427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet119/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   115   116   117   118   119   120   121   122   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
146
Chapter 5 • Botnet Detection: Tools and Techniques
427_Botnet_05.qxd 1/9/07 9:59 AM Page 146


destination address,TCP or UDP source and destination ports, IP protocol
number, flags (possibly including TCP control flags like SYNs and FINS),
packet and byte counts, start- and end-of-flow timestamps, and other infor-
mation.Thus a flow represents an aggregated statistic. A flow is not a packet; it
is an aggregated statistic for many packets. Also, it does not typically include
any Layer 7 information.You cannot use flows to look for viral bit patterns in
the data payload as you can with an intrusion detection system (IDS) like
Snort.Typically applications are identified via well-known ports (as with ports
80 and 443 for network traffic). Of course, this might be wrong if the hackers
are using port 80 for an IRC command and control channel.
Typically, flows may be captured at a probe that could be a (Cisco) switch
or router.This is very convenient in the sense that you do not need an extra
piece of gear.You may simply own a system that can be used for netflow,
although you might have to purchase more hardware to make it happen. On
the other hand, a UNIX-based host might be used to do the flow collection
via a switch with a port-mirroring interface.
Flows are typically collected via some sort of sampling technique, since
collecting all the flow information can easily be beyond the CPU scope of a
router. Information is also usually collected with a certain amount of latency
because the probe has to somehow decide when a “flow” is finished. Under
some circumstances, the “finished” state is not easy to determine. (Consider a
UDP flow:TCP has control packets, so a flow can be finished at a FIN but
UDP has no control state.) Sooner or later, flows are kicked out to a col-
lecting system via UDP. When flows reach the collector, they are typically
stored on hard disk. Later they might be queried (or graphed) via various ana-
lytical tools.
Although Cisco has commercial tools, we want to mention two sets of
open-source tools that could prove useful for flow analysis. One set is the
well-known flow-tool package (found at www.splintered.net/sw/flow-tools).
Note that it has a tool called flow-dscan for looking for scanners. Another
toolset of note is Silktools from CERT, at CMU’s Software Engineering
Institute.You can find this toolset at Sourceforge (http://silktoolslsource-
forge.net). Silktools includes tools for packing flow information into a more
convenient searchable format and an analysis suite for querying the data.

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   115   116   117   118   119   120   121   122   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish