[mdlug] It's about time.
Joseph C. Bender
jcbender at bendorius.com
Sat Oct 10 16:22:56 EDT 2009
Aaron Kulkis wrote:
> Jeff Hanson wrote:
>> I wonder how it will treat anonymous P-P traffic like Freenet and Tor.
>
> You have to remember, with a bot-net, the problem isn't
> the receipt of instructions via whatever devious or abused
> protocols (or even channels on IRC servers), the problem
> is the subsequent e-mail storm or DDoS attack.
>
It's all part of the problem. If the host is actively participating in
the attack, it's a much larger problem than a merely compromised host.
That being said, one of the bigger issues with botnets is that not all
the hosts are actively attacking things at once. A smart botnet
operator will leave hosts in reserve, letting them idle most of the time
and only spam or DDoS part of the time, they tend to not stick out that
way. The thing that keeps chugging along is the command and control
traffic. Just like any battle, if I can interrupt C&C traffic to the
bad guys' assets, that asset just became ineffective.
> For identifying botnet members, they don't need to look
> at the whole world of protocols.. only those used for
> creating lots of spam or DDoS attack.
>
If that's all anyone is looking at, they're not doing their jobs
correctly. If you wait for something to start spamming or attacking,
you're a bit too late. Thankfully, those of us who deal with stuff like
this on a daily basis *are* looking at all possible means of detection,
including identifying C&C traffic before the asset goes active.
It's about patterns, really. You look at your whole network and your
whole system. If certain hosts are acting in certain patterns that are
associated with bot behavior, hey, they're probably compromised. If I'm
only looking at one particular part of the problem (launched attacks),
it actually makes detection much less effective. If I see certain
patterns of traffic and system behavior *before* the attack happens, I
can shut it down before it even starts. That is why looking for
control/pre-attack traffic is critical.
> Once they identify a bot, THEN they can might want to
> start looking at the whole panopoly of protocols, so
> as to identify the control nodes.
>
If I'm looking for patterns and sigatures of C&C traffic, I already
know the upstream control nodes merely by IP address.
-JCB
More information about the mdlug
mailing list