Ask Statistics and Probability Expert

Fighting Botnets

Fire Eye (www.fireeye.com) is one of the world's most effective private cybercrime fighters. The company defends corporations and governments against targeted malicious software. Fire Eye's clients include Fortune 500 companies and members of the U.S. intelligence community. Fire Eye's software examines the entire lifecycle of malicious software, how the malware operates in a network, what the malware is looking for, which servers delivered the malware, and which control servers the malware receives its orders from. Since 2005,

Fire Eye has deflected some of the world's most destructive online attacks, including:

• Aurora, the attack originating in China that targeted Google and other technology firms in 2009;
• core flood, the botnet that had been stealing millions of dollars from global bank accounts since the mid-2000s and possibly earlier;
• Zeus, a program that used personal information to steal hundreds of millions of dollars from financial institutions in 2007. To understand why FireEye is so effective, consider its confrontation with the Rustock botnet.

Rustock was the most advanced botnet ever released onto the Web. It reeled people in by putting out spam that advertised fake drugs, online pharmacies, and Russian stocks. Then, from 2007 to 2011, Rustock quietly and illegally took control of more than a million computers around the world. Symantec, a computer security company, found that Rustock generated as many as 44 billion spam e-mails per day, nearly half of the total number of junk e-mails sent per day worldwide. Profits generated by Rustock were estimated to be in the millions of dollars. For months, FireEye collaborated with Microsoft and Pfizer to plot a counterattack. Microsoft and Pfizer became involved because Rustock was selling fake Viagra, a Pfi zer product, as well as sham lotteries using the Microsoft logo. Working from FireEye's intelligence, in March 2011 U.S.

Marshals stormed seven Internet data centers across the United States where Rustock had hidden its 96 command servers. Microsoft lawyers and technicians and computer forensics experts also participated in the raids. A team deployed to the Netherlands confiscated two additional Rustock command servers. Although the operation was executed flawlessly, Rustock was able to fight back. From an unknown location, the botmaster (the person or persons controlling the bots, or zombie computers) remotely sneaked back into its network, locked out Microsoft's technicians, and began to erase fi les. Clearly, the Rustock masterminds did not want anyone to discover the information contained inside their hard drives. After some difficulty, the Microsoft technicians were able to regain control of the servers. However, the data that were erased in the 30 minutes that the Microsoft technicians required to regain control of their servers may be lost forever. As Fire Eye and its partner companies analyzed Rustock's equipment, they discovered that much of it was leased to customers with addresses in the Asian nation of Azerbaijan, which shares a border with Russia. Forensic analysis of the captured servers pointed Rustock's opponents to Moscow and St. Petersburg.

Rustock had used the name Cosma2k to conduct business on the Internet, and it maintained a WebMoney account (www.webmoney.com) under the name Vladimir Alexandrovich Shergin. No one knows whether Shergin was a real name or an alias. However, Web Money was able to inform investigators that "Shergin" had listed an address in a small city outside Moscow. On April 6, 2011, Microsoft delivered its first status report in its lawsuit against Rustock to the federal court in Seattle (Microsoft headquarters). Then, on June 14, Microsoft published notices in Moscow and St. Petersburg newspapers, detailing its allegations against the botnet spammer. The notices urged the perpetrators of Rustock to respond to the charges or risk being declared guilty. Microsoft also offered (and is still offering) $250,000 for information about the identity of the person or persons operating the botnet. Unfortunately, the Rustock perpetrators have still not been caught, and security experts believe that more than 600,000 computers around the world are still infected with Rustock malware. Sources:

Questions

1.Describe why it was so important for law enforcement officials to capture all 96 Rustock command servers at one time.

2.If the perpetrators of Rustock are ever caught, will it be possible to prove that the perpetrators were responsible for the malware? Why or why not? Support your answer.

Statistics and Probability, Statistics

  • Category:- Statistics and Probability
  • Reference No.:- M91764620

Have any Question?


Related Questions in Statistics and Probability

Introduction to epidemiology assignment -assignment should

Introduction to Epidemiology Assignment - Assignment should be typed, with adequate space left between questions. Read the following paper, and answer the questions below: Sundquist K., Qvist J. Johansson SE., Sundquist ...

Question 1 many high school students take the ap tests in

Question 1. Many high school students take the AP tests in different subject areas. In 2007, of the 144,796 students who took the biology exam 84,199 of them were female. In that same year,of the 211,693 students who too ...

Basic statisticsactivity 1define the following terms1

BASIC STATISTICS Activity 1 Define the following terms: 1. Statistics 2. Descriptive Statistics 3. Inferential Statistics 4. Population 5. Sample 6. Quantitative Data 7. Discrete Variable 8. Continuous Variable 9. Qualit ...

Question 1below you are given the examination scores of 20

Question 1 Below you are given the examination scores of 20 students (data set also provided in accompanying MS Excel file). 52 99 92 86 84 63 72 76 95 88 92 58 65 79 80 90 75 74 56 99 a. Construct a frequency distributi ...

Question 1 assume you have noted the following prices for

Question: 1. Assume you have noted the following prices for paperback books and the number of pages that each book contains. Develop a least-squares estimated regression line. i. Compute the coefficient of determination ...

Question 1 a sample of 81 account balances of a credit

Question 1: A sample of 81 account balances of a credit company showed an average balance of $1,200 with a standard deviation of $126. 1. Formulate the hypotheses that can be used to determine whether the mean of all acc ...

5 of females smoke cigarettes what is the probability that

5% of females smoke cigarettes. What is the probability that the proportion of smokers in a sample of 865 females would be greater than 3%

Armstrong faber produces a standard number-two pencil

Armstrong Faber produces a standard number-two pencil called Ultra-Lite. The demand for Ultra-Lite has been fairly stable over the past ten years. On average, Armstrong Faber has sold 457,000 pencils each year. Furthermo ...

Sppose a and b are collectively exhaustive in addition pa

Suppose A and B are collectively exhaustive. In addition, P(A) = 0.2 and P(B) = 0.8. Suppose C and D are both mutually exclusive and collectively exhaustive. Further, P(C|A) = 0.7 and P(D|B) = 0.5. What are P(C) and P(D) ...

The time to complete 1 construction project for company a

The time to complete 1 construction project for company A is exponentially distributed with a mean of 1 year. Therefore: (a) What is the probability that a project will be finished in one and half years? (b) What is the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As