427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet169/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   165   166   167   168   169   170   171   172   ...   387
Bog'liq
Botnets - The killer web applications

Solutions Fast Track
Abuse
An abuse e-mail list can help you learn about malware at your own
site.
The global registry WHOIS mechanism can help you learn who to
contact at other sites.
Spam from your site can cause your site to be blacklisted.
Be wary of open proxies in general, and note that they can be the
side effect of a malware infection.
www.syngress.com
208
Chapter 5 • Botnet Detection: Tools and Techniques
427_Botnet_05.qxd 1/9/07 9:59 AM Page 208


Network Infrastructure:Tools and Techniques
Switches can have port-mirroring features to allow you to send
packets to a sniffer.
A hub can be a “low-rez” solution if you want to do sniffing when
packet counts are low.
Tcpdump and Wireshark are open-source sniffers.
If you find a bot client with a sniffer, remember to also watch any
suspicious external hosts talking to the bot client. Such a host could
be a bot server, and you might see it connecting to other local hosts.
SNMP using RRDTOOL graphics can be very useful for seeing
DoS attacks via graphics.
SNMP on all switch ports could help you trace down an interior
DoS attack through a switch hierarchy, especially if a fake IP source
address is being used or other monitoring gear has been knocked
offline due to the DoS attack.
Netflow tools include open-source tools like flow-tools and Silktools.
Netflow data is more compact than packets and can give you a log of
recent network activity.
Stored netflow data can be useful for searching when you have an
explicit search target such as a suspicious IP address.
Netflow can be used to see DoS attacks and scanning as well as more
conventional traffic monitoring.
Firewall ACLs can alert you to hosts on the inside that have been
hacked via their logs.
Firewalls should block port 25 for hosts using DHCP.Those hosts
should send e-mail to a local mail server (which could filter the e-
mail for viruses).This helps reduce the incidents of malware sending
spam outward from the enterprise.
Firewalls should minimally block Microsoft File Share ports such as
135-139 and 445 as well as SQL ports 1433 and 1434.

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   165   166   167   168   169   170   171   172   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish