dcsimg

Botnets

  • Botnets-

    While botnets are still responsible for some of the largest DDoS attacks to date (generating > 100 Gbps of traffic), security experts will focus on evolution of botnet command-and-control architecture in the year ahead.

    “I think the evolution of botnets has more to do with the Command and Control (C2) architecture than the size of the attacks being launched,” said Barry Hensley, director of the Counter Threat Unit/Research Group at Dell SecureWorks. “We are starting to see a decentralized C2 architecture, namely Peer-to-Peer. Since IRC and HTTP C2 infrastructure still work well for bot operators, P2P is not yet widely implemented. Once the security space starts making an impact and decreasing the effectiveness of those two protocols, we’ll start to see botnet operators shift toward P2P and DNS. Until then, they’ll just use what works.”

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18

Botnets

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18
  • Botnets-8

    While botnets are still responsible for some of the largest DDoS attacks to date (generating > 100 Gbps of traffic), security experts will focus on evolution of botnet command-and-control architecture in the year ahead.

    “I think the evolution of botnets has more to do with the Command and Control (C2) architecture than the size of the attacks being launched,” said Barry Hensley, director of the Counter Threat Unit/Research Group at Dell SecureWorks. “We are starting to see a decentralized C2 architecture, namely Peer-to-Peer. Since IRC and HTTP C2 infrastructure still work well for bot operators, P2P is not yet widely implemented. Once the security space starts making an impact and decreasing the effectiveness of those two protocols, we’ll start to see botnet operators shift toward P2P and DNS. Until then, they’ll just use what works.”

In the past year, we have witnessed cyber attacks of unprecedented sophistication and reach. These attacks demonstrate that malicious actors have the ability to com­promise and control millions of computers that belong to governments, private enterprises and ordinary citizens. If we are going to prevent motivated adversaries from attack­ing our systems, stealing our data and harming our critical infrastructure, the broader community of security research­ers — including academia, the private sector and govern­ment — must work together to understand emerging threats and to develop proactive security solutions to safeguard the Internet and physical infrastructure that relies on it.

This slideshow features emerging cyber threats for 2012, identified by the Georgia Tech Information Security Center and the Georgia Tech Research

Institute.

More

Slideshows

:


Ten Apple Apps for BusinessApple apps to help increase business productivity.

Top Eight Features in Windows Server 8 Windows Server 8 is a technically sophisticated operating system that is crammed with features that bring many previously enterprise-only capabilities to small and mid-sized businesses.

Seven Points CIOs Must Know About the Board of Directors Seven areas that CIOs must understand and act upon in order to effectively work with the board.