TABLE 1


trinoo daemon trinoo master
socket---v
bindv1.07d2+f3+c
recvfromtrinoo %s
%s %s %sl44adsl
aIf3YWfOhw.V.sock
PONG0nm1VNMXqRMyM
*HELLO*15:08:41
X.X.X.XAug 16 1999
X.X.X.Xtrinoo %s [%s:%s]
X.X.X.Xbind
read
*HELLO*
.  .  . rest omitted .  .  .


















TABLE 2


Table 1—Suggestions for System Administrators
Immediately (< 30 days) Near Term (30-180 days) Long Term (> 6 months)
ProtectApply anti-spoofing rules at the network boundary. (This makes your site a less appealing target for intruders.)
DetectLook for evidence of intrusions in logs, etc.
ReactReport to a predefined list of contacts, approved by management.


















TABLE 3


Table 2—Suggestions for Internet Service Providers
Immediate Short Term Long Term
ProtectEstablish crisis policy and procedures.
DetectEstablish an incident response team.Review high-profile target systems.Automate scanning/patching of high-profile target systems.
ReactDo case-by-case egress filtering.


















TABLE 4


Table 3—Suggestions for Incident Response Teams
Immediate Short Term Long Term
ProtectDetermine chain of command.
DetectDevelop criteria for detecting distributed-systems attacks.Develop procedures/algorithms for dealing with large amounts of traffic.Develop procedures/algorithms for handling automated incident reports.
ReactScope the extent of the attack.