427 Botnet fm qxd


Ourmon—Overview and Installation



Download 6,98 Mb.
Pdf ko'rish
bet177/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   173   174   175   176   177   178   179   180   ...   387
Bog'liq
Botnets - The killer web applications

Ourmon—Overview and Installation
In this chapter we intro-
duce ourmon and explain how it works and how to install it. We also
introduce our case histories, which we look at in this chapter and in
subsequent chapters.

Ourmon—Anomaly Detection Tools—including the TCP
report, UDP report, and e-mail reports
. We look first at
ourmon’s user interface (GUI) so that we can find our tools.Then
we look at the low-level anomaly detection arsenal for detecting fun-
damental attacks of various sorts including scanning, DoS, and mass
quantities of spam.
www.syngress.com
218
Chapter 6 • Ourmon: Overview and Installation
427_Botnet_06.qxd 1/8/07 3:14 PM Page 218



Ourmon and 
Botnet Detection
Here we look at both botnet
client mesh and on-campus server mesh (C&C) detection. Ourmon
collects IRC information with its IRC module and uses the TCP
report in particular to attempt to figure out if an IRC channel is
actually a botnet.

Advanced Ourmon Techniques
In this chapter we look at how
we can use ourmon to get more information about attackers
including analyzing log data, using ourmon’s event-driven automated
tcpdump feature. We will also talk about how to make ourmon more
efficient in order to resist DDoS attacks.
So the basic plan is to first look at four botnet-related case histories, and
then discuss how ourmon works and how to install it.Then we proceed to
the next chapter to look at the fundamental anomaly-based tools, which do
not rely on IRC but simply look for “strange things” using statistics. Once we
understand the anomaly-based tools we can take a look at the higher-level
IRC-based statistics that can reveal botnets. Finally, we will take a look at
some advanced data-mining tools and techniques that can help you differen-
tiate borderline cases where, for example, it may not be clear that a given
IRC host is due to malware, an IRC game, or possibly even a hacked host
with an IRC channel used by a group of hackers for discussion or warez 
distribution.

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   173   174   175   176   177   178   179   180   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish