427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet151/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   147   148   149   150   151   152   153   154   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
178
Chapter 5 • Botnet Detection: Tools and Techniques
427_Botnet_05.qxd 1/9/07 9:59 AM Page 178


An excellent resource for honeynet information (and other security 
literature) is the collection of “Know Your Enemy” papers at http://project.
honeynet.org/papers/kye.html.
T
IP
Honeypots feed a number of major information resources:
The Shadowserver Foundation (www.shadowserver.org) has a
range of information collected from “the dark side of the Internet.” 
Research and Education Networking Information Sharing and
Analysis Center (REN-ISAC) supports organizations connected to
higher education and research networks (www.ren-isac.net). 
Spamhaus Project (www.spamhaus.org) is an awesome spam-killing
resource. Distributed Intrusion Detection System (www.dshield.org) is
the data collection facility that feeds the SANS Internet Storm Center.
At www.bleedingthreats.net/fwrules/bleeding-edge-Block-IPs.txt,
there is a list of raw IP addresses for botnet C&Cs (collected by shad-
owserver), spamhaus DROP nets, and the Dshield top attacker
addresses. 
Forensics Techniques 
and Tools for Botnet Detection
Forensics aren’t exactly what they used to be. Originally the adjective 
forensic
was applied to processes relating to the application of scientific methodology
for presentation to a court of law or for judicial review. Strictly, the field of
computer forensics
applies to the recovery of evidence from digital media and is,
along with network forensics, a branch of digital forensics. However, in recent
years the term has been somewhat divorced from the concept of judicial
review.The First Digital Forensic Research Workshop has defined 
digital foren-
sics
as the “use of scientifically derived and proven methods toward the preser-
vation, collection, validation, identification, analysis, interpretation, and
documentation of digital evidence derived from digital sources for the pur-
pose of facilitating or furthering the reconstruction of events found to be
criminal, or helping to anticipate unauthorized actions shown to be disruptive
to planned operations” (Robert Slade,
Dictionary of Information Security
,

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   147   148   149   150   151   152   153   154   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish