Top Banner
Attack of the Zombies Discovering and Mitigating Bots and Botnets By: Paul Albert
13

By: Paul Albert. Project Description Design Protocols User Profiles Deliverables Timeline Budget Demonstration Conclusion.

Dec 25, 2015

Download

Documents

Joan Baldwin
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: By: Paul Albert.  Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion.

Attack of the ZombiesDiscovering and Mitigating Bots and Botnets

By: Paul Albert

Page 2: By: Paul Albert.  Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion.

Project Description Design Protocols User Profiles Deliverables Timeline Budget Demonstration Conclusion

Overview

Page 3: By: Paul Albert.  Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion.

This project creates an easy-to-implement, accurate, and low-cost solution for discovering, mitigating, and reporting bots and botnet activity on a network, along with many other types of malicious network attacks

Small businesses to large companies Flexible Scalable

Project Description

Page 4: By: Paul Albert.  Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion.

Solution Diagram

Server 3

Server 2

Server 1

Switch 1

Internet

Snort IDSPC 1

PC 2

PC 3

Switch 2

Firewall

Router

Snort IDS Snort IDS

Page 5: By: Paul Albert.  Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion.

Solution Flowchart

Start Snort

Start Barnyard2

Snort Log File

Snort Configuration File

(snort.conf)

Barnyard2 Configuration File (barnyard.waldo)

BASE

Update Snort and System

Install Ubuntu

Perl ScriptInstall Snort IDS

and Other Packages

Perl Script

Page 6: By: Paul Albert.  Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion.

Ubuntu – Version 9.10 Snort IDS – Version 2.8.6

◦ IPS Functionality MySQL Basic Analysis and Security Engine (BASE) Barnyard2 – Version 2.1.8 Perl VirtualBox – Version 3.1.2 Windows XP BackTrack 4

Software Utilized

Page 7: By: Paul Albert.  Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion.

Can vary based on the size of the network Ownership of process Installation

◦ Knowledge to implement solution Maintenance of IDS and BASE

◦ Knowledge to troubleshoot IDS and BASE◦ Knowledge to script in Perl

Analysis of IDS and BASE Receiving and responding to alerts

User Profiles

Page 8: By: Paul Albert.  Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion.

VirtualBox Install Intrusion Detection System (IDS) Setup

◦ Installation of required software◦ Configuration of required software

Basic Analysis and Security Engine Setup Mitigation Scripting

◦ Perl script to assist with install process Testing

◦ Test to make sure IDS is functioning properly

Deliverables

Page 9: By: Paul Albert.  Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion.

Timeline9/23/2009 10/28/2009 12/2/2009 1/6/2010 2/10/2010 3/17/2010 4/21/2010 5/26/2010 6/30/2010

Research

Proposal

VirtualBox Setup

IDS Setup

MySQL Setup

BASE Setup

IDS Configuration

Scripting

Mitigation

Testing

Tech Expo

Final Presentation

Page 10: By: Paul Albert.  Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion.

Budget

Item Estimated Cost Actual CostVirtualBox 3.1.2 Free FreeDesktop Computer Free $1,000.00Windows XP Professional Free $299.99Ubuntu 9.10 Free FreeSnort IDS Free FreeSnort Subscription $29.99 $499.00MySQL Free FreeBASE Free Free

Total $29.99 $1,798.99

Page 11: By: Paul Albert.  Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion.

Demonstration

Page 12: By: Paul Albert.  Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion.

There is a need for small, medium, and large sized companies to be able to detect and/or mitigate, and report on malicious activity

Reporting features Easy-to-implement Accurate Low-cost

Conclusion

Page 13: By: Paul Albert.  Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion.

Questions?