New User Special Price Expires in

Let's log you in.

Sign in with Facebook


Don't have a StudySoup account? Create one here!


Create a StudySoup account

Be part of our community, it's free to join!

Sign up with Facebook


Create your account
By creating an account you agree to StudySoup's terms and conditions and privacy policy

Already have a StudySoup account? Login here

Computer Security

by: Mr. Hayley Barton

Computer Security COMPSCI 161

Mr. Hayley Barton

GPA 3.93


Almost Ready


These notes were just uploaded, and will be ready to view shortly.

Purchase these notes here, or revisit this page.

Either way, we'll remind you when they're ready :)

Preview These Notes for FREE

Get a free preview of these Notes, just enter your email below.

Unlock Preview
Unlock Preview

Preview these materials now for free

Why put in your email? Get access to more of this material and other relevant free materials for your school

View Preview

About this Document

Class Notes
25 ?




Popular in Course

Popular in ComputerScienence

This 3 page Class Notes was uploaded by Mr. Hayley Barton on Thursday October 22, 2015. The Class Notes belongs to COMPSCI 161 at University of California - Berkeley taught by Staff in Fall. Since its upload, it has received 33 views. For similar materials see /class/226665/compsci-161-university-of-california-berkeley in ComputerScienence at University of California - Berkeley.


Reviews for Computer Security


Report this Material


What is Karma?


Karma is the currency of StudySoup.

You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!

Date Created: 10/22/15
Large Botnets and Distributed Denial of Service Attacks CS1611941 Anthony D Joseph October 28 2005 Outline What is a botnet How to create and use a botnet The money trail Distributed Denial of Service Attacks Examples Odaher 25 ms 25151 Fall ms 2 JasePhTwarNazimniMBgner What is a Botnet A network of compromised machines See last lecture for compromise techniques Zombies connect to servers Typically one or more IRC servers running on mbies Some botnets use custom encrypted protocols Zombies await commands or perform pre determined actions eg send spam Some botnets require authenticated commands Commands can be scripts or executables OdaherZB ZUDS 25151 Fall zuus JasePhTVEBVNamanMVagner Creating and Using a Botnet Odaher 25 ms 25151 Fall mas o JasePhTwarNazimniMBgner Botn ets Typically rented to users Cost depends on metrics of botnet Important metrics bragging rights Number of machines 1000 s 100000 s Aggregate bandwidth gigabits terabits Can be rented for campaign or for time OdaherZB ZUDS 25151 Fall ms 5 JasePhTVEBVNamanMVagner Uses for Botnets Send spam spyware adware and phishing email Also hosting phishing websites Clickfor pay fraud Distributed programming Example password crackln Distributed servers to control the botnet Distributed Denial of Service DDoS attacks Overwhelm server andor network links Political msgs famebragging Extortion pay or your site and business diequot Odaher 25 ms 25151 Fall ms 5 JasePhTwarNazimniMBgner Outline The Money Trail What is a hornet Popup ads start appearing on Joe s PC How to create and Lise a botnet For wellknown brands Chrysler Expedia The money trailm Microsoft Priceline and Travelocity Distributed Denial of Service Attacks Each has border saymg ms from Auroral Examples Aurora is adware from Direct Revenue But Joe doesn t remember Installing it The adware industry has a 200 million to 2 billion a year revenue stream How does the ad go from Priceline to Joe ombmmms em all m 7 omwwm em all m a inspllyygaywamammwy insepmmwazrmrwggnm Company 0 0 AI 0 the Money Malicious Af liates Most adwarespyware vendors claim they prohibit drivebydownload and virus based installs SW Bu er But there s a strong profit incentive since Am I they get paid based on the number of lmakevlruses tn eyeballs Some even sue adwarespyware detection companies for labeling thing as suchll install adware or u riverbyr downloads Adware Makers EVquot Af liate omermuus csisi Fall zuus You Omaherzsjuu cslsi Fall zuus 1D JosephWEBVNamaniAVagner JasEphTwarNazimniWagner Outline Attacks What is a bmnet Overwhelm server andor network links Typical target is web servers 39 HOW to create and use a bornet Try to consume all resources BW disk space CPU The money trail Simple same req for large imagescomplex action Distributed Denial of Service Attacks Might be able to create packet lter to block Might also be able to block source subnets Examples Have to put lters into the network at upstream lSPs Complex Vary requests rate zombie set Harder to create packet lter esp if requests look real Rotating set makes source subnet blocks hard Only choice may be to add more and more HW and BW Odaberzsjuu 25151 Fall zuus M Odaberzsjuu 25151 Fall zuus 2 insepmrvgawammwagnev JasEphTvgarVazimniMBgner Toxbot Trojan Oct 10 2005 Three Dutch crackers 19 22 and 27 Used Toxbot Trojan aka Codbot to infect machines Installed adware and spyware on user machines Conducted DDoS attack against a US company for extortion pay or crash your site Conducted phishing attacks to hijack PaPal and eBay accounts then bought goods with accounts Estimated network size of 100K Investigators later discovered true size gt15M ombevmuus 25151 Fall ms 13 JasewWgavNamanWVagnev Microsoft Decoy Zombie Intentionally infected a machine with zombie code Within 20 days PC received gt 5 million connections Tried to send 18 million spam emails containing ads for 13000 unique domains October 27 2005 filed 13 John Doe lawsuits against spammers Enables them to subpoena ISPs and domain registrars for identities Odahev 25 ms CS1B1Fall2EIEIS JasePnlwavNazimniMBgnev m


Buy Material

Are you sure you want to buy this material for

25 Karma

Buy Material

BOOM! Enjoy Your Free Notes!

We've added these Notes to your profile, click here to view them now.


You're already Subscribed!

Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'

Why people love StudySoup

Bentley McCaw University of Florida

"I was shooting for a perfect 4.0 GPA this semester. Having StudySoup as a study aid was critical to helping me achieve my goal...and I nailed it!"

Amaris Trozzo George Washington University

"I made $350 in just two days after posting my first study guide."

Steve Martinelli UC Los Angeles

"There's no way I would have passed my Organic Chemistry class this semester without the notes and study guides I got from StudySoup."

Parker Thompson 500 Startups

"It's a great way for students to improve their educational experience and it seemed like a product that everybody wants, so all the people participating are winning."

Become an Elite Notetaker and start selling your notes online!

Refund Policy


All subscriptions to StudySoup are paid in full at the time of subscribing. To change your credit card information or to cancel your subscription, go to "Edit Settings". All credit card information will be available there. If you should decide to cancel your subscription, it will continue to be valid until the next payment period, as all payments for the current period were made in advance. For special circumstances, please email


StudySoup has more than 1 million course-specific study resources to help students study smarter. If you’re having trouble finding what you’re looking for, our customer support team can help you find what you need! Feel free to contact them here:

Recurring Subscriptions: If you have canceled your recurring subscription on the day of renewal and have not downloaded any documents, you may request a refund by submitting an email to

Satisfaction Guarantee: If you’re not satisfied with your subscription, you can contact us for further help. Contact must be made within 3 business days of your subscription purchase and your refund request will be subject for review.

Please Note: Refunds can never be provided more than 30 days after the initial purchase date regardless of your activity on the site.