2
Most read
16
Most read
23
Most read
BotNet Detection Techniques
By
Team Firefly
Technical Support For System Errors
And Security Issues

Cyber Security Awareness Program

On Friday, October 18, 2013
Outline
 Introduction to Botnet
 Botnet Life-cycle
 Botnet in Network Security
 Botnet Uses
 Botnet Detection
 Preventing Botnet Infection
 Botnet Research
 Conclusion
 References
Page  2
Introduction to Botnet
A Botnet is a network of compromised
computers under the control of a remote attacker.
 Botnet Terminology
 Bot Herder (Bot Master)
 Bot
 Bot Client
 IRC Server
 Command and Control Channel (C&C)
Page  3
Introduction to Botnet (Terminology)
IRC Server
IRC Channel

Code Server

Bot Master
IRC Channel
C&C Traffic

Updates

Attack

Victim
Page  4

Bots
Botnet Life-cycle

Page  5
Botnet Life-cycle

Page  6
Botnet Life-cycle

Page  7
Botnet Life-cycle

Page  8
Botnet In Network Security
 Internet users are getting infected by bots
 Many times corporate and end users are trapped in botnet attacks
 Today 16-25% of the computers connected to the internet are
members of a botnet
 In this network bots are located in various locations
 It will become difficult to track illegal activities
 This behavior makes botnet an attractive tool for intruders and
increase threat against network security

Page  9
Botnet is Used For

Page  10

Bot Master
How Botnet is Used?
 Distributed Denial of Service (DDoS) attacks
 Sending Spams
 Phishing (fake websites)
 Addware (Trojan horse)
 Spyware (keylogging, information harvesting)
 Click Fraud
So It is really Important to Detect this attack
Page  11
Botnet Detection
Two approaches for botnet detection based on
 Setting up honeynets
 Passive traffic monitoring
 Signature based
 Anomaly based
 DNS based
 Mining based
Page  12
Botnet Detection: Setting up Honeynets
Windows Honeypot

 Honeywall Responsibilities:
DNS/IP-address of IRC server and port number
(optional) password to connect to IRC-server
Nickname of bot
Channel to join and (optional) channel-password

Page  13
Botnet Detection: Setting up Honeynets
Bot

Sensor
1. Malicious Traffic

3. Authorize

Page  14

2. Inform bot’s IP

Bot Master
Botnet Detection: Traffic Monitoring
 Signature based: Detection of known botnets
 Anomaly based: Detect botnet using following
anomalies
• High network latency
• High volume of traffic
• Traffic on unusual port
• Unusual system behaviour

 DNS based: Analysis of DNS traffic generated by
botnets
Page  15
Botnet Detection: Traffic Monitoring
 Mining based:
• Botnet C&C traffic is difficult to detect
• Anomaly based techniques are not useful
• Data Mining techniques – Classification, Clustering

Page  16
Botnet Detection
 Determining the source of a botnet-based attack is challenging:
 Traditional approach:
 Every zombie host is an attacker
 Botnets can exist in a benign state for an arbitrary amount of
time before they are used for a specific attack
 New trend:
 P2P networks

Page  17
Preventing Botnet Infections
 Use a Firewall
 Patch regularly and promptly
 Use Antivirus (AV) software
 Deploy an Intrusion Prevention System (IPS)
 Implement application-level content filtering
 Define a Security Policy and
 Share Policies with your users systematically
Page  18
Botnet Research
 Logging onto herder IRC server to get info
 Passive monitoring
Either listening between infected machine and
herder or spoofing infected PC
 Active monitoring: Poking around in the IRC server
 Sniffing traffic between bot & control channel

Page  19
Botnet Research: Monitoring Attacker

Infected

Hi!

IRC

Researcher

Page  20

Herder
Conclusion
 Botnets pose a significant and growing threat against cyber
security
 It provides key platform for many cyber crimes (DDOS)
 As network security has become integral part of our life and
botnets have become the most serious threat to it
 It is very important to detect botnet attack and find the solution
for it
Page  21
References
B. Saha and A, Gairola, “Botnet: An overview,” CERT-In White PaperCIWP-2005-05, 2005
 Peer to Peer Botnet detection for cyber-security: A data mining approach - ACM Portal
Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham
 A Survey of Botnet and Botnet Detection Feily, M.; Shahrestani, A.; Ramadass, S.;
Emerging Security Information, Systems and Technologies, 2009. SECURWARE '09. Third
International Conference on Digital Object Publication Year: 2009 , Page(s): 268 – 273 IEEE
CONFERENCES
 Honeynet-based Botnet Scan Traffic Analysis Zhichun Li, Anup Goyal, and Yan Chen
Northwestern University, Evanston, IL 60208
 Detecting Botnets Using Command and Control Traffic AsSadhan, B.; Moura, J.M.F.;
Lapsley, D.; Jones, C.; Strayer, W.T.; Network Computing and Applications, 2009. NCA
2009. Eighth IEEE International Symposium. Publication Year: 2009 , Page(s): 156 – 162
IEEE CONFERENCES
 Spamming botnets: signatures and characteristics Yinglian Xie, Fang Yu

Page  22
Page  23
Page  24

More Related Content

PPTX
Botnet Detection in Online-social Network
PPTX
K-Folds Cross Validation Method
PPTX
Energy saving
PPTX
Introducing CSS Grid
PPT
Machine Learning
PPT
One Sample T Test
PPTX
Basics of statistics
PPTX
Saving energy
Botnet Detection in Online-social Network
K-Folds Cross Validation Method
Energy saving
Introducing CSS Grid
Machine Learning
One Sample T Test
Basics of statistics
Saving energy

What's hot (20)

PPTX
PPTX
PDF
BOTNET
PPTX
Botnets
PPTX
Botnets 101
PPT
BotNet Attacks
PPTX
Ethical hacking presentation
PPT
Honeypot Basics
PPT
DDOS Attack
PPTX
Botnets In Cyber Security
PPTX
Honeypot ppt1
PPTX
Honeypots
PPTX
Cyber Terrorism
PPTX
Intrusion detection system
PPTX
Basics of Denial of Service Attacks
PPTX
PPTX
DDoS - Distributed Denial of Service
PPTX
Denial of Service Attacks (DoS/DDoS)
PPTX
Chapter 1_Cyber Security.pptx
PPTX
PPT on Phishing
BOTNET
Botnets
Botnets 101
BotNet Attacks
Ethical hacking presentation
Honeypot Basics
DDOS Attack
Botnets In Cyber Security
Honeypot ppt1
Honeypots
Cyber Terrorism
Intrusion detection system
Basics of Denial of Service Attacks
DDoS - Distributed Denial of Service
Denial of Service Attacks (DoS/DDoS)
Chapter 1_Cyber Security.pptx
PPT on Phishing
Ad

Viewers also liked (18)

PDF
What is botnet?
PPTX
Botnet Architecture
PPTX
Botnets presentation
PPTX
Simplify PCI DSS Compliance with AlienVault USM
PPTX
Malware Detection Using Machine Learning Techniques
PPTX
Cybercrime.ppt
PPTX
Cyber-crime PPT
PPTX
Cyber security
PPTX
introduction to Botnet
PDF
CMS Hacking 101
PPTX
A Cognitive Approach for Botnet Detection in the Cloud Using Artificial Immun...
PPSX
Botnets - Apresentação
PPTX
Franchise Master
PPTX
Fraud in digital advertising botnet baseline summery ziv ginsberg
PPTX
Man in-the-middle attack(http)
PDF
Machine-learning Approaches for P2P Botnet Detection using Signal-processing...
What is botnet?
Botnet Architecture
Botnets presentation
Simplify PCI DSS Compliance with AlienVault USM
Malware Detection Using Machine Learning Techniques
Cybercrime.ppt
Cyber-crime PPT
Cyber security
introduction to Botnet
CMS Hacking 101
A Cognitive Approach for Botnet Detection in the Cloud Using Artificial Immun...
Botnets - Apresentação
Franchise Master
Fraud in digital advertising botnet baseline summery ziv ginsberg
Man in-the-middle attack(http)
Machine-learning Approaches for P2P Botnet Detection using Signal-processing...
Ad

Similar to Botnet Detection Techniques (20)

PPT
Botnet
PPTX
Botnet and its Detection Techniques
PDF
A Survey of Botnet Detection Techniques
PDF
Literature survey on peer to peer botnets
PDF
Understanding the Botnet Phenomenon
PDF
Botnet detection by Imitation method
PDF
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
PPTX
Synopsis viva presentation
DOCX
All you know about Botnet
PDF
How To Protect Your Website From Bot Attacks
PDF
A Dynamic Botnet Detection Model based on Behavior Analysis
PDF
Detection of Botnets using Honeypots and P2P Botnets
PPTX
PPTX
Bots and Botnet
PDF
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
PDF
L017326972
PPTX
Mcs2453 aniq mc101053-assignment1
PPTX
unit cyber security BOTNETS Documents.pptx
PDF
Tracing Back The Botmaster
PDF
Guarding Against Large-Scale Scrabble In Social Network
Botnet
Botnet and its Detection Techniques
A Survey of Botnet Detection Techniques
Literature survey on peer to peer botnets
Understanding the Botnet Phenomenon
Botnet detection by Imitation method
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
Synopsis viva presentation
All you know about Botnet
How To Protect Your Website From Bot Attacks
A Dynamic Botnet Detection Model based on Behavior Analysis
Detection of Botnets using Honeypots and P2P Botnets
Bots and Botnet
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
L017326972
Mcs2453 aniq mc101053-assignment1
unit cyber security BOTNETS Documents.pptx
Tracing Back The Botmaster
Guarding Against Large-Scale Scrabble In Social Network

Recently uploaded (20)

PDF
Journal of Dental Science - UDMY (2020).pdf
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PPTX
MICROPARA INTRODUCTION XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
Literature_Review_methods_ BRACU_MKT426 course material
PPTX
Climate Change and Its Global Impact.pptx
PPTX
Education and Perspectives of Education.pptx
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PPTX
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
CRP102_SAGALASSOS_Final_Projects_2025.pdf
PDF
English Textual Question & Ans (12th Class).pdf
PPTX
INSTRUMENT AND INSTRUMENTATION PRESENTATION
PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Journal of Dental Science - UDMY (2020).pdf
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
Journal of Dental Science - UDMY (2021).pdf
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
MICROPARA INTRODUCTION XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Race Reva University – Shaping Future Leaders in Artificial Intelligence
FORM 1 BIOLOGY MIND MAPS and their schemes
Literature_Review_methods_ BRACU_MKT426 course material
Climate Change and Its Global Impact.pptx
Education and Perspectives of Education.pptx
Core Concepts of Personalized Learning and Virtual Learning Environments
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
CRP102_SAGALASSOS_Final_Projects_2025.pdf
English Textual Question & Ans (12th Class).pdf
INSTRUMENT AND INSTRUMENTATION PRESENTATION
What’s under the hood: Parsing standardized learning content for AI
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf

Botnet Detection Techniques

  • 1. BotNet Detection Techniques By Team Firefly Technical Support For System Errors And Security Issues Cyber Security Awareness Program On Friday, October 18, 2013
  • 2. Outline  Introduction to Botnet  Botnet Life-cycle  Botnet in Network Security  Botnet Uses  Botnet Detection  Preventing Botnet Infection  Botnet Research  Conclusion  References Page  2
  • 3. Introduction to Botnet A Botnet is a network of compromised computers under the control of a remote attacker.  Botnet Terminology  Bot Herder (Bot Master)  Bot  Bot Client  IRC Server  Command and Control Channel (C&C) Page  3
  • 4. Introduction to Botnet (Terminology) IRC Server IRC Channel Code Server Bot Master IRC Channel C&C Traffic Updates Attack Victim Page  4 Bots
  • 9. Botnet In Network Security  Internet users are getting infected by bots  Many times corporate and end users are trapped in botnet attacks  Today 16-25% of the computers connected to the internet are members of a botnet  In this network bots are located in various locations  It will become difficult to track illegal activities  This behavior makes botnet an attractive tool for intruders and increase threat against network security Page  9
  • 10. Botnet is Used For Page  10 Bot Master
  • 11. How Botnet is Used?  Distributed Denial of Service (DDoS) attacks  Sending Spams  Phishing (fake websites)  Addware (Trojan horse)  Spyware (keylogging, information harvesting)  Click Fraud So It is really Important to Detect this attack Page  11
  • 12. Botnet Detection Two approaches for botnet detection based on  Setting up honeynets  Passive traffic monitoring  Signature based  Anomaly based  DNS based  Mining based Page  12
  • 13. Botnet Detection: Setting up Honeynets Windows Honeypot  Honeywall Responsibilities: DNS/IP-address of IRC server and port number (optional) password to connect to IRC-server Nickname of bot Channel to join and (optional) channel-password Page  13
  • 14. Botnet Detection: Setting up Honeynets Bot Sensor 1. Malicious Traffic 3. Authorize Page  14 2. Inform bot’s IP Bot Master
  • 15. Botnet Detection: Traffic Monitoring  Signature based: Detection of known botnets  Anomaly based: Detect botnet using following anomalies • High network latency • High volume of traffic • Traffic on unusual port • Unusual system behaviour  DNS based: Analysis of DNS traffic generated by botnets Page  15
  • 16. Botnet Detection: Traffic Monitoring  Mining based: • Botnet C&C traffic is difficult to detect • Anomaly based techniques are not useful • Data Mining techniques – Classification, Clustering Page  16
  • 17. Botnet Detection  Determining the source of a botnet-based attack is challenging:  Traditional approach:  Every zombie host is an attacker  Botnets can exist in a benign state for an arbitrary amount of time before they are used for a specific attack  New trend:  P2P networks Page  17
  • 18. Preventing Botnet Infections  Use a Firewall  Patch regularly and promptly  Use Antivirus (AV) software  Deploy an Intrusion Prevention System (IPS)  Implement application-level content filtering  Define a Security Policy and  Share Policies with your users systematically Page  18
  • 19. Botnet Research  Logging onto herder IRC server to get info  Passive monitoring Either listening between infected machine and herder or spoofing infected PC  Active monitoring: Poking around in the IRC server  Sniffing traffic between bot & control channel Page  19
  • 20. Botnet Research: Monitoring Attacker Infected Hi! IRC Researcher Page  20 Herder
  • 21. Conclusion  Botnets pose a significant and growing threat against cyber security  It provides key platform for many cyber crimes (DDOS)  As network security has become integral part of our life and botnets have become the most serious threat to it  It is very important to detect botnet attack and find the solution for it Page  21
  • 22. References B. Saha and A, Gairola, “Botnet: An overview,” CERT-In White PaperCIWP-2005-05, 2005  Peer to Peer Botnet detection for cyber-security: A data mining approach - ACM Portal Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham  A Survey of Botnet and Botnet Detection Feily, M.; Shahrestani, A.; Ramadass, S.; Emerging Security Information, Systems and Technologies, 2009. SECURWARE '09. Third International Conference on Digital Object Publication Year: 2009 , Page(s): 268 – 273 IEEE CONFERENCES  Honeynet-based Botnet Scan Traffic Analysis Zhichun Li, Anup Goyal, and Yan Chen Northwestern University, Evanston, IL 60208  Detecting Botnets Using Command and Control Traffic AsSadhan, B.; Moura, J.M.F.; Lapsley, D.; Jones, C.; Strayer, W.T.; Network Computing and Applications, 2009. NCA 2009. Eighth IEEE International Symposium. Publication Year: 2009 , Page(s): 156 – 162 IEEE CONFERENCES  Spamming botnets: signatures and characteristics Yinglian Xie, Fang Yu Page  22

Editor's Notes