Botnets: The Killer Web Applications

Craig Schiller, Jim Binkley

  • 出版商: Syngress Media
  • 出版日期: 2007-02-01
  • 定價: $1,813
  • 售價: 6.0$1,088
  • 語言: 英文
  • 頁數: 480
  • 裝訂: Paperback
  • ISBN: 1597491357
  • ISBN-13: 9781597491358
  • 相關分類: 資訊安全駭客 Hack
  • 立即出貨(限量) (庫存=1)

買這商品的人也買了...

商品描述

Description

With funding from organized crime and spam lords, a generation of talented hackers without morals has created a devastating arsenal of deadly toys, in the form of botnets. Norman Elton and Matt Keel from the College of William & Mary in their presentation “Who Owns Your Network?” called bot networks “the single greatest threat facing humanity.” This may be an exaggeration, but botnets are arguably the biggest threat that the Internet community has faced.

 

Understand the Botnet’s Life Cycle
The life of a botclient can be described as a life cycle. The authors show the nine steps that are repeated until the command to abandon the client is given.

Learn DNS and C&C Technology
See how DNS is a good example of how C&Cs use multiple layers in their design to ensure they stay up. By using different servers, botnet controllers can concentrate on the C&C itself rather than moving all the bots.

Meet the Bot Families
Understand the characteristics of the various families: SDBot, RBot, Agobot, Spybot, and Mytob.

Take Advantage of External Notifications
No single measure guarantees detection of bot activity, but good monitoring of multilayered defenses will contribute immensely to keeping the botherder from your door.

Master Ourmon
Discover how ourmon, an open source network management and anomaly detection system, can help you recognize botnet attacks.

Use Sandbox Tools for Botnets
See how Sandbox and CWSandbox can be integrated into a bigger process of automatic malware analysis.

Identify the Information an Enterprise Should Gather
Tools like disassemblers can be used to disassemble a botnet and view its code.

Understand Why This Problems Exists
Find and eliminate the conditions that cause the demand, and botnets will diminish.

Contents of This Book:

Botnets: A Call to Action

Botnets Overview

Alternative Botnet C&Cs

Common Botnets

Botnet Detection: Tools and Techniques

Ourmon: Overview and Installation

Ourmon: Anomaly Detection Tools

IRC and Botnets

Advanced Ourmon Techniques

Using Sandbox Tools for Botnets

Intelligence Resources

Responding to Botnets

商品描述(中文翻譯)

有組織犯罪和垃圾郵件領主的資金支持下,一代沒有道德的有才華的駭客創造了一個毀滅性的致命玩具庫,即機器人網絡。威廉和瑪麗學院的諾曼·埃爾頓和馬特·基爾在他們的演講“誰擁有你的網絡?”中稱機器人網絡為“人類面臨的最大威脅”。這可能有些誇張,但機器人網絡無疑是互聯網社區面臨的最大威脅。

了解機器人網絡的生命周期:機器人客戶端的生命可以描述為一個生命周期。作者展示了九個步驟,這些步驟會重複直到放棄客戶端的命令被給出。

了解DNS和C&C技術:看看DNS如何成為C&C在設計中使用多個層次以確保其持續運作的一個很好的例子。通過使用不同的服務器,機器人網絡控制器可以專注於C&C本身,而不是移動所有機器人。

認識機器人家族:了解各個家族的特點:SDBot、RBot、Agobot、Spybot和Mytob。

利用外部通知:沒有單一措施可以保證檢測到機器人活動,但對多層防禦的良好監控將極大地有助於防止機器人網絡入侵。

掌握Ourmon:了解我們的開源網絡管理和異常檢測系統如何幫助您識別機器人網絡攻擊。

使用沙箱工具進行機器人網絡:了解沙箱和CWSandbox如何集成到自動惡意軟件分析的更大過程中。

識別企業應該收集的信息:可以使用反編譯器來反編譯機器人網絡並查看其代碼。

了解為什麼存在這個問題:找出並消除導致需求的條件,機器人網絡將減少。

本書內容:

機器人網絡:行動呼籲
機器人網絡概述
替代機器人網絡C&C
常見的機器人網絡
機器人網絡檢測:工具和技術
Ourmon:概述和安裝
Ourmon:異常檢測工具
IRC和機器人網絡
高級Ourmon技術
使用沙箱工具進行機器人網絡
情報資源
應對機器人網絡