427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet133/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   129   130   131   132   133   134   135   136   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
160
Chapter 5 • Botnet Detection: Tools and Techniques
427_Botnet_05.qxd 1/9/07 9:59 AM Page 160



Corrective controls (measures to reduce the likelihood of a recur-
rence of a given breach)

Recovery controls (measures to restore systems to normal operation)
You can see from this list that detection is only part of the management
process. In fact, when we talk about detection as in “virus detection,” we’re
often using the term as shorthand for an approach that covers more than one
of these controls. Here we consider antivirus as a special case of a HIDS, but
it doesn’t have to be (and, in enterprise terms, it shouldn’t be) restricted to a
single layer of the “onion.”The antivirus industry might not have invented
defense in depth or multilayering, but it was one of the first kids on the block
(Fred Cohen:
A Short Course on Computer Viruses,
Wiley). In a well-protected
enterprise, antivirus sits on the desktop, on laptops, on LAN servers, on appli-
cation servers, on mail servers, and so on. It’s likely to embrace real-time (on-
access) scanning at several of those levels, as well as or instead of on-demand
(scheduled or user-initiated) scanning. It might include some measure of
generic filtering (especially in e-mail and/or Web traffic) and should certainly
include some measure of heuristic analysis as well as pure virus-specific detec-
tion (see the following discussion).
Nowadays full-strength commercial antivirus software for the enterprise
normally includes console facilities for central management, reporting, and
logging as well as staged distribution of virus definitions (“signatures”).
Properly configured, these facilities increase your chances of getting an early
warning of malicious activity, such as a botnet beginning to take hold on your
systems. Look out for anomalies such as malicious files quarantined because
they could not be deleted or files quarantined because of suspicious character-
istics. Many products include a facility for sending code samples back to the
vendor for further analysis. And, of course, antivirus products can be inte-
grated with other security products and services, which can give you a better
overview of a developing security problem.
Antivirus is often seen as the Cinderella of the security industry,
addressing a declining proportion of malware with decreasing effectiveness
and tied to a subscription model that preserves the vendor’s revenue stream
without offering protection against anything but known viruses. What role
can it possibly have in the mitigation of bot activity? Quite a big role, in fact,

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   129   130   131   132   133   134   135   136   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish