427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet129/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   125   126   127   128   129   130   131   132   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
156
Chapter 5 • Botnet Detection: Tools and Techniques
427_Botnet_05.qxd 1/9/07 9:59 AM Page 156


traffic on local networks can be a major indication and source of data on bot
infestation within your own perimeter.
A HIDS focuses on individual systems.That doesn’t mean each host runs
its own HIDS application, of course:You would generally administer an
enterprise-class system centrally, though it might engage with agent software
on the local host. Rather, it means that the HIDS monitors activity (inappro-
priate application activity, suspicious file or service accesses) on a protected
system, or the state of the system (configuration, system file status). It can pick
up evidence of breaches that have evaded outward-facing NIDS and firewall
systems or have been introduced by other means, such as:

Attacks from peer machines on an internal network

Direct tampering from internal users

Introduction of malicious code from removable media
Anomaly detection is closely related to what in the antivirus community
is often referred to as “generic” detection—that is, measures that protect
against classes of threat rather than specific, identified threats.Tripwire,
reviewed later in this chapter, is a good example of this approach: If Tripwire
tells you that a system file has been modified, that doesn’t, in itself, tell you
what did the modifying (or even whether it was malicious), but it does give
you early warning that you might have been hit by something malicious.
Another example is an e-mail filter that blocks all executable attachments.
In IDS, the intention is to develop a baseline view of what constitutes
“normal” behavior or activity in that environment. Often, that baseline will
develop over time.This enables the administrator to:

Develop a greater understanding of how activity varies over the long
haul.

Accommodate changes in the “threatscape,” since older exploits
decline in impact and as newer exploits and techniques come along.
Once you’ve established a baseline, activity that deviates from that norm is
flagged as potentially malicious—spikes in traffic from or to particular IPs or
the unusually heavy use of particular services, for example. In the particular
context of botnet detection, you might be particularly wary of traffic that

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   125   126   127   128   129   130   131   132   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish