delivery the commands to Bot clients. – IRC server is the most early and widely used C&C • Interactive. • Easy to build a IRC server. • Easy to create and control several Botnets using one server. • Easy to create redundancy. – Web-based C&C servers. – P2P Botnets. – Random. – IM C&C. – Remote Administration. – Drop Zone and FTP-based C&C. 2007/12/5 6 Copyright 2007 - Trend Micro Inc.
  • 7. Botnets activities and economics • Exploit new Bot client • DDoS attack – DDoS ransom - $$$ • Software installation – adware - $$$ – clicks4hire - $$$ • Spam and phishing - $$$ • Storage and distribution of stolen or illegal data • Ransomware - $$$ • Data mining - $$$ • Reporting results • Erase the evidence, abandon the client 2007/12/5 7 Copyright 2007 - Trend Micro Inc.
  • 8. Harms from Botnets • Spam – Botherder control Bot clients to email spam. • DDoS – Distributed Denial of Service – Flooding lots of anomaly traffic or launch lots of service request to the DDoS target • The service is blocked on victim cause of resource exhausted. – bandwidth resource – system resource – DDoS is hard to prevent • It is hard to classify normal or abnormal traffic. – Anomaly TCP/UDP/ICMP flooding is easy to detect. – Anomaly service access request is hard to detect. • ISP uplink congestion will impact other customer – Traffic scrubbing is helpless to uplink congestion. 2007/12/5 8 Copyright 2007 - Trend Micro Inc.
  • 9. Harms from Botnets • Botnets: the source of DDoS – In a Botnet, zombie PCs would be used to generate the attack traffic to the victims. – If a Botnet have >100,000 zombie PCs, each PC generate 50kbps attack traffic to the victim; The total attack traffic could reach more than 5Gbps!!! • 5Gbps traffic could congest lots of links of enterprise and ISP. – If a Botnet have >100,000 zombie PCs, each PC generate 1kpps attack traffic to the victim; The total attack traffic could reach more than 100Mpps!!! • 100Mpps traffic could shutdown lots of equipments of enterprise and ISP. – Most ISPs use “black-hole” mechanism to drop the attack traffic, but it will drop normal traffic flow to victim too • ISPs help the cyber-criminal complete the attack. 2007/12/5 9 Copyright 2007 - Trend Micro Inc.
  • 10. Harms from Botnets • Scale of Botnet: – Telenor takes down 'massive' botnet – more than 10,000 zombie PC • http://www.theregister.co.uk/2004/09/09/telenor_botnet_dismantled/ – Dutch Botnet suspects ran 1.5 million machines • http://www.techweb.com/wire/security/172303160 – Of the 600 million computers currently on the internet, between 100 and 150 million were already part of these botnet… – http://news.bbc.co.uk/1/hi/business/6298641.stm • Strength of Botnet: – Estonian government websites were shutdown cause serious DDoS attack from Apr. 27, 2007 • At its peak on May 9, the attack shut down up to 58 sites at once. • Computers from the United States, Canada, Brazil, Vietnam and others have been used in the attacks. 2007/12/5 10 Copyright 2007 - Trend Micro Inc.
  • 11. Harms from Botnets • DDoS example – ISPs Bot client BOTNETS attack traffic VICTIMS link congestion 2007/12/5 11 Copyright 2007 - Trend Micro Inc.
  • 12. Harms from Botnets – All of the packets forward to victim were dropped. BOTNETS attack traffic VICTIMS 2007/12/5 12 Copyright 2007 - Trend Micro Inc.
  • 13. DDoS mitigation • Scrub the traffic, accept and forward the normal packets and drop the abnormal packets – Build the traffic scrubbing system in your netowrk • Congestion still would be happened on ISP border router. VICTIMS link congestion – Order scrubbing service from upstream ISP or scrubbing service provider. scrubbing service provider VICTIMS link congestion 2007/12/5 13 Copyright 2007 - Trend Micro Inc.
  • 14. Botnets detection and defense • Internet projects to detect Bot/Botnets – Darknet • A subnet that no any machine host in. • There should not be any normal traffic flow to this subnet – Anomaly traffic flow sent by malware almost. • It is possible to trace the compromised machine by analyzing those anomaly traffic. enable promiscuous mode Bot client Internet .4 analyze exploit traffic and catch Bot client IP .1 .3 R(config)#ip route 172.17.12.128 255.255.255.128 172.17.12.4 .2 172.17.12.0/24 2007/12/5 14 Copyright 2007 - Trend Micro Inc.
  • 15. Botnets detection and defense • Internet projects to detect Bot/Botnets – Honeypots • A machine that exploit by malware on purpose. – Botnets life cycle: » 2) Report to the botherder (via C&C channel). » 5) Listen to the C&C channel and receive command. » 6) Retrieve the payload module. » 8) Report result to the C&C channel. – To sniff and analyze the connections of Bot, we could catch: » the IP address of C&C » the IP address of victims C&C 172.31.1.1 Internet .4 catch the C&C IP: 172.31.1.1 .1 .3 port mirror honeypot .2 2007/12/5 15 Copyright 2007 - Trend Micro Inc.
  • 16. Botnets detection and defense – Honeypot (cont.) • In theories, off-line the C&C would destroy the whole Botnet – It is the vulnerability of centralized C&C. C&C Internet .4 .1 .3 port mirror honeypot .2 R(config)#ip route 172.31.1.1 255.255.255.255 null0 • Use black-hole to block the C&C IP on the Internet – But botherder would not structure their Botnet by only one C&C » Use DNS to improvement C&C surviving. 2007/12/5 16 Copyright 2007 - Trend Micro Inc.
  • 17. Botnets detection and defense • BGP flow-spec – A new BGP NLRI • The reason to use BGP: re-use – protocol algorithms. – operational experience. – administrative processes such as inter-provider peering agreements. – Distribute traffic flow specifications and action. • Flow-spec NLRI – Type 1 – destination prefix – Type 2 – source prefix – Type 3 – IP protocol – Type 4 – port – Type 5 – destination port – Type 6 – source port – Type 7 – ICMP type – Type 8 – ICMP core 2007/12/5 17 Copyright 2007 - Trend Micro Inc.
  • 18. Botnets detection and defense • Flow-spec NLRI (cont.) – Type 9 –TCP flags – Type 10 – packet length – Type 11 – DSCP – Type 12 – fragment • Traffic filtering actions – Traffic-rate – Traffic-action » Terminal action » Sample – Redirect – Use BGP flow-spec in your network Bot client D Normal client B Normal client C Server A 2007/12/5 18 Copyright 2007 - Trend Micro Inc.
  • 19. Botnets detection and defense – Use BGP flow-spec in your network • Update BGP flow-spec route to border router – ‘SRC=D, DST=A, action=drop’ Bot client D Normal client B Normal client C Server A • Update BGP flow-spec route to peering partner – ‘SRC=D, DST=A, action=drop’ Bot client D Normal client B Normal client C Server A 2007/12/5 19 Copyright 2007 - Trend Micro Inc.
  • 20. Reference • “Botnets, THE KILLER WEB APP” – by Craig A. Schiller etc.; Syngress Publishing Inc., 2007 • The Team Cymru Darknet Project – http://www.cymru.com/Darknet/index.html • The Honeynet Project – http://www.honeynet.org/index.html • “Dissemination of flow specification rules” – draft-marques-idr-flow-spec-04.txt • “Configuring a flow route” – http://www.juniper.net/techpubs/software/junos/junos85/swconfig85- routing/id-10317421.html#id-10317421 • “Inferring Internet Denial-of-Service Activity” – by David Moore etc. • “The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets” – by Evan Cooke etc. • “How CNCERT/CC fighting to Botnets” – by Mingqi Chen.; CNCERT/CC 2007/12/5 20 Copyright 2007 - Trend Micro Inc.
  • 21. Thank You Classification 2007/12/6 2007/12/5 21 Copyright 2007 - Trend Micro Inc.