PRESENTATION
ON
CYBER SECURITY
TERMS
Suryaprakash Nehra
1130606
OUTLINE
Introduction to Cyber Security
Botnet
Watering Hole attack
Spear Phishing attacK
Distributed Denial of Service(DDoS)
Conclusion
BOTNET
 A Botnet is a network of compromised computers
under the control of a remote attacker
 controller of a botnet is able to direct the activities of
these compromised computers
 Botnet Terminology
 Bot Herder (Bot Master)
 Bot
 Bot Client
 IRC Server
 Command and Control Channel (C&C)
INTRODUCTION TO BOTNET(TERMINOLOGY)
IRC Channel
IRC Server
Code Server
IRC Channel
C&C Traffic
Updates
Victim
Attack
Bot Master
BOTNET IN NETWORK SECURITY
 Internet users are getting infected by bots
 Many times corporate and end users are trapped in
botnet attacks
 Today 16-25% of the computers connected to the
internet are members of a botnet
 In this network bots are located in various locations
 It will become difficult to track illegal activities
 This behavior makes botnet an attractive tool for
intruders and increase threat against network
security
HOW BOTNET IS USED??
Distributed Denial of Service (DDoS) attacks
 Sending Spams
 Phishing
 Addware
 Spyware
 Click Fraud
BOTNET DETECTION
Two approaches for botnet detection based on
 Setting up honeynets
 Passive traffic monitoring
 Signature based
 Anomaly based
 DNS based
BOTNET DETECTION:SETTING UP HONEYNETS
Windows Honey pot
 Honeywall Responsibilities:
DNS/IP-address of IRC server and port number
(optional) password to connect to IRC-server
Nickname of bot
Channel to join and (optional) channel-password
BOTNET DETECTION:SETTING UP HONEYNETS
Bot
1. Malicious Traffic
Sensor
3. Authorize
2. Inform bot’s IP
Bot Master
BOTNET DETECTION:TRAFFIC MONITORING
Signature based: Detection of known botnets
 Anomaly based: Detect botnet using following
anomalies
 High network latency
 High volume of traffic
 Traffic on unusual port
 Unusual system behaviour
 DNS based: Analysis of DNS traffic generated
by botnets
BOTNET DETECTION
 Determining the source of a botnet-based attack is
challenging:
 Traditional approach:
Every zombie host is an attacker
Botnets can exist in a benign state for an
arbitrary amount of time before they are used
for a specific attack
 New trend:
P2P networks
PREVENTING BOTNET INFECTIONS
Use a Firewall
 Use Antivirus (AV) software
 Deploy an Intrusion Prevention System (IPS)
 Define a Security Policy and
 Share Policies with your users systematically
WATERING HOLE ATTACK
• Watering Hole is a computer attack strategy identified in 2012 by RSA
Security, in which the victim is a particular group (organization,
industry, or region). In this attack, the attacker guesses or observes
which websites the group often uses and Infects one or more of them
with malware.
• How does it work ?
 Determine Target Group
 Identify Vulnerabilities on those Websites
 Inject Threat into Website
 Sit in the Tall Grass and Wait for Targets to Come to You
Why it is effective ??
PREVENT WATERING HOLE ATTACK
• Timely Software Update
• Vulnerability shielding
• Network traffic detection
• Correlating well-known APT (Advanced
Persistent threat) activities
SPEAR PHISHING ATTACK
• Spear phishing is an email that appears to be from an individual or
business that you know. But it isn't. It's from the same criminal hackers
who want your credit card and bank account numbers, passwords, and
the financial information on your PC.
Business impact
• Theft of sensitive information
• Secondary use of compromised machines
• Incident response and recovery costs
HOW TO DEFEND AGAINST SPEAR
PHISHING ATTACKS
• Security awareness training
• Boundary defence
• Continuous vulnerability assessment and remediation
DDoS Attack
• Distributed-Denial-of-Service attack
– DDoS is a type of DOS attack where multiple compromised
systems, which are often infected with a Trojan, are used
to target a single system causing a Denial of Service (DoS)
attack.
• DoS vs DDoS
– DoS: when a single host attacks
– DDos: when multiple hosts attacks simultaneously
How does DDos Attack work?
• build a network of computers
• discover vulnerable sites or hosts on the network
• exploit to gain access to these hosts
• install new programs (known as attack tools) on the compromised
hosts
• hosts that are running these attack tools are known as zombies
• many zombies together form what we call an army
• building an army is automated and not a difficult process
nowadays
How to find Vulnerable Machines?
• Random scanning
• Hit-list scanning
• Topological scanning
• Local subnet scanning
• Permutation scanning
How to propagate Malicious Code?
• Central source propagation
This mechanism commonly uses HTTP, FTP, and remote-
procedure call (RPC) protocols
• Back-chaining propagation :
• copying attack toolkit can be supported by simple port listeners or
by full intruder-installed Web servers, both of which use the Trivial
File Transfer Protocol (TFTP)
• Autonomous propagation
DDos Attack Taxonomy
– There are mainly two kinds of DDoS attacks
• Typical DDoS attacks, and
• Distributed Reflector DoS (DRDoS) attacks
– Typical DDoS Attacks:
– DRDoS Attacks:
• slave zombies send a stream of packets with the victim's IP
address as the source IP address to other uninfected machines
(known as reflectors)
• the reflectors then connects to the victim and sends greater
volume of traffic, because they believe that the victim was the
host that asked for it
• the attack is mounted by noncompromised machines without
being aware of the action
Comparison
A Corporate Structure Analogy
DEFENCE MECHANISMS
• SIGNATURE DETECTION
• ANOMALY DETECTION
• HYBRID SYSTEM
Cyber Security Terms

More Related Content

PPTX
Ransomware
PDF
Understanding Cyber Attack - Cyber Kill Chain.pdf
PDF
Application Security - Your Success Depends on it
PDF
Addressing the cyber kill chain
PDF
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
PDF
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
PPTX
Cyber Threat Intelligence
Ransomware
Understanding Cyber Attack - Cyber Kill Chain.pdf
Application Security - Your Success Depends on it
Addressing the cyber kill chain
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
Cyber Threat Intelligence

What's hot (20)

PPTX
Wannacry
PPTX
Introduction to cyber security amos
PDF
Local File Inclusion to Remote Code Execution
PPTX
Network security
PPTX
Cyber kill chain
PPTX
Understanding Application Threat Modelling & Architecture
PPTX
Malware & Anti-Malware
PPTX
Hacking
PPTX
Cyber security fundamentals
PPTX
Types of Malware (CEH v11)
PPTX
Phishing attack seminar presentation
PPTX
What is Ransomware
PPTX
Cybersecurity Awareness Session by Adam
PDF
Tools kali
PPTX
Cross Site Scripting ( XSS)
PPTX
Ransomware Attack.pptx
PPT
Cyber Security
DOCX
Zero-Day Vulnerability and Heuristic Analysis
PDF
HOW AI CAN HELP IN CYBERSECURITY
PDF
Understanding Cyber Kill Chain and OODA loop
Wannacry
Introduction to cyber security amos
Local File Inclusion to Remote Code Execution
Network security
Cyber kill chain
Understanding Application Threat Modelling & Architecture
Malware & Anti-Malware
Hacking
Cyber security fundamentals
Types of Malware (CEH v11)
Phishing attack seminar presentation
What is Ransomware
Cybersecurity Awareness Session by Adam
Tools kali
Cross Site Scripting ( XSS)
Ransomware Attack.pptx
Cyber Security
Zero-Day Vulnerability and Heuristic Analysis
HOW AI CAN HELP IN CYBERSECURITY
Understanding Cyber Kill Chain and OODA loop
Ad

Viewers also liked (20)

PPT
presentation on cyber crime and security
PPTX
Cyber crime and security ppt
PPTX
Cyber Crime and Security Presentation
PPTX
Cyber security
PDF
Cyber Security_Presentation_KTH
PPT
Introduction to Cyber Security
PPTX
Cyber security presentation
PPTX
Cyber security
PPT
Cyber security and emails presentation
PPTX
Cyber Security Seminar
PDF
Malicious attack detection and prevention in ad hoc network based on real tim...
PPTX
Presentation on Cyber Security
PPTX
Cyber Security and the Impact on your Business
PDF
Critical Infrastructure Protection against targeted attacks on cyber-physical...
PPTX
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
PPTX
PDF
Cyber Security Seminar, MEA 2015, IGN Mantra
PDF
CEHv7 Question Collection
PPTX
Final cyber crime and security
PDF
Potential Impact of Cyber Attacks on Critical Infrastructure
presentation on cyber crime and security
Cyber crime and security ppt
Cyber Crime and Security Presentation
Cyber security
Cyber Security_Presentation_KTH
Introduction to Cyber Security
Cyber security presentation
Cyber security
Cyber security and emails presentation
Cyber Security Seminar
Malicious attack detection and prevention in ad hoc network based on real tim...
Presentation on Cyber Security
Cyber Security and the Impact on your Business
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Cyber Security Seminar, MEA 2015, IGN Mantra
CEHv7 Question Collection
Final cyber crime and security
Potential Impact of Cyber Attacks on Critical Infrastructure
Ad

Similar to Cyber Security Terms (20)

PPTX
unit cyber security BOTNETS Documents.pptx
PDF
Ddos- distributed denial of service
PPTX
Denial of service
PDF
denialofservice.pdfdos attacck basic details with interactive design
PDF
Botnet Attacks How They Work and How to Defend Against Them.pdf
PPTX
UNIT 5 (2).pptx
PDF
about botnets
PDF
A review botnet detection and suppression in clouds
PPTX
Bots and Botnet
PPTX
Botnets
PPT
Botnet
PPT
Honeypot Project
PDF
IoT Honeypots: State of the Art
PPTX
PDF
Untitled document.pdf
PPTX
introduction to Botnet
PPTX
Security threats
PPTX
Mcs2453 aniq mc101053-assignment1
PDF
Cybersecurity -Terms.
PPTX
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
unit cyber security BOTNETS Documents.pptx
Ddos- distributed denial of service
Denial of service
denialofservice.pdfdos attacck basic details with interactive design
Botnet Attacks How They Work and How to Defend Against Them.pdf
UNIT 5 (2).pptx
about botnets
A review botnet detection and suppression in clouds
Bots and Botnet
Botnets
Botnet
Honeypot Project
IoT Honeypots: State of the Art
Untitled document.pdf
introduction to Botnet
Security threats
Mcs2453 aniq mc101053-assignment1
Cybersecurity -Terms.
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg

Recently uploaded (20)

PDF
Improvement effect of pyrolyzed agro-food biochar on the properties of.pdf
PPTX
Amdahl’s law is explained in the above power point presentations
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PDF
Visual Aids for Exploratory Data Analysis.pdf
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
Soil Improvement Techniques Note - Rabbi
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PPTX
Management Information system : MIS-e-Business Systems.pptx
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Improvement effect of pyrolyzed agro-food biochar on the properties of.pdf
Amdahl’s law is explained in the above power point presentations
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
Fundamentals of safety and accident prevention -final (1).pptx
"Array and Linked List in Data Structures with Types, Operations, Implementat...
distributed database system" (DDBS) is often used to refer to both the distri...
Visual Aids for Exploratory Data Analysis.pdf
Exploratory_Data_Analysis_Fundamentals.pdf
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Soil Improvement Techniques Note - Rabbi
III.4.1.2_The_Space_Environment.p pdffdf
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
Fundamentals of Mechanical Engineering.pptx
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
Management Information system : MIS-e-Business Systems.pptx
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION

Cyber Security Terms

  • 2. OUTLINE Introduction to Cyber Security Botnet Watering Hole attack Spear Phishing attacK Distributed Denial of Service(DDoS) Conclusion
  • 3. BOTNET  A Botnet is a network of compromised computers under the control of a remote attacker  controller of a botnet is able to direct the activities of these compromised computers  Botnet Terminology  Bot Herder (Bot Master)  Bot  Bot Client  IRC Server  Command and Control Channel (C&C)
  • 4. INTRODUCTION TO BOTNET(TERMINOLOGY) IRC Channel IRC Server Code Server IRC Channel C&C Traffic Updates Victim Attack Bot Master
  • 5. BOTNET IN NETWORK SECURITY  Internet users are getting infected by bots  Many times corporate and end users are trapped in botnet attacks  Today 16-25% of the computers connected to the internet are members of a botnet  In this network bots are located in various locations  It will become difficult to track illegal activities  This behavior makes botnet an attractive tool for intruders and increase threat against network security
  • 6. HOW BOTNET IS USED?? Distributed Denial of Service (DDoS) attacks  Sending Spams  Phishing  Addware  Spyware  Click Fraud
  • 7. BOTNET DETECTION Two approaches for botnet detection based on  Setting up honeynets  Passive traffic monitoring  Signature based  Anomaly based  DNS based
  • 8. BOTNET DETECTION:SETTING UP HONEYNETS Windows Honey pot  Honeywall Responsibilities: DNS/IP-address of IRC server and port number (optional) password to connect to IRC-server Nickname of bot Channel to join and (optional) channel-password
  • 9. BOTNET DETECTION:SETTING UP HONEYNETS Bot 1. Malicious Traffic Sensor 3. Authorize 2. Inform bot’s IP Bot Master
  • 10. BOTNET DETECTION:TRAFFIC MONITORING Signature based: Detection of known botnets  Anomaly based: Detect botnet using following anomalies  High network latency  High volume of traffic  Traffic on unusual port  Unusual system behaviour  DNS based: Analysis of DNS traffic generated by botnets
  • 11. BOTNET DETECTION  Determining the source of a botnet-based attack is challenging:  Traditional approach: Every zombie host is an attacker Botnets can exist in a benign state for an arbitrary amount of time before they are used for a specific attack  New trend: P2P networks
  • 12. PREVENTING BOTNET INFECTIONS Use a Firewall  Use Antivirus (AV) software  Deploy an Intrusion Prevention System (IPS)  Define a Security Policy and  Share Policies with your users systematically
  • 13. WATERING HOLE ATTACK • Watering Hole is a computer attack strategy identified in 2012 by RSA Security, in which the victim is a particular group (organization, industry, or region). In this attack, the attacker guesses or observes which websites the group often uses and Infects one or more of them with malware. • How does it work ?  Determine Target Group  Identify Vulnerabilities on those Websites  Inject Threat into Website  Sit in the Tall Grass and Wait for Targets to Come to You Why it is effective ??
  • 14. PREVENT WATERING HOLE ATTACK • Timely Software Update • Vulnerability shielding • Network traffic detection • Correlating well-known APT (Advanced Persistent threat) activities
  • 15. SPEAR PHISHING ATTACK • Spear phishing is an email that appears to be from an individual or business that you know. But it isn't. It's from the same criminal hackers who want your credit card and bank account numbers, passwords, and the financial information on your PC. Business impact • Theft of sensitive information • Secondary use of compromised machines • Incident response and recovery costs
  • 16. HOW TO DEFEND AGAINST SPEAR PHISHING ATTACKS • Security awareness training • Boundary defence • Continuous vulnerability assessment and remediation
  • 17. DDoS Attack • Distributed-Denial-of-Service attack – DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. • DoS vs DDoS – DoS: when a single host attacks – DDos: when multiple hosts attacks simultaneously
  • 18. How does DDos Attack work? • build a network of computers • discover vulnerable sites or hosts on the network • exploit to gain access to these hosts • install new programs (known as attack tools) on the compromised hosts • hosts that are running these attack tools are known as zombies • many zombies together form what we call an army • building an army is automated and not a difficult process nowadays
  • 19. How to find Vulnerable Machines? • Random scanning • Hit-list scanning • Topological scanning • Local subnet scanning • Permutation scanning
  • 20. How to propagate Malicious Code? • Central source propagation This mechanism commonly uses HTTP, FTP, and remote- procedure call (RPC) protocols
  • 21. • Back-chaining propagation : • copying attack toolkit can be supported by simple port listeners or by full intruder-installed Web servers, both of which use the Trivial File Transfer Protocol (TFTP) • Autonomous propagation
  • 22. DDos Attack Taxonomy – There are mainly two kinds of DDoS attacks • Typical DDoS attacks, and • Distributed Reflector DoS (DRDoS) attacks – Typical DDoS Attacks:
  • 23. – DRDoS Attacks: • slave zombies send a stream of packets with the victim's IP address as the source IP address to other uninfected machines (known as reflectors) • the reflectors then connects to the victim and sends greater volume of traffic, because they believe that the victim was the host that asked for it • the attack is mounted by noncompromised machines without being aware of the action
  • 26. DEFENCE MECHANISMS • SIGNATURE DETECTION • ANOMALY DETECTION • HYBRID SYSTEM