[124056] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: NSP-SEC

daemon@ATHENA.MIT.EDU (Alex Lanstein)
Sun Mar 21 21:53:31 2010

From: Alex Lanstein <ALanstein@FireEye.com>
To: Rich Kulawiec <rsk@gsp.org>, "nanog@nanog.org" <nanog@nanog.org>
Date: Sun, 21 Mar 2010 18:52:53 -0700
In-Reply-To: <20100322004346.GA19036@gsp.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

>>>________________________________________
>>>From: Rich Kulawiec [rsk@gsp.org]
>>>Sent: Sunday, March 21, 2010 8:43 PM
>>>To: nanog@nanog.org
>>>Subject: Re: NSP-SEC
>>>
>>>There is, by the way, no relief from this due to events like the
>>>recent bust of the Mariposa botnet (13M systems);

The public numbers advertised were 13M _IPs_ connecting to a sinkhole over =
more than a month's time.  When I've had visibility into other large botnet=
s (srizbi, rustock, mega-d), I was consistently seeing a 10 to 1 IPs-to-uni=
que-bots count over a time period of a week.  Happy to make the raw pcap da=
ta available to anyone who is curious.  The UCSB guys showed similar result=
s in their excellent Torpig paper.  http://www.cs.ucsb.edu/~seclab/projects=
/torpig/torpig.pdf

My unscientific finger-in-the-wind would put it at well under 1M when you a=
re talking a month and a half of monitoring IP connections.

Regards,

Alex Lanstein


home help back first fref pref prev next nref lref last post