William Jones
68.510 Data Networking
27 Feb 2013
Professor Tomsic
Executive Summary
This paper will define botnets and how they are developed, used and controlled. The malicious attacks such as distributed denial of service (DDoS) will be discussed along with recent DDoS attacks and the likely perpetrators and their motives. Finally, I will describe what protocols and systems are used by attackers use to control and update botnets today.
In terms of today’s cyber world the term bot which was originally derived from the work robot, refers to end systems (desktops, laptops, servers) that have been infected by malicious software. Once compromised the end system is turned into a bot that is under the command and control of the criminal identity theft. Criminal organizations utilize malicious software to infect large numbers of systems to create botnets to perpetrate large scale attacks like those we have seen against our financial organizations.
Malware is malicious software intended to cause harm. It usually refers to viruses, worms, trojans, or other forms of malicious code that is used to compromise the integrity of the target system with the intent to disrupt systems, spy on users and steal their credentials and /or identify, or take control of the system. Systems can be infected in multiple ways including physical contact such as sharing files on portable storage media such as CD’s or flash drives. However, today malware more commonly arrives in electronic mail messages, either in an infected file attached to the email or through a Web link within the message. Malware can also be embedded in a downloaded file such as a jpg or a music file. In addition, malware can enter through an open network connection, without any human intervention due to poor configuration, or the lack of security patching processes. Once infected the end system is under the command and control of the criminal organization to conduct illicit activities.
The trend and sophistication of attacks using botnets has been increasing and recently has been taking the form of DDoS attacks. There are several reasons for the increase in the numbers and sophistication in the attacks namely the emergence of crime as a service (CaaS) and hactivism. CaaS has emerged as a threat due to the growth in low-cost highly available attack software that allows novice hackers the ability to unleash attacks. Secondly, hactivism or the use of cyber attacks to make political or social statements like we have recently seen emanating from the Cyber Fighters of Izz ad-Din al-Qassam (Cyber Fighters), Anonymous or the Occupy movement.
Recent data shows that nearly 51% of observed attack traffic has originated in the Asia Pacific region, while just over 23% has originated in North and South America. Targets of recent DDoS activity include U.S. Bancorp, JPMorgan Chase, Bank of America, PNC Financial Services Group, SunTrust, HSBC, Ally Bank, BB&T, Wells Fargo and Capital One. However, a recent announcement by the Cyber Fighters indicates that they are going to be targeting regional and community banks.
The methodology that is evidenced during recent attacks is that virtual private servers have been compromised with a per node attack rate that is one hundred times greater than the normal bot. In addition, the command and control of the botnet is much tighter and able to modify attack methods and shift between targets in as little as twenty minutes whereas it used to take hours or days.
Some interesting examples of recent DDoS attacks using Botnets are as follows:
Case #1 The London Olympics was the target of DDoS attacks from 25 July through 9 September. The first significant attack occurred five hours prior to the opening ceremony and used twenty-three different attack vectors with 234M requests over an hour and twenty minute period. The second significant event took place during the first full day of competition and over a twelve hour period there were 5.6 B requests.
Case #2 A large East Coast financial services company was targeted during Hurricane Sandy and DNS requests peaked at 158K per second and totaled 19B in five days compared to 30M hits per week.
Case #3 – A leading US financial institution (FI) with millions of customers was the target of a massive DDoS attack with peak attack traffic of 30 Gbps which is 30 times the normal daily high traffic volume. Because of mitigating controls in place the attack was unsuccessful and the attackers gave up after fifteen minutes. Then twenty-five minutes later another large US based FI underwent a DDoS attack whose peak attack traffic volume of 8,491 MBit/sec with a duration of approximately two hours and forty minutes. Despite existing mitigating controls there was a degradation of service.
In conclusion, the use and sophistication of Botnets is increasing and recent trends indicate thus type of activity will continue to increase. Lessons learned include after a short probe of defenses the attacks begin in earnest and can last from minutes up to several days. Current attack methodologies are against Layer 7 of the protocol stack and attack SSL as opposed to the old attack methods that targeted Layer 4. Organizations need to develop and implement appropriate business continuity plans including preparing for dramatic increases of inbound network traffic, develop and implement incident response plans, and consider engaging service providers that specialize in real-time monitoring DDoS mitigation services.
References
1. Kurose, James F., and Keith W. Ross. Computer Networking: A Top-down Approach. Boston: Pearson, 2013. Print.
2. "2011 DDoS Attacks." Neustar. N.p., n.d. Web. 26 Feb. 2013.
3. "Akamai.com." State of the Internet. N.p., n.d. Web. 26 Feb. 2013.
4. "News & Updates." 2012 Cost of Cyber Crime Study: United States. N.p., n.d. Web. 26 Feb. 2013. <http://www.ponemon.org/news-2/44>.
5. "Cyber Crime." FBI. N.p., n.d. Web. 26 Feb. 2013. <http://www.fbi.gov/about-us/investigate/cyber>.
6. "Al-Qassam Cyber Fighters Threaten There 's Not Much Time Until They Resume Attacks." - Softpedia. N.p., n.d. Web. 26 Feb. 2013. <http://news.softpedia.com/news/al-Qassam-Cyber-Fighters-Threaten-There-s-Not-Much-Time-Until-They-Resume-Attacks-330763.shtml>.
References: 1. Kurose, James F., and Keith W. Ross. Computer Networking: A Top-down Approach. Boston: Pearson, 2013. Print. 2. "2011 DDoS Attacks." Neustar. N.p., n.d. Web. 26 Feb. 2013. 3. "Akamai.com." State of the Internet. N.p., n.d. Web. 26 Feb. 2013. 4. "News & Updates." 2012 Cost of Cyber Crime Study: United States. N.p., n.d. Web. 26 Feb. 2013. <http://www.ponemon.org/news-2/44>. 5. "Cyber Crime." FBI. N.p., n.d. Web. 26 Feb. 2013. <http://www.fbi.gov/about-us/investigate/cyber>. 6. "Al-Qassam Cyber Fighters Threaten There 's Not Much Time Until They Resume Attacks." - Softpedia. N.p., n.d. Web. 26 Feb. 2013. <http://news.softpedia.com/news/al-Qassam-Cyber-Fighters-Threaten-There-s-Not-Much-Time-Until-They-Resume-Attacks-330763.shtml>.
You May Also Find These Documents Helpful
-
The method to foul network is that one country is controlling the rest of the bots computer which looks like the attacks are from all over the countries.…
- 457 Words
- 2 Pages
Satisfactory Essays -
The university network was a victim of a DDoS attack. Whereby a cyber criminal first acquired administrator access. We suspect that the attacker gained access to the network from an internal computer, most likely from a student PC in one of the labs. The attacker likely used keylogger software to discover administrator credentials.…
- 508 Words
- 3 Pages
Satisfactory Essays -
Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.…
- 624 Words
- 3 Pages
Satisfactory Essays -
Ponemon Institute. (2013, May 28). Cost of Data Breach: Global Analysis. Retrieved April 29, 2015, from Ponemon Institute:…
- 446 Words
- 2 Pages
Satisfactory Essays -
Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…
- 633 Words
- 3 Pages
Satisfactory Essays -
In 2004, 18 year old Jason Salah Arabo from Michigan was arrested and pleaded guilty with conspiracy to order destructive computer attacks on business competitor’s websites from his home by remotely controlling them with a computer program called, “Bot”. Bots can be easily disguised as MP3 music files or pictures that unaware users download from public websites. Once they are downloaded, Bots will cause the virus to overload the website’s hosting computer server that result in crashing the entire system. Arabo wasn’t alone in this process. He and former 16 year old “Jasmine” Signh from New Jersey, creator of the Bot, had met Arabo on an instant messenger chat, and had agreed to help takedown Arabo’s competitor websites in exchange for Arabo’s merchandise, including designer sneakers. Arabo was running two business companies that sold throwback sports apparel such as team jerseys over the internet. Together, Arabo and Signh had designed the program in what they thought would help Arabo’s business by stopping customers from visiting and using other services.…
- 459 Words
- 2 Pages
Good Essays -
Mansfield, k. and atonakos, j., 2009.computer networking from lans to wans hardware, software, and security. (online). USA: Cengage Learning…
- 442 Words
- 2 Pages
Good Essays -
There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…
- 1872 Words
- 8 Pages
Better Essays -
References: Hallberg, B.A. (2010). Networking: A beginner’s guide (5th ed.). New York, NY: McGraw-Hill. https://portal.phoenix.edu/classroom/coursematerials/it_230/20130715/OSIRIS:45023271…
- 576 Words
- 3 Pages
Good Essays -
A piece of unwanted computer software or code introduced into another program, attached to a document or exists on its own, for malicious purposes.…
- 932 Words
- 4 Pages
Better Essays -
Cybercrime is any crime that is committed online or through the use of an electronic device such as a computer or smartphone. Cybercrime is very broad and can be anything from stealing money online to downloading illegal files. The creation and distribution of viruses on to others computers is a very popular cybercrime. The most prominent cybercrime is identity theft through pharming and phishing techniques used by criminals to steal personal information. Cybercrime is increasing as technology increases because criminals are finding it easier to get personal information from almost anywhere. Not only individual electronic devices are being attacked, businesses are also becoming attacked where many people are falling victim.…
- 780 Words
- 3 Pages
Better Essays -
Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…
- 1965 Words
- 8 Pages
Better Essays -
Botnets represent a huge and developing danger against digital security as they give a dispersed stage to numerous digital wrongdoings, for example, Distributed Denial of Service (DDoS) assaults against basic targets, malware scattering, phishing, and click fraud[3][4]. Botnet…
- 268 Words
- 2 Pages
Satisfactory Essays -
4. Masters, J. (2011, May 23). Confronting the cyber threat. Council on Foreign Relations Website. Retrieved August 3rd 2011, from:…
- 1719 Words
- 7 Pages
Better Essays -
In this section I needed to add a statement like your problem is... I recommend that you... Other than that and some proof reading Dr. Cross didn't have any other comments.…
- 1712 Words
- 6 Pages
Satisfactory Essays