In recent years, we have seen large-scale botnets used to execute attacks rarely seen in the past -- botnets that incorporate new features and bigger capabilities than ever before. How and why some of these botnets remain resilient is a question that needs to be answered, and one of the reasons is Fast Flux. Fast Flux is a DNS technique used by botnets to hide various types of malicious activities (such as phishing, web proxying, malware delivery, and malware communication) behind an ever-changing network of compromised hosts acting as proxies. In general, a Fast Flux network is mostly used to make communication between malware and its command and control server (C&C) more resistant to discovery. Akamai’s high visibility to both Web and Enterprise traffic enables new and unique insights on the behavior of such Fast Flux networks.
In this webinar, you will get an in-depth analysis on:
- How network fluxing is using domains, IP addresses and even nameservers to become resistant to discovery
- How Fast Flux networks offer services such as malware communication and hosting of malicious content
- How botnets are used both for Fast Flux communications and a variety of Web attacks such as Web scraping and credential abuse
- Best practices for detecting and defending against such botnets
Join Akamai and (ISC)² on Nov 22 (Wed) at 13:00 (Singapore time) / 16:00 (Sydney time) to learn more about the Fast Flux Botnet.
Presenter: Or Katz, Principal Lead Security Researcher, Akamai
Moderator: Ir. Tejinder Singh, Senior Development Expert, T-Systems Malaysia SGA Security Engineering