- 1、本文档共23页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Botnets, detection and mitigation DNS-based techniques:僵尸网络的基础技术,检测和缓解DNS
Botnets, detection and mitigation:DNS-based techniques What is a botnet? An army of compromised hosts (bots) Under a common command and control (cc): commonly IRC-based The purpose: DoS, id theft, spam for fun and profit Typical command and control cc functions mostly centralized one or more IRC servers DNS name(s) used for rendezvous vanity web pages for malware updates Nothing really new CERTs October 2001 Trends in DoS paper Whats wrong with this picture? Welcome to Your host is h4x0r.0wnz.j00 There are 9556 users and 9542 invisible on 1 server 5 :channels formed 1 :operators online Channel Users Topic #help 1 #oldb0ts 5 .download /r00t.exe End of /LIST Botnet info is everywhere /papers/bots/ http://cert.uni-stuttgart.de/files/tf/botnets.pdf /ir/library/pdf/SPC0568.pdf /presentations/jtsaltlake/Botnets-Moody.pdf /mtg-0410/kristoff.html Some typical detection strategies Up-to-date anti-virus software IDS signatures for IRC/botnet traffic Traffic flow monitoring (for known CCs?) email alerts To: security@ Subject: Bot detected on your network Some typical mitigation strategies TCP port 6667 filtering CC IP address ( port?) filtering Intrusion prevention systems (IDS++) Secure systems and applications Careful and smart users What about DNS traffic? Repetitive A queries may indicate bot/controller MX queries may indicate spam bot queries may indicate a server Usually 3 level hostname.subdomain.TLD [^(www|mx\d+|ns\d+)]\w+\.\w+\.\w+ Names and subdomains that just look rogue Something .edus cant be blamed for! :-) Note: synchronization problem If name doesnt resolve, but controller is up connected bots instructed to update DNS If controller(s) is(are) gone, but name resolves DNS changed to point to new controller(s) Synchronizing the closure of both is difficult Name-based sink holes with BIND zone { type master; file /etc/db.badname; }; $TTL 30D @ IN SOA . root ( 2004101700 3H 15M 1W 1D ) IN NS . I
您可能关注的文档
- Abdominal Wall Hernia - School of Medicine:腹壁疝-医学.ppt
- Abnormal Sodiumppt - medStation:异常sodiumppt - medstation.ppt
- Abolition of User Fees in Health Service Delivery在卫生服务使用费的取消.ppt
- AAPG Map Publication Standards由地图出版的标准.ppt
- Abstinence Incentive Effects in Psychosocial Counseling Patients 在心理咨询患者禁欲的激励效应.ppt
- ABSTRACT - Anadolu üniversitesi摘要:该üniversitesi.ppt
- ABSTRACT - California State University, Northridge摘要:加利福尼亚州立大学北岭,.ppt
- ABSTRACT - American Thoracic Society摘要:美国胸科协会.ppt
- Abstract - Eagle摘要:鹰.ppt
- Abstract - EAST摘要东.ppt
文档评论(0)