427 Botnet fm qxd


Darknets, Honeypots, and Other Snares



Download 6,98 Mb.
Pdf ko'rish
bet149/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   145   146   147   148   149   150   151   152   ...   387
Bog'liq
Botnets - The killer web applications

Darknets, Honeypots, and Other Snares
Where do you detect bots and botnets? Anywhere you can. Enterprises will
be most concerned to detect them locally, but a finely tuned IDS will pick up
information of interest to the rest of the world, and some networks are set up
specifically for that purpose.
www.syngress.com
176
Chapter 5 • Botnet Detection: Tools and Techniques
427_Botnet_05.qxd 1/9/07 9:59 AM Page 176


The term 
darknet
is often encountered in the context of private file-sharing
networks (http://en.wikipedia.org/wiki/Darknet), consisting of virtual net-
works used to connect users only to other trusted individuals. However, the
term has been extended in the security sphere to apply to IP address space that
is routed but which no active hosts and therefore no legitimate traffic.
You might also hear the terms 
network telescope
(www.caida.org) or 
black
hole
(because traffic that finds its way in there doesn’t get a response but
simply disappears).The maintainers of such a facility will start from the
assumption that any traffic they do pick up must be either misconfiguration
or something more sinister. Properly analyzed and interpreted, darknet traffic
is a source of valuable data on a variety of attacks (backscatter from spoofed
addresses, DoS flooding) and widely used to track botnets and worm activity.
Malicious software on the lookout for vulnerable systems can generate a great
deal of source material for flow collection, sniffers, and IDSes, without gener-
ating the volume of false positives associated with some IDS measures.
As defined by the Cymru Darknet project (www.cymru.com/Darknet/), a
darknet does, in fact, contain at least one “packet vacuum” server to “Hoover
up” inbound flows and packets without actively responding and thus revealing
its presence.
Darknets can be used as local early warning systems for organizations with
the network and technical capacity to do so, but they are even more useful as
a global resource for sites and groups working against botnets on an Internet-
wide basis.
Internet Motion Sensor (IMS) uses a large network of distributed sensors
to detect and track a variety of attempted attacks, including worms and other
malware, DoS and DDoS attacks, and network probes. Like other darknets,
IMS uses globally routable unused address space but uses proprietary transport
layer service emulation techniques to attract payload data (http://ims.eecs.
umich.edu/).
IMS was designed to meet objectives that tell us quite a lot about what is
needed from any darknet in the botnet mitigation process (http://ims.eecs.
umich.edu/architecture.html):

It needs to differentiate traffic on the same service. It needs some
capability for distinguishing between (rare, in this instance) legitimate

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   145   146   147   148   149   150   151   152   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish