Bot Net
Bot Net
PRESENTED BY
BSCS-31-V
AGENDA
• What is Botnet?
• History of Botnet
• Infection Procedure
• Command Topologies
• Communication Methods
• Propagation Methods
• Defense
Detection Methods
Defense Strategy
• Conclusion
WHAT IS BOTNET ?
• DOS attacks
• Spam
• Phishing
• Identity Theft
• Click Fraud
• Others
HOW DO THEY WORK?
C&C Server
Bot Master Victim
Victims
4. Repeat these process and
botmaster have bot army to Control
from a single point.
C&C Server
INFECTION PROCEDURE
COMMAND TOPOLOGIES
• Star
Bots tied to centralized C&C Server
• Multi-Server
Same as Star but with multiple C&C Server
• Hierarchical
Parent bot control child bots
• Random
Full P2P support
COMMUNICATION METHODS
• HTTP
Easy for attacker to blend in
• IRC
Harder to hide compared with HTTP
• Custom
Makes use of new applications protocols
PROPAGATION METHODS
• E-mails attachments
• Torjan Horses
• Drive-by downloads
• Scanning
Horizontal: Single port
Vertical: Single IP address
DEFENSE
• No single method
• “Defense in depth” principle
• Methods
Network traffic analysis (NetFlow)
Packet Analysis (IDS)
Analysis of application log files (Antivirus, firewall)
Honeypots
DEFENSE STRATEGY