427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet131/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   127   128   129   130   131   132   133   134   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
158
Chapter 5 • Botnet Detection: Tools and Techniques
427_Botnet_05.qxd 1/9/07 9:59 AM Page 158


Products in this area range from heavy-duty, expensive network appliances
and full-scale commercial intrusion management software to open-source
packages such as Snort, which we’ll look at in some detail. Why Snort?
Because it’s a good example of open-source security software at its best, for
which documentation is widely available.There are many ways of imple-
menting IDS, but knowing a little about the internals of Snort will give you
some general understanding of the principles, using a tool that is—although
essentially signature based—also capable of some types of anomaly detection.
Not every IDS fits conveniently into the categories defined here. Many
systems are hybrid: Even Snort, which we consider later on and which falls
squarely into the NIDS-plus-signature-detection bag, can be used to imple-
ment forms of detection close to anomaly detection (we include an example
of a Snort signature that filters e-mail attachments with anomalous filename
extensions), and the distinction isn’t always realistic.There are a number of
obvious ways of looking for botnet activity at the host level:

Check executable files for known malicious code or characteristics
that suggest that the code is malicious.

Check settings such as the Windows registry for signs of malicious
code.

Check local auditing facilities for unusual activity.

Check file systems, mailboxes, and so on for signs of misuse, such as
hidden directories containing illicit material (pornographic images,
pirated applications, stolen data, and so on).

Check for signs of a bot doing what bots do best: misusing network
services.
However, assuming the competence of your system supplier and adminis-
tration, what you do is often more important than where you do it. Network
services can (and arguably should) be monitored at the host level as well as at
the gateway or from the center; defense in depth is good insurance.
Nor is the distinction between IDSes and IPSes (intrusion prevention sys-
tems) as absolute as we are often assured by market analysts. Detailed exami-
nation of IPSes isn’t really appropriate to a chapter on detection, but we’ll
enumerate a few common types:

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   127   128   129   130   131   132   133   134   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish