WHITE PAPER. Distributed Denial of Service (DDoS) Attacks: Evolution, Impact, & Solutions

Similar documents
Cloudflare Advanced DDoS Protection

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

INTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

RESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

DDoS MITIGATION BEST PRACTICES

Why IPS Devices and Firewalls Fail to Stop DDoS Threats

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

Mitigating Outgoing Spam, DoS/DDoS Attacks and Other Security Threats

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

Global DDoS Measurements. Jose Nazario, Ph.D. NSF CyberTrust Workshop

RSA INCIDENT RESPONSE SERVICES

Arbor White Paper Keeping the Lights On

August 14th, 2018 PRESENTED BY:

RSA INCIDENT RESPONSE SERVICES

Securing Your Microsoft Azure Virtual Networks

Security Whitepaper. DNS Resource Exhaustion

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

DNS Security. Ch 1: The Importance of DNS Security. Updated

DNS SECURITY BENEFITS OF OUTSOURCING YOUR DNS TO AN IP ANYCAST+ PROVIDER

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Denial of Service. Serguei A. Mokhov SOEN321 - Fall 2004

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

DoS Cyber Attack on a Government Agency in Europe- April 2012 Constantly Changing Attack Vectors

Comprehensive datacenter protection

Securing Your Amazon Web Services Virtual Networks

Enterprise D/DoS Mitigation Solution offering

Neustar Security Solutions Overview

Supercharge Your SIEM: How Domain Intelligence Enhances Situational Awareness

Cyber Security Guidelines Distributed Denial of Service (DDoS) Attacks

Cyber War Chronicles Stories from the Virtual Trenches

SIEM: Five Requirements that Solve the Bigger Business Issues

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses

Botnet Communication Topologies

THE EVOLUTION OF SIEM

Distributed Denial of Service (DDoS)

Fast Flux Hosting Final Report. GNSO Council Meeting 13 August 2009

IBM Next Generation Intrusion Prevention System

WHITE PAPER. Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale

RSA NetWitness Suite Respond in Minutes, Not Months

Kaspersky Security Network

Anti-DDoS. FAQs. Issue 11 Date HUAWEI TECHNOLOGIES CO., LTD.

Arbor Solution Brief Arbor Cloud for Enterprises

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Attack Fingerprint Sharing: The Need for Automation of Inter-Domain Information Sharing

THE ACCENTURE CYBER DEFENSE SOLUTION

Imma Chargin Mah Lazer

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

Denial of Service Protection Standardize Defense or Loose the War

DoS Cyber Attack on a Government Agency in South America- February 2012 Anonymous Mobile LOIC in Action

Preparing your network for the next wave of innovation

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

IBM Security Network Protection Solutions

New Zealand National Cyber Security Centre Incident Summary

INTELLIGENCE DRIVEN GRC FOR SECURITY

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

WHITE PAPER. Session Border Controllers: Helping keep enterprise networks safe TABLE OF CONTENTS. Starting Points

CLOUD-BASED DDOS PROTECTION FOR HOSTING PROVIDERS

Basic Concepts in Intrusion Detection

DEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER

Prolexic Attack Report Q4 2011

Chapter 7. Denial of Service Attacks

CIO INSIGHTS Boosting Agility and Performance on the Evolving Internet

Denial of Service (DoS)

(DNS, and DNSSEC and DDOS) Geoff Huston APNIC

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Practical Guide to Choosing a DDoS Mitigation Service WHITEPAPER

Denial of Service, Traceback and Anonymity

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

May the (IBM) X-Force Be With You

Imperva Incapsula Product Overview

The McGill University Health Centre (MUHC)

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

Global DDoS Threat Landscape

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING

locuz.com SOC Services

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Denial of Service and Distributed Denial of Service Attacks

DENIAL OF SERVICE ATTACKS

Vulnerability Management & Vulnerability Assessment. Nessus Attack Scripting Language (NASL). CVE databases, NVD database

CYBER SOLUTIONS & THREAT INTELLIGENCE

Multi-vector DDOS Attacks

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments

Capability Analysis of Internet of Things (IoT) Devices in Botnets & Implications for Cyber Security Risk Assessment Processes (Part One)

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Panda Security 2010 Page 1

Chapter 10: Denial-of-Services

ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks

Cloud Under Control. HyTrust Two-Man Rule Solution Brief

Transcription:

Distributed Denial of Service (DDoS) Attacks: Evolution, Impact, & Solutions

CONTENTS + Executive Summary 3 + The Evolution of Distributed Denial of Service Attacks 4 Building a Botnet 4 Botnets and DDoS 5 Using Technology Against Us 6 Case Study: Analyzing An Attack 7 Law Enforcement 8 + The Solutions 8 Network Security Devices: Firewalls and IDS/IPS Devices 9 In-the-Cloud Network Security 9 + Conclusion 11 + Glossary 12 + Works Cited 13

Executive Summary Denial-of-Service (DoS) attacks have existed since the early days of computing and have evolved into complex and overwhelming security challenges. Organizations have had to worry not just about DoS attacks, but Distributed DoS attacks (DDoS), and more recently, Distributed Reflector DoS (DRDoS) attacks. As the sophistication of technology and its safeguards increase, the complexity of the attacks leveled against that technology also increases. As such, other more powerful DDoS variants are on the horizon. The problem is so wide-spread, fast-evolving, and confounding, that network security researchers, vendors, administrators, and law enforcement agencies are scrambling to keep up. DDoS attacks of multiple Gigabits per second (Gbps) are now routinely observed. After analyzing one DRDoS attack in early 2006, it was determined that the attack could have easily reached 120 Gbps. This is a staggering number since the largest non-multiplexed backbone connections today are 40 Gbps (OC-768) connections (AT&T, 2007). As the threat has changed, so too must the strategy for defending against it. Traditional, network border devices are no longer sufficient to provide protection. Organizations must look at a security-in-depth approach in order to fully prepare for attacks. Part of that strategy is employing an in-the-cloud DDoS security service that identifies and filters traffic upstream of the organizational network. The solution should incorporate: notification and alerting mechanism sufficient bandwidth to absorb the attack filtering technology that excludes only unwanted traffic a distributed model to create and maintain redundancy a logging/correlation system to collect detailed attack data This paper will outline the evolution of DDoS attacks, discuss the current state and likely future state of the situation, and present some ideas for more comprehensive solutions. 3

The Evolution of Denial of Service Attacks Although the methods and motives behind Denial of Service attacks have changed, the fundamental goal of attacks, to deny legitimate users of some resource or service, has not. Similarly, attackers have always, and will continue to look for methods to avoid detection. The evolution in the technology of DoS attacks originates from this fundamental premise: establish a denial of service condition without getting caught. Malicious actors constantly explore new ways to leverage today s technology to meet their goals. Attackers work hard to engineer new techniques to distance themselves from the victim while amplifying the impact of their attack. Much of the evolution in DoS attacks goes hand-in-hand with the use and popularity of botnets. Botnets provide the perfect tool to help magnify the impact of an attack while distancing the attacker from the victim. Building a Botnet The earliest DoS attacks utilized one host machine to create the denial of service condition. Because of the ease of detection and, in turn, mitigation of this type of attack, attackers rapidly migrated to a more distributed model. The Distributed Denial of Service (DDoS) attack leverages multiple sources to create the denial-of-service condition. By using multiple sources to attack a victim, the mastermind is not only able to amplify the magnitude of the attack, but can better hide his or her actual source IP address. The more layers that the attacker can place between him and the victim, the greater the chances of avoiding detection. Today s DoS attacks are generally all distributed in nature because of the ease in which malicious actors can compromise other devices and leverage them for their purposes. Once a computer is compromised, the controller can leverage it to engage in nefarious activities. This collection of compromised devices, or a botnet, is the launching pad for many of today s Internet threats. From spam to phishing, compromised devices sit at the core of many of today s Internet security challenges. Attackers gain control of other computers by exploiting vulnerabilities in their operating system or other software. The rapid expansion of the Internet, lack of sufficient security tools, and illegally copied operating systems makes the landscape ripe for malicious actors to prey upon a host of system vulnerabilities. As a result, botherders are gathering and organizing attack machines in record numbers. 4

Figure 1 - Sample Anatomy of a DDoS Attack Individually, each compromised device, or bot, can send small volumes of traffic that may do little harm. Collectively though, the network of compromised devices are capable of launching devastating DDoS attacks. Malicious actors have automated the harvesting process in order to compromise vast numbers of systems in a relatively short period of time. The largest botnets are amassed via Internet worms which compromise the victim computer and then use it as a launching pad to immediately compromise other computers. The Kraken botnet, which reportedly overtook Storm as the largest botnet on the Internet, is suspected to have 400,000 active bots, according to researchers at security firm Damballa (Higgins, 2008). Botnets and DDoS The connection between botnets and DDoS attacks is so intertwined it is difficult to separate the two. According to a recent Yankee Group study of Tier 1 ISPs (Partridge, 2007), DDoS attacks ranked first on a list of security threats, with botnets a close second. Malicious actors continue to leverage botnet technology to enhance the effectiveness of DDoS attacks. Over time, attack profiles have changed enabling the mastermind to distance himself or herself from the actual attack. The first phase of this evolution was the shift from standard DoS to DDoS attacks. Attackers soon realized that they could further separate themselves from the attack by introducing server bots for command and control purposes. By communicating with a few command and control server bots, attackers could manage hundreds and even thousands of client bots. Recently, malicious actors complicated the attack by introducing new layers to the architecture. Distributed Reflector Denial-of-Service Attacks (DRDoS) take advantage of uncompromised devices that unwittingly participate in the attack. Typically seen through use of DNS servers that act as the reflector, the design of the attack sends several times more traffic to the victim than what was sent to it. A case study in section 2.4 discusses the DRDoS attack in more detail. 5

Researchers are attempting to keep ahead of the curve by trying to predict how botnets will evolve in the future. Research on what tomorrow s attacks will look like will help security providers today build solutions to mitigate them. As attackers start to use peerto-peer technology to command and control a botnet, predictions on the next generation Hybrid P2P botnet do not seem far off (Wang, 2007). Figure 2 shows how botnet architecture, specifically as used in DDoS attacks, has evolved over time. Figure 2 - Evolution of Botnet Configurations and DDoS Attacks Using Technology Against Us DDoS attackers are using all aspects of networking technology to perform their assaults. Some of the very tools that were designed to help support the growth of the Internet are now being leveraged to conduct attacks. From misuse of the TCP three-way handshake to incorporating the Domain Name System into attack scenarios, malicious actors are constantly evolving. SYN Flood. During the early days of network protocol development, few envisioned attackers utilizing the three-way handshake of a TCP connection s establishment (the SYN, SYN-ACK, ACK sequence) to perform DDoS attacks. Today, SYN-flood attacks are one of the most common DDoS attack profiles on the Internet. Although more sophisticated variants of the attack are evolving (see Manzano, 2004), some organizations still fall victim to the basic approach that earlier attackers discovered (opening multiple connections with illegitimate SYN requests that deny legitimate users connection capability). UDP Misuse. Misuse of UDP is another great example of repurposing legitimate Internet technologies for malicious purposes. User Datagram Protocol was designed to be a quick, easy method of transferring small amounts of data like DNS queries and answers. Unfortunately, quick and easy is ripe for attacker misuse. 6

Forging the header information, specifically the source IP address, within UDP s packets has also become easy and attackers readily use the technique to mask their identity from legitimate users. Encryption. Although encryption is a necessary security tool to protect the data of organizations and individuals, criminals have used it for decades to hide the secrets of their misdeeds. After security analysts and law enforcement agencies discovered that botmasters utilize unencrypted IRC channel directives to control botnets, attackers now encrypt the command and control signals of their botnets. Fast-Flux. The evolution of the technology that attackers are taking advantage of continues today with the recent trend in fast-flux networks. Here, botnets manipulate DNS records to hide malicious Web sites behind a rapid-changing network of compromised hosts acting as proxies. The fast-flux trend reflects the need for attackers to try to mask the source of their attacks so that they are able to sustain the botnet for as long as possible. Case Study: Analyzing an Attack In 2006, a DRDoS attack illustrated the potential size of the security challenge facing network operators. More importantly, the attack highlighted some key shortcomings in traditional approaches to network security. Although the attack itself generated 5 Gbps against the victim network, wargaming and post-event analysis uncovered some telling tales of what attackers are capable of. The perpetrator utilized a combination of compromised and uncompromised devices to help facilitate the attack. The attacker first infiltrated a DNS name server and published a zone with a 4,028-byte record. Then, using a botnet of unknown size, queried approximately 30,000 uncompromised DNS servers for the record. Since each bot had the spoofed source IP address of the victim, the uncompromised DNS servers returned the answer to the victim, thus creating a denial of service condition by overwhelming the victim network with traffic. Figure 3 - Anatomy of a DRDoS Attack 7

Because the attacker did not have to compromise the reflectors, he was able to save time and distance himself from the attack. Further, while the maximum bandwidth observed by the victim s ISP was approximately 5 Gbps, the attacker had to generate traffic at an estimated rate of only 79 Mbps (a 72:1 attack amplification). In other words, each bot sent only a 56-byte DNS query, but the response sent to the victim was 4,028 bytes. Multiplied by the thousands of bots querying thousands of DNS servers, the attacker is able to reflect enormous traffic loads. An attacker could have easily increased the total bandwidth of this attack by generating more originating traffic, using a larger DNS response, or utilizing more reflectors. While 5 Gbps was enough to bring down the victim in this case, other targets may have been more resilient. Total traffic could have easily been increased to more than 100 Gbps by utilizing approximately 600,000 DNS server reflectors. This may seem like an unreasonable number until one learns that the 30,000 reflectors used in the attack were pulled only from the 200.0.0.0 to 217.255.255.255 address space. Similar increases would be observed if other parameters of the attack were expanded. It should be noted that while the DNS servers utilized in this attack were not compromised, they did have a flaw that allowed them to be used as reflectors: they were open, recursive DNS servers. That is, they did all of the recursion queries necessary to service a DNS client without requiring that client to be from the same network as they were. This poses a similar problem to that of open mail relays. As such, network operators should view open, recursive DNS servers as being just as important to secure. Law Enforcement Law enforcement agencies have had difficulties on numerous fronts in their attempts to bring cyber-criminals to justice. First, reporting on DDoS attacks is limited because of the reputation damage caused by a network outage. As result, there are limited cases to establish legal precedent. To add to the problem, anti-cyber crime legislation in the US and abroad is rapidly trying to keep pace with the changing threat landscape. While cooperation between the law enforcement agencies of different countries is difficult, attackers can move through the virtual borders of the Internet with ease. Fortunately, the FBI has started to win cases against the more notorious botmaster cyber-criminals in the US (O Brien, 2008) which should help establish legal precedents for future cases. 8

The Solutions Because of the rapid transformation of attack profiles and the demonstrated ability of malicious actors to launch devastating attacks, the nature of network security has changed. Network operators are reviewing the viability of traditional, edge security solutions focused on protecting organizations at and within the firewall. The fundamental question that security teams are addressing is how to deal with 10+Gbps attacks when the pipes to the organizational network are much smaller (an OC3 or OC12 connection or perhaps only a few T1s). Similarly, how does a security team keep up with the dynamic nature of attack profiles? Organizations are correctly continuing to use a combination of security techniques to address the treat. Many security experts will contest that the best approach is to provide a layered approach in which the organization looks at security in-depth. Part of this approach asserts that some threats are better resolved in-the-cloud, or closer to the core of the Internet while others are still better handled at the organizational firewall. DDoS mitigation is a great example of a threat better mitigated in-the-cloud. A comprehensive DDoS security solution should include the following components: notification and alerting mechanism sufficient bandwidth to absorb the attack filtering technology that excludes only unwanted traffic a distributed model to create and maintain redundancy a logging/correlation system to collect detailed attack data Network Security Devices: Firewalls and IDS/IPS Devices While network security devices have matured and are extremely capable of thwarting certain attacks, they are insufficient when it comes to mitigating DDoS attacks. The primary reason is that on-premise security devices alone do not address the reserve bandwidth issue. Very few organizations have sufficient excess capacity to absorb a multiple Gigabit DDoS attack in addition to their normal traffic load. The best security devices in the world are rendered ineffective if the traffic never gets to them. Additionally, organizations that look to network security devices alone must continue to invest in the security teams that are able to adapt to the dynamic threat landscape. As a result, organizations are looking upstream of their network borders for solutions. In-the-Cloud Network Security The shift to ITC network security reflects the logical and necessary evolution for DDoS mitigation. Because of the size of attacks, an organization must identify and mitigate the attack before it has the chance to overwhelm its network. ITC security provides organizations this opportunity. As a result, some organizations have turned to their Internet Service Provider or a Managed Security Service Provider (MSSP) to afford DDoS protection. 9

Since ISPs provide bandwidth and connectivity to the Internet, they are generally the first place that organizations look to for a DDoS solution. Although some do offer a DDoS detection or mitigation services, many focus on maximizing reliability and not security. As Merike Kaeo writes in RFC 4778, Some large ISPs do not concern themselves with attack streams that are less than 1Gbps in bandwidth. For organizations suffering a 500 Mbps attack, the approach is not sufficient. Unfortunately, many organizations simply assume that their Internet Service Provider (ISP) affords DDoS protection without inquiring specifically about it. Additionally, organizations should look carefully at how the ISP manages attacks. Simply black hole routing in many cases accomplishes the same result the attacker hoped to achieve (denying resources to legitimate users). While essentially disconnecting a victim may be acceptable for the ISP or for non-critical networks, most organizations cannot long survive without Internet connectivity, regardless of whether it is directly related to their core business. Depending upon the needs of the organization, an MSSP may offer a better alternative. Although not providing packets to and from the organization as the ISP does, an MSSP does offer several advantages: Security Expertise MSSPs are fully staffed with security experts to that provide a service that is so integral to the core business that it is the core business. ISP Agnostic Unlike ISPs, MSSPs can provide one solution for enterprises that utilize multiple ISPs. Whereas an ISP can filter traffic traversing its network, it has no visibility into Internet traffic on redundant links from other providers. Enterprises with multiple ISPs can purchase multiple solutions, or look to an MSSP to provide the service. The critical question for any MSSP offering a DDoS mitigation solution is if they have the capacity and scale to mitigate the largest attack vectors. According to a survey conducted by Arbor Networks, attacks in excess of 20 Gbps are seen today while multi-gbps attacks are becoming more prominent. The MSSP must be able to not only scale to meet these demands, but also the demand of attacks in the future. Figure 4 Attack Size Source: Arbor Networks, Inc. 10

Conclusion Although DDoS attacks have largely escaped the front page of major news organizations over the past few years, replaced by elaborate identity theft, spam, and phishing schemes, the threat still remains. In fact, attack architectures and technology have evolved so rapidly that enterprises large and small should be concerned. Unfortunately, it appears the attacks will only increase in complexity and magnitude as computer network technology permits. Whether attackers are driven by financial, political, religious, or technical motives, the tools that they have at their disposal have changed the dynamics of network security. Whereas firewall management used to be a sufficient strategy to manage attacks, botnets and reflectors have since reduced the effectiveness of blocking attacks at the network edge. The shift to in-the-cloud security for the detection and mitigation of DDoS attacks reflects the need to prevent attacks closer to the core of the Internet rather than waiting until it is too late. As organizations look to make DDoS protection and mitigation a primary security initiative, they must choose the appropriate approach that suits their needs. Organizations vary in shapes in sizes, but one constant is that they should employ a layered approach to their security challenges. For organizations that have one ISP and great confidence in their ability to provide security solutions, a value-added DDoS service through the service provider may be the best alternative. Larger, multi-homed enterprises may prefer a network agnostic MSSP with the infrastructure, experience and technology to mitigate large-scale attacks. One thing is certain that many organizations can attest to: preparing for the attack while it is occurring is too late. 11

Glossary Bot/Zombie: a computer compromised with the intention of using it to commit cyber-crimes. Botnet: a collection of compromised, networked computers used to commit cyber-crime. Botmaster: A cyber-criminal that uses botnets to commit his crimes. DoS Attack: Denial of Service Attack a criminal attack where the goal is to prevent a computing resource from being used. DDoS Attack: Distributed Denial of Service Attack A DoS attack where the source attacker is not one computer or device, but several of them, typically located in disparate locations. DRDoS Attack: Distributed Reflector Denial of Service Attack A DDoS attack that is amplified by a reflector. A reflector is typically an uncompromised device that unwittingly participates in a DDoS attack. Due to the design of the attack, it sends several times more traffic to the victim than what was sent to it. 12

Works Cited 1. AT&T. (2007, December 10). AT&T Expands New-Generation IP/MPLS Backbone Network. Retrieved May 7, 2008, from AT&T News Room: http://www.att.com/gen/press-room?pid=4800&cdvn=news&newsarticleid=24888 2. Higgins, K. (2008, April 7). New Massive Botnet Twice the Size of Storm, Retrieved May 13, 2008, from Dark Reading: http://www.darkreading.com/document.asp?doc_id=150292 3. Manzano, Y. (2004). Tracing the Development of Denial of Service Attacks: A Corporate Analogy, Retrieved May 7, 2008, from Crossroads, The ACM Student Magazine: http://www.acm.org/crossroads/xrds10-1/tracingdos.html 4. Danchev, D. (2007, September 5). Storm Worm s Fast Flux Networks, Last Retrieved June 4, 2008. Accessed from Blogspot: http://ddanchev.blogspot.com/2007/09/storm-worms-fast-flux-networks.html 5. Wang, P., Sparks, S., Zou, C. (2007, April 2) An Advanced Hybrid Peer-to-Peer Botnet, Last Retrieved June 4, 2008 from USENIX, http://www.usenix.org/events/hotbots07/tech/full_papers/wang/wang_html/ 6. Vixie, P. (1999, August). RFC 2671, Extension Mechanisms for DNS (EDNS0), Retrieved May 13, 2008, from ftp://ftp.rfc-editor.org/in-notes/rfc2671.txt 7. Partridge, B. (2007). Building an ROI Methodology for Core IP Security Solutions. Boston: Yankee Group, Last retrieved June 4, 2008 from Narus Software: http://www.narus.com/extras/yankee_roi/roi%20methodology.pdf 8. O Brien, T. P. (2008, April 16). Information Security Consultant Pleads Guilty to Federal Wiretapping and Identity Theft Charges. Retrieved May 7, 2008, from Federal Bureau of Investigation - Los Angeles Field Division - Press Release - Department of Justice: http://losangeles.fbi.gov/dojpressrel/pressrel08/la041608usa.htm 2008 VeriSign, Inc. All rights reserved. VeriSign, the VeriSign logo, the Checkmark Circle, idefense, and other trademarks, service marks, and designs are registered or unregistered trademarks of VeriSign, Inc., and its subsidiaries in the United States and in foreign countries. All other trademarks are property of their respective owners. 08-2008 13