427 Botnet fm qxd


Techniques ■ Intrusion Detection



Download 6,98 Mb.
Pdf ko'rish
bet109/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   105   106   107   108   109   110   111   112   ...   387
Bog'liq
Botnets - The killer web applications

Techniques

Intrusion Detection

Darknets, Honeypots, and Other Snares

Forensics Techniques and Tools for Botnet
Detection
Chapter 5
133
Summary
Solutions Fast Track
Frequently Asked Questions
427_Botnet_05.qxd 1/9/07 9:59 AM Page 133


Introduction
In this chapter we look at tools and techniques commonly used for botnet
detection. By definition, this is a big subject, and we only touch lightly on
some ideas and tools. For example, the popular open-source Snort intrusion
detection system is mentioned, but Snort is a very complex package, and we
can’t do it justice in a few pages. In addition to skimming over some tools, we
mention a few techniques that are commonly used either to prevent malware
such as botnets in the first place or help in detection, prevention, or post-
attack cleanup.
First we’ll discuss abuse reporting, because it could turn out that your
enterprise simply receives e-mail to tell you that you seem to have a botnet
client on your premises. (Of course, it’s better if you are proactive and try to
control your network in the first place.) Then we will talk about common
network-monitoring tools, including sniffers, and other network monitoring
tools as well as confinement techniques, including firewalls and broadcast
domain management. We will touch on common intrusion detection systems,
including virus checkers and the Snort IDS system. We also mention the role
darknets, honeypots, and honeynets have to play. Last we touch on host foren-
sics. One thread through all this discussion to which we should draw your
attention is the important part that logging and log analysis play at both the
network and host levels. For example, firewall, router, and host logs (including
server logs) could all show attacks. We cannot do the subject of log analysis
justice, but we can and will at least give a few pointers on how to use them.
Abuse 
One possible way to learn about botnets in your enterprise is if someone sends
you e-mail to tell you about it. We typically refer to this as 
abuse e-mail.
The
basic idea is that someone out there on the Internet has decided to complain
about something they think is wrong related to your site.This might include
spam (from botnet clients), scanning activity (botnet clients at work), DoS
attacks, phishing, harassment, or other forms of perceived “abuse.”The conven-
tion is that you have administrative contacts of some form listed at global
regional information registry sites such as ARIN, APNIC, LAPNIC, or RIPE

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   105   106   107   108   109   110   111   112   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish