80 likes | 274 Views
STUDYING SPAMMING BOTNETS USING BOTLAB THE NERD VERSION OF. OFFENSE BY KALYAN MANDA GAUTAM BHASWAR. 4 years of study, covers only 6 Botnets reponsible for 79% of spam messages arriving at the University of Washington. What about the other 21%?
E N D
STUDYING SPAMMING BOTNETS USING BOTLABTHE NERD VERSION OF OFFENSE BY KALYAN MANDA GAUTAM BHASWAR
4 years of study, covers only 6 Botnetsreponsible for 79% of spam messages arriving at the University of Washington. • What about the other 21%? • Why cant Botlab provide any details regarding the same….
In classifying bots: For the bots which spread spam using HTTP based services, the Botlab infrastructure spoofs login and mail transaction process, using fake ssl certificates. Fortunately, this variant didn’t check the ssl certificate. And now after reading this paper the spammer will have to only start validating the certificate and we are back to ground zero.
Avoiding Blacklisting To prevent bots from reporting 100% delivery rates Botlab depends upon failed DNS lookup as a source of randomness in bot-reported statistics. The botmasters have to only perform a more complicated statistics analysis to identify the spamhole. So what after this?
Tips for Spammers! -From Botlab Team • Perform an end to end check for e-mail reachability! • Use encrypted packets to avoid detection
Tips to Banish Botnets Once and for All - Deploy in-depth defense strategies and multi-layered network security - Promptly patch and vigilantly download security updates - Block JavaScripts - Monitor ports and plan port security to block unauthorized traffic - Generate user awareness amongst friends and colleagues
Conclusion • Good guys always end up last! • It’s a one time study! Bad guys will soon be back with some alternatives and perhaps you will require another four years of study !