427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet171/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   167   168   169   170   171   172   173   174   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
210
Chapter 5 • Botnet Detection: Tools and Techniques
427_Botnet_05.qxd 1/9/07 9:59 AM Page 210


detect known malware with a very high degree of accuracy and can
cope with a surprisingly high percentage of unknown malware, using
heuristic analysis.
However, bots are capable of not only sophisticated evasion
techniques but present dissemination-related difficulties that aren’t
susceptible to straightforward technical solutions at the code analysis
level.
There is a place for open-source antivirus as a supplement to
commercial solutions, but it’s not a direct replacement; it can’t cover
the same range of threats (especially older threats), even without
considering support issues.
Snort is a signature-based NIDS with a sophisticated approach to rule
sets, in addition to its capabilities as a packet sniffer and logger.
As well as writing your own Snort signatures, you can tap into a rich
vein of signatures published by a huge group of Snort enthusiasts in
the security community.
The flexibility of the signature facility is illustrated by four example
signatures, one of which could almost be described as adding a
degree of anomaly detection to the rule set.
Tripwire is an integrity management tool that uses a database of file
signatures (message digests or checksums, not attack signatures) to
detect suspicious changes to files.
The database can be kept more secure by keeping it on read-only
media and using MD5 or snefru message digests.
The open-source version of Tripwire is limited in the platforms it
covers. If the devices you want to protect are all POSIX compliant
and you’re not bothered about value-adds like support and
enterprise-level management, and if you’re happy to do some DIY, it
might do very well.
Ken Thompson’s “Reflections on Trusting Trust” makes the point that
you can’t have absolute trust in any code you didn’t build from
scratch yourself, including your compiler.This represents a weakness

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   167   168   169   170   171   172   173   174   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish