<<

Cisco ASA Botnet Traffic Filter At-A-Glance

What Is the Cisco ASA Botnet Traffic Filter? What Is the Botnet Infection Process? The Botnet Traffic Filter database receives periodic The Cisco® ASA Botnet Traffic Filter complements existing There are three components to botnet infection: updates from the Cisco Security Intelligence Operations endpoint security solutions by monitoring network ports • Step 1: Infection. Endpoints can become infected Center, which delivers the fastest and most accurate for rogue activity and detecting infected internal endpoints through different means; web or email is the protection against threats. The Cisco SIO features: sending command and control traffic back to a host on the most common mechanism • Largest footprint of security devices in the world . The Botnet Traffic Filter database accurately and Step 2: Control. The infected endpoint sends “phone • (email, web, , and IPS devices) reliably identifies command and control traffic, as well as home” traffic back to the command and control on Largest and most dynamic collection of intelligence the domains or hosts receiving the information. the Internet. • data from Cisco devices and third-party data feeds • Step 3: Execution. Botnet attacks are launched. Why Is the ASA Botnet Traffic Filter Important • Largest investment of resources dedicated to for My Organization? How Do Botnets Impact Organizations? understanding the dynamic threat environment With the increase in malware, , and the use of Botnet attacks can take on a variety of different forms. (more than 250 certifications, 100 publications, Web 2.0 applications such as Facebook and MySpace, the They have evolved from spam and denial-of-service 20 books authored, and 100 security patents) and possibility of an endpoint being infected has increased attacks to attacks, data harvesting, and click- delivering continuous coverage exponentially. Cisco's defense-in-depth approach for fraud. The impact to organizations is typically financial, as endpoint security advocates multiple layers of protection, attackers achieve significant financial gain from targeting The Cisco ASA Botnet Traffic Filter is available with including long-term infection prevention systems, visibility spam attacks or bringing down for profit. Cisco ASA Software Release 8.2 via a license. and mitigation, and endpoint remediation. Figure 1. Botnet Infection Process Top Reports The Cisco ASA Botnet Traffic Filter offers several reports Process Security Product Botnet to provide businesses with visibility into phone home Infection • Cisco IPS 4200 Series Sensors Command and Control traffic, ports, and infected endpoints. prevention • Cisco IronPort® S-Series Web Security Appliance • Cisco ASA 5500 Series Content Security and Control Module (CSC-SSM) Detection Cisco ASA Botnet Traffic Filter

Endpoint Cisco Network Admission Control (NAC) Execution remediation

Cisco IPS and Cisco IronPort web security appliances are Step 1: Step 2: Step 3: long-term infection prevention systems, and the Botnet Infection Control Execution Traffic Filter complements these solutions. It functions as a Clients are infected Infected clients Attacks are launched: by spyware, malware, communicate with data harvesting, detection feature to identify infected endpoints that have and targeted attacks botnet command ID theft, DDoS, bypassed the existing prevention mechanisms. Endpoint and control spam, and remediation technologies such as NAC can be used to quarantine infected endpoints. Cisco ASA Botnet Traffic Filter The Cisco ASA Botnet Traffic Filter monitors phone Understanding Botnets and Botnet Infection home traffic across all ports and protocols by using What Are Botnets? an internal database that is continuously updated with Botnets are a collection of malicious software or “bots” results for malicious IP addresses and domain names. covertly installed on endpoints and controlled by another Visibility into the infected endpoints sending data to the For more information, visit: http://www.cisco.com/go/asa entity through a communications channel such as IRC, command and control host allows businesses to terminate peer-to-peer (P2P), or HTTP. this connection via normal mechanisms such as ACLs or “shun.”

Copyright © 2009 Cisco Systems, Inc. All rights reserved. Cisco, Cisco IOS, Cisco Systems, and the Cisco Systems logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. C45-530437-00 04/09