Great Papers from Honeynet Project
If you haven't seen them yet, Know Your Enemy: Behind the Scenes of Malicious Web Servers and Know Your Enemy: Malicious Web Servers are two great papers by the Honeynet Project. You might want to see Web Server Botnets and Server Farms as Attack Platforms by Gadi Evron as background. You'll notice people like e0n are using NSM to combat bots. I have not seen any IRC-controlled SIP/VoIP attack bots and botnets yet. If you think your IPS will save you against bots, keep in mind the time it takes to update some of them. I also recommend reading The World's Biggest Botnets by Kelly Jackson Higgins.
Comments
Thanks for the heads-up on the blog post on using NSM for fighting bots. But as bots become more sophisticated and use HTTPS or other encrypted channels, how do you see NSM helping out (besides giving you the amount of traffic between the C&C server and the compromised host? Thanks
BTW...Thank you Richard for the ACK.
Won't this technique drastically limit the number of systems that can be exploited? Say you're on a network that has many internal addresses translated to one public source address. Then the only differentiation will be user-agents. If you also have a standard browser on the desktop, the number of user-agents will be fairly limited. For each source IP address, an exploit is only attempted against the first unique user-agent if the malicious site is using this technique. Am I misunderstanding, and if not, I wonder if this is to deter malware collection and analysis?