0% found this document useful (0 votes)
100 views

Bot Net

This document summarizes a presentation about botnets. It begins with an introduction that defines a botnet as a collection of internet-connected programs that communicate to perform tasks. The document then outlines the history, common uses, infection process, command structures, and communication methods of botnets. It discusses propagation techniques, detection strategies like network traffic analysis, and defensive approaches such as preventing infection, detecting attacks, and monitoring systems. The presentation concludes with a discussion of additional defensive strategies like user education and legislative policies.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views

Bot Net

This document summarizes a presentation about botnets. It begins with an introduction that defines a botnet as a collection of internet-connected programs that communicate to perform tasks. The document then outlines the history, common uses, infection process, command structures, and communication methods of botnets. It discusses propagation techniques, detection strategies like network traffic analysis, and defensive approaches such as preventing infection, detecting attacks, and monitoring systems. The presentation concludes with a discussion of additional defensive strategies like user education and legislative policies.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

BOT NET

PRESENTED BY

AUN ABBASS (1763)

ADEEL ALI SIDDIQUI (1770)

MUHAMMAD HASEEB FAROOQ KHAN (1771)

SALMAN USMANI (1795)

BSCS-31-V
AGENDA
• What is Botnet?

• History of Botnet

• What are they used for?

• How do they work?

• Infection Procedure

• Command Topologies

• Communication Methods

• Propagation Methods

• Defense

Detection Methods

Defense Strategy

• Conclusion
WHAT IS BOTNET ?

• A botnet is a collection of internet-connected


programs communicating with
other similar programs in order to perform tasks.
• A collection of compromised computers that is slowly built up then
unleashed as a DDOS attack or used to send very large quantities of spam.
HISTORY OF BOTNET

• Bots originally used to automate tasks


IRC, IM, MUDS, Online-games
• Evolved into a way to automate malicious attacks
Spam, Control PC etc…
• Botnets started with DOS against servers
Stacheldraht, Trinoo, Kelihos
WHAT ARE THEY USED FOR?

• DOS attacks
• Spam
• Phishing
• Identity Theft
• Click Fraud
• Others
HOW DO THEY WORK?

1. Botmaster infected victims with bot

Bot Master Victim

C&C Server
Bot Master Victim

2. Bot connects to the c&c


C&C Server server using HTTP, IRC or other
protocol
Bot Master Victim

3. Botmaster sends commands


through C&C server to zombie
C&C Server
Bot master

Victims
4. Repeat these process and
botmaster have bot army to Control
from a single point.

C&C Server
INFECTION PROCEDURE
COMMAND TOPOLOGIES

• Star
Bots tied to centralized C&C Server
• Multi-Server
Same as Star but with multiple C&C Server
• Hierarchical
Parent bot control child bots
• Random
Full P2P support
COMMUNICATION METHODS

• HTTP
Easy for attacker to blend in
• IRC
Harder to hide compared with HTTP
• Custom
Makes use of new applications protocols
PROPAGATION METHODS

• E-mails attachments
• Torjan Horses
• Drive-by downloads
• Scanning
Horizontal: Single port
Vertical: Single IP address
DEFENSE

• Three main issues


How to Detect them?
How to Response them?
How to Negate them?
DETECTION METHODS

• No single method
• “Defense in depth” principle
• Methods
Network traffic analysis (NetFlow)
Packet Analysis (IDS)
Analysis of application log files (Antivirus, firewall)
Honeypots
DEFENSE STRATEGY

• Defense Against Infection by Bot (DIABB)


Prevent from entering into the system
Updates and patches, security levels
• Defense Against Attack by Bot (DAABB)
Prevent from being victim of botnet attacks
IPS, TLS, SSL
• Monitoring, Detection & Studying of Bot (MDSBB)
Detection methods, monitoring log files
DEFENSE STRATEGY (CONT.)

• Education of Users (EOU)


Raise the security awareness of users
• Legislative Protection (LP)
Legislative-punishment policies
THANK YOU !

You might also like