Application security, Critical Infrastructure Security

McAfee warns botnets could threaten infrastructure

Researchers with McAfee released a whitepaper today that claims botnets could feasibly threaten most countries' infrastructures.

Written by McAfee researchers Ken Baylor and Chris Brown, the whitepaper examines the growing problem of botnets through the lens of experience gained while protecting an unnamed Central American country.

Botnets had repeatedly attacked the county's national telecommunications company, bringing its infrastructure to its knees.

Baylor and Brown warned that this is a good example of the destructive power that unrestricted botnets can harness.

"A botnet of one million bots, with a conservative 128 Kbps broadband upload speed per infected bot, can wield a powerful 128 gigabits of traffic," the paper reported. "This is enough to take most of the Fortune 500 companies (and several countries) offlline using DDoS attacks. If several large botnets are allowed to join together, they could threaten the national infrastructure of most countries."

Also known as zombies or drones, bots are computers controlled remotely by unauthorized users without the system owner's knowledge or permission. McAfee Avert Labs estimates that more than 70 percent of spam is sent from bot networks.

In the newly released whitepaper, McAfee suggests that using intrusion prevention systems (IPS) to fight botnets may be the best approach. McAfee researchers believe that simple string-based detection is not sufficient to do the job.

"Things are looking fairly grim as the rise in the number of variants of IRC bots has grown by leaps and bounds over the last couple of years," wrote Allysa Myers on McAfee's Avert Labs blog. "Strictly using string-based detection against the unending tide certainly appears to be a lost cause."

Myers believes that, in addition to better cooperation between security companies and ISPs to shut down botnet controllers, there needs to be a paradigm shift in security strategy to only allowing known traffic rather than blocking known malicious traffic.

Click here to email Ericka Chickowski.

An In-Depth Guide to Application Security

Get essential knowledge and practical strategies to fortify your applications.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds