An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets
|
|
|
- Sophie Scott
- 10 years ago
- Views:
Transcription
1 An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets Sajjad Arshad 1, Maghsoud Abbaspour 1, Mehdi Kharrazi 2, Hooman Sanatkar 1 1 Electrical and Computer Engineering Department, Shahid Beheshti University; G.C; Tehran, Iran 2 Department of Computer Engineering, Sharif University of Technology; Tehran, Iran [email protected], [email protected], [email protected], [email protected] Abstract Botnets (networks of compromised computers) are often used for malicious activities such as spam, click fraud, identity theft, phishing, and distributed denial of service (DDoS) attacks. Most of previous researches have introduced fully or partially signature-based botnet detection approaches. In this paper, we propose a fully anomaly-based approach that requires no a priori knowledge of bot signatures, botnet C&C protocols, and C&C server addresses. We start from inherent characteristics of botnets. Bots connect to the C&C channel and execute the received commands. Bots belonging to the same botnet receive the same commands that causes them having similar netflows characteristics and performing same attacks. Our method clusters bots with similar netflows and attacks in different time windows and perform correlation to identify bot infected hosts. We have developed a prototype system and evaluated it with real-world traces including normal traffic and several real-world botnet traces. The results show that our approach has high detection accuracy and low false positive. Keywords Botnet; Netflow; Clustering; Anomaly-based Detection I. INTRODUCTION Botnet is a collection of compromised hosts (bots) that are under control of an attacker (botmaster). Bots are used to send spam s, host phishing web sites, cooperate in distributed denial of service (DDoS) attacks, and other kinds of malicious activities. Botmaster needs a command and control (C&C) channel to command the bots and coordinate malicious activities. Most of botnets C&C channels are using IRC (Internet Relay Chat) protocol. In this protocol, botmaster has a real-time communication with the bots. There are also a few botnets that use the HTTP protocol for C&C channels [1][2]. In HTTP-based C&C, the botmaster does not communicate directly with the bots. Instead, the bots periodically contact the C&C server to obtain their commands. These two protocols provide a centralized C&C mechanism. The main disadvantage of centralized C&C mechanism is the single-point-offailure problem. For example, if IRC or HTTP server is taken down, the botmaster will not be able to communicate with the bots anymore. Thus, botmasters began using peer-to-peer (P2P) protocols for C&C channels. Currently, Storm Worm [3] and Nugache [4] are the most popular P2P botnets. For designing a botnet detection approach that is resistant to the changes of the C&C mechanisms, we should study inherent characteristics of botnet behaviors. Bots connect to the C&C channel and execute the received commands. Bots belonging to the same botnet receive the same commands that causes them having similar netflows characteristics and performing same attacks. There are netflows that present communication between bots and C&C servers such as binary downloading and sending spam. Also, there are several types of attacks like scanning and distributed denial of service (DDoS). Our method is based on detecting these anomalous behaviors and finding meaningful relation between these activities to detect set of bots inside the monitored network. This paper makes the following main contributions: We propose an anomaly-based method that requires no a priori knowledge of bot signatures, botnet C&C protocols, and the C&C server addresses. We illustrate a method that can detect bots in the monitored network in real-time. In addition to detect bots with malicious activities (e.g. scanning, DDoS), our method can detect bots that do not perform malicious activities. But, our approach detects bots with malicious activities so fast. We have developed a prototype system based on our method and evaluated it with real-world network traces including normal traffic and several real-world botnet traces. The rest of the paper is organized as follows. We review the related works in section 2. Section 3 describes the architecture and implementation of the approach. Section 4 evaluates the effectiveness of the approach on various network traces and finally the paper is concluded in section 5. II. RELATED WORKS There are several researches that propose different botnet detection approaches. Binkley and Singh [5] combines IRC statistics and TCP work weight to detect IRC-based botnets. Karasaridis [6] used IRC netflows and scanning activities to detect IRC botnet controllers. Livadas [7] proposed a machine learning based approach which uses network-level traffic features of chat protocols for botnet detection. Rishi [8] is a signature-based IRC botnet detection approach that
2 Netflows (C&C Communication, Spam s, Binary Updating) Attacks (Scanning, DDoS, ) Scanning Spam Binary Updating DDoS C&C Bot C&C Scanning Spam Binary Updating DDoS Time Bot TW1 TW2 TW3 TW4 TW5 finds suspicious nicknames by analyzing IRC-based botnets traffic. The above approaches are used for only detecting IRC-based botnets; whereas we do not have assumption about botnet C&C protocols. BotHunter [9] uses a user-defined bot infection model in order to correlate alerts (e.g. scanning). BotSniffer [10] is a centralized botnet C&C detection approach that performs group analysis across multiple hosts through different time windows. But, it is used for detecting centralized botnets. BotMiner [11] clusters hosts based on their netflow-level statistics (e.g., the byte count, the packet count, etc.) and their malicious activities (e.g., scanning) and then correlates clusters to find bots. Nevertheless, it works offline and cannot detect bots quickly. BotProbe [12] proposes an active botnet probing technique that detects bots by distinguishing botnet C&C dialogs from human-human conversations. The aforementioned approaches are mostly signaturebased and cannot find unknown botnets. III. BOTNET DETECTION APPROACH In this section, we illustrate a new botnet detection approach whose goal is to detect groups of bot infected hosts which belong to the same botnet in a monitored network. Bots belonging to the same botnet have similar behaviors during a time window and this similarity continues during consecutive time windows as shown in Fig. 1. Our approach finds behavior similarity of hosts in different properties such as netflow information through a predefined time window and tries to detect bots by correlating these similar behaviors between different time windows. Fig. 2 shows the architecture of our botnet detection approach, which consists of nine interconnected components that analyze traffic online. Traffic dispatching component delivers traffic to Domain-IP Mapping, Netflow Generating and Alert Generating components. Domain-IP Mapping component maps the DNS domains to corresponded IPs for filtering purposes. Netflow Generating component generates TCP netflows between hosts. Alert Generating component reports the malicious activities of the hosts like scanning. The following five components perform at the end of each time window. Alert Filtering component filters useless alerts generated by Alert Generating component and Netflow Filtering filters the netflows generated by Netflow Generating component Time Figure 1. Similarity in bots behaviors in consecutive time windows by using database produced by Domain-IP Mapping component. Then Netflow Clustering and Alert Clustering components cluster non-filtered netflows and alerts. Finally at the end of each time window correlation engine correlates the generated alert clusters and netflow clusters in order to detect bot infected hosts. The following sections illustrate architecture of our approach in detail. Our botnet detection approach operates on online traffic and detects bots in real-time. The following sections will illustrate each component in details. A. Traffic Dispatching This component has been designed for separating different types of traffic of Domain-IP Mapping, Netflow Generating and Alert Generating components. It delivers DNS traffic to Domain-IP Mapping and TCP traffic to Netflow Generating component. Also TCP, UDP and ICMP traffic is delivered to Alert Generating component. Irrelevant traffics like DHCP and ARP will be filtered out in order to increase performance. B. Domain-IP Mapping As discussed above, the bots can use the IPs or DNS names hard coded in their binary file in order to connect to the C&C servers. This component has been designed to map the domains and IPs to each other. This component processes DNS queries and responses in order to store in database the IP addresses in correspondence with the queried domain names. This database only is used to filter netflow to the sites in the white list as described in Netflow Filtering section. C. Netflow Generating This component processes TCP traffic and generates the netflows between hosts. Most of the routers like Cisco and Juniper have the capability of generating netflows. Also open source tools like ARGUS exist. We developed our own efficient tool to generate netflows. In addition to simple netflows, our tool is able to generate partial netflows (netflows that is not finished inside a time windows, is considered as a completed netflow, the remained part of the netflow is considered as another netflow in next time windows). The most important property of our tool is its efficiency and customized netflow record generating. Currently, we consider only TCP netflows. Each netflow has the following information: start time, end time, source
3 IP/Port, destination IP/Port, number of sent/received packets and number of sent/received bytes. D. Alert Generating This component reports the malicious activities of the hosts like scanning which is the most important activity that can be done by bots. Currently, this component contains sub-component scanning which will be illustrated in the following. The scanning subcomponent uses the sfportscan preprocessor of Snort (an open source IDS) which can detect several types of scanning such as decoy portscan, distributed portscan and portsweep for TCP, UDP and ICMP protocols. E. Netflow Filtering In order to increase the performance of the approach, we filter out useless netflows by the following rules: 1. Netflows related to communications between internal hosts and netflows initiated from external hosts towards internal hosts. Netflows of which do not contain any payload (e.g. scanning netflows). 2. Netflows of which contain bulky payloads that seem to be large file downloading traffic and their payloads size are higher than BULKY_THR factor. In our experiment, we consider it as 1MB. By analyzing the traffic of several botnet types we found out that the maximum netflow size of them is lower than this threshold. 3. Netflows of which their destination server is in the whitelist (known servers like google and yahoo). This list is generated and updated by system administrator manually. This filtering does not have any effect on the detection accuracy of our approach and only improves the efficiency of our approach. F. Alert Filtering This component filters out useless alerts generated by activities such as scanning by external hosts. This filtering does not have any effect on the detection accuracy of our approach and only improves the efficiency of our approach. Figure 2. Botnet Detection Approach Architecture G. Netflow Clustering This component clusters the netflows with similar communication patterns in the given time window based on flow-level feature set and payloads. Fig. 3 shows this two-level netflow clustering. Figure 3. Two-Level Netflow Clustering In the first level clustering, we determine a number of features for each netflow that together create a vector for that netflow. These features are: number of sent packets, number of sent bytes, average number of bytes per sent packet, average number of sent bytes per second, number of received packets, number of received bytes, average number of bytes per received packet, and average number of received bytes per second. The netflow vectors of two bots in a botnet are similar to each other; therefore we use a clustering algorithm in order to cluster similar vectors. For first level clustering, X-means clustering [13] method has been used which in contrast to K-means algorithm does not need to know the number of clusters. X-means repeats K-means cycle and uses Bayesian Information Criterion [13] to calculate the best value for K. In order to increase the accuracy of clustering, we perform second level clustering on the first level generated clusters. As a result, first level clusters are broken to new clusters in which the single netflow clusters are filtered out. Second level clustering performs on the payloads of the netflows. Each netflow has two payloads: the sent payload which is obtained by joining sent packets from the source to the destination, and the received payload which is obtained by joining the sent packets from the destination to the source. For
4 second level clustering, we use hierarchical clustering, and NCD [14] is used for calculating the payload similarity. Equation (1) is used for calculating the distance of a pair of netflows, which and coefficients are calculated using (2) and (3). In (1), 1 and is the sent payload and is the received payload.,,, (1) (2) We calculate the distance between each pair of netflows and then form a hierarchical tree. Therefore, we have to extract the clusters out of this tree. Number of these clusters depends on cut-off factor _ which shows the distance between netflow payloads. By analyzing the netflows of different types of botnets and calculating their payload distance we consider this factor as H. Alert Clustering This component performs a clustering on the generated scanning alerts. We can use the following features for clustering of scanning alerts: scanned port, scanned net or subnet, and type of scanning. In this implementation, type of scanning has been used for clustering of scanning alerts. I. Correlation Engine This component considers several time windows that their size ( _ ) which its default value is 20 minutes. We found that different types of botnets have at least one activity during his time. Correlation operation is performed at the end of each time window. Fig. 4 shows the netflow and the alert clusters generated in the time windows. The correlation engine component has a table of hosts in which every host has a specific score. Now, during the correlation step, this component correlates the clusters inside the current time window with all other clusters in the same time window, and with the clusters of a number ( _ _ ) of previous time windows. Therefore, if bots are active in a time window, they will be detected at the end of that time window. Its default value is set to 3 because maximum distance between bots activity is at most 3 time windows. Figure 4. Generated clusters in the time windows The score of the hosts which belong to the correlated clusters is increased, and the score of the hosts which did not belong to the correlated clusters is decreased. Fig. 5 shows the algorithm which calculates the score of host h in time window N. This score is calculated as the (3) maximum return value of the function (presented in Fig. 6) in _ _ iterative calls (for _ _ previous time windows). Also, the score of the hosts which did not belong to the correlated clusters is decreased by difference of current time window and the last correlated time window ( ) of those hosts., : maxs 1 0 _ _ :,, 0: 1 : 1: : 1 Figure 5. Score of host h in Time Window N Fig. 6 shows the function that calculates correlation score between two time windows ( ).,, : 0 : :, _ :.. : 1, 2,, _ _ Figure 6. Time window correlation Equation (4) shows the correlation degree calculation method. In (4), and are two clusters and., 1 (4) Correlation degree is close to 1 if the two clusters have higher intersection percent, higher intersection count, and less time window distance (distance between time windows which the two clusters belong to). The TWCorrelation function considers all of the correlated clusters. Each netflow cluster adds 1, and each alert cluster adds 2 points to the time window correlation score. To reduce false positives, the maximum calculated score of a host in each time window is MAX_TW_SCORE. We set this factor to 5. We call two clusters correlated, if their correlation degree exceeds CORR_THR (correlation threshold). A host is reported as a bot, if its score exceeds _ (bot threshold). By studying different types of botnets, in our experiment, _ and _ is considered 0.65 and 33 respectively. In the following
5 TABLE I. NETWORK TRACES STATISTICS Trace Num. of Num. of Packets Num. of Size Duration Clients Total ICMP TCP UDP TCP Netflows Normal GB 215 h 74,974, ,747 61,752,609 12,563, ,362 IRC-SdBot MB 30 h 18, ,072 1, IRC-SpyBot MB 30 h 468,026 2, ,054 1, ,870 HTTP-Bot-I MB 30 h 16, ,214 1,712 1,164 HTTP-Bot-II MB 30 h 14, , ,069 section, we evaluate the effectiveness of our approach on various network traces. IV. EXPERIMENTS To evaluate the performance of proposed botnet detection approach, it is tested on several real-world network traces, including normal and collected botnet traffics. A. Data Collection We have captured part of our traffic traces for continuous 8 days period from part of our campus network. We assume that this traffic trace is clean because of the two following reasons. First, the traffic trace has been captured from the network which is behind NAT and the outside attackers cannot exploit internal hosts. Second, internal network users do not have administrator access and cannot run malicious binaries (e.g. downloading and running suspicious attachments). A random sampling of the network trace shows that the traffic is diverse, containing normal application protocols, such as HTTP, FTP, SSH, DNS. We have collected a total of four different botnets covering IRC and HTTP. The basic statistics of these traces are listed in Table I. We use two IRC and two HTTP botnet traces, i.e., IRC-SdBot, IRC-SpyBot, HTTP-Bot-I and HTTP-Bot-II. IRC-SdBot and IRC-SpyBot are generated by executing modified bot code (SdBot and SpyBot [15]) in a fully controlled virtual network. Each trace contains four Windows XP IRC bot clients, and last 30 hours. HTTP-Bot-I and HTTP-Bot-II are generated according to the description of web-based C&C communications in [1][2]. In HTTP-Bot-I, the bot periodically connect to HTTP server every five minutes and the whole trace lasts for 30 hours. In HTTP-Bot-II, we have a more stealthy C&C communication where the bot waits a random time between 0 to 10 minutes each time before it visits the server and the whole trace lasts for 30 hours. The bots communicate with a controlled C&C server (IRC or HTTP server) and execute the received commands. We set up a virtual network environment with 17 Windows XP virtual machines using VirtualBox. We ran each bot on four Windows XP virtual machines and an IRC server and an HTTP server on one Windows XP virtual machine. B. Evaluation Results In order to validate the detection accuracy of our approach, we mixed botnet traffic to normal traffic. We also initially did not apply the forth filtering rule listed in section Netflow Filtering (whitelist) on traffic traces. Table II reports the detection results for each botnet. Table II shows that our approach is able to detect all four botnets. For 3 out of 4 botnets, we obtained 100% detection rate, i.e., we successfully identified all the bots within the 3 botnets. For example, in the case of IRC botnets (SdBot and SpyBot), our approach correctly detected all of the botnet members. HTTP-Bot-I contains 4 bot clients. TABLE II. DETECTION RESULTS Trace Num. of Clients Detected as Bot FP/FN Normal /0 IRC-SdBot 4 4 0/0 IRC-SpyBot 4 4 0/0 HTTP-Bot-I 4 4 0/0 HTTP-Bot-II 4 2 0/2 Our approach was able to identify all of the bots. In the case of HTTP-Bot-II, we correctly detected bots. However, two of bots belonging to the botnet was not detected, which means that the detector generated two false negatives. There were some cases in which our approach also generated two false positives. We discovered that by applying the forth filtering rule of section 3.5 which use white list, the false positives no longer occur. As we can see, our approach performs very well in our experiments, showing very high detection accuracy with relatively low false positives in real-world network traces. V. CONCLUSION & FUTURE WORK Botnet detection is a very challenging research area. In this paper, we presented a fully anomaly-based botnet detection approach that requires no a priori knowledge of bot signatures, botnet C&C protocols, and C&C server addresses. Our approach is based on the intuition that bots respond to commands and perform malicious activities in a similar fashion. Our approach shows high detection accuracy on real-world botnets with a low false positive on normal traffic. In our future work, we will study DDoS attacks and implement a DDoS alert generating sub-component for our alert generating component. In addition, we plan to further improve the efficiency of the netflow clustering algorithm to work in very high speed networks. ACKNOWLEDGMENTS This work is supported by Iranian Education and Research Institute for Information and Communication Technology (ERICT) under grant 500/8974. REFERENCES [1] N. Ianelli and A. Hackworth. (2005) Botnets as a vehicle for online crime. [Online]. [2] J. Stewart. (2004) Bobax trojan analysis. [Online].
6 [3] J. Grizzard, V. Sharma, C. Nunnery, B. Kang, and D. Dagon, "Peer-to-peer botnets: Overview and case study," in Proceedings of USENIX HotBots 07, [4] R. Lemos. (2006) Bot software looks to improve peerage. [Online]. [5] J. Binkley and S. Singh, "An algorithm for anomaly-based botnet detection," in Proceedings of USENIX SRUTI 06, [6] A. Karasaridis, B. Rexroad, and D. Hoeflin, "Wide-scale botnet detection and characterization," in Proceedings of USENIX HotBots 07, [7] C. Livadas, R. Walsh, D. Lapsley, and W. Strayer, "Using machine learning techniques to identify botnet traffic," in Proceedings of the 2nd IEEE LCN Workshop on Network Security (WoNS 2006), [8] J. Goebel and T. Holz, "Rishi: Identify bot contaminated hosts by irc nickname evaluation," in Proceedings of USENIX HotBots 07, [9] G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, "BotHunter: Detecting malware infection through ids-driven dialog correlation," in Proceedings of the 16th USENIX Security Symposium (Security 07), [10] G. Gu, J. Zhang, and W. Lee, "BotSniffer: Detecting botnet command and control channels in network traffic," in Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 08), [11] G. Gu, R. Perdisci, J. Zhang, and W. Lee, "BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection," in Proceedings of the 17th USENIX Security Symposium (Security 08), [12] G. Gu, V. Yegneswaran, P. Porras, J. Stoll, and W. Lee, "Active Botnet Probing to Identify Obscure Command and Control Channels," in Proceedings of the25th Annual Computer Security Applications Conference (ACSAC 09), [13] D. Pelleg and A. Moore, "X-means: Extending k-means with efficient estimation of the number of clusters," in Proceedings of the Seventeenth International Conference on Machine Learning (ICML 00), [14] M. Bailey et al., "Automated classification and analysis of internet malware," in Proceedings of International Symposium on Recent Advances in Intrusion Detection (RAID 07), [15] P. Barford and V. Yegneswaran, "An Inside Look at Botnets," in Special Workshop on Malware Detection, Advances in Information Security, Springer Verlag, 2006.
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Botnet Detection using NetFlow and Clustering
Botnet Detection using NetFlow and Clustering Pedram Amini1, Reza Azmi2 and MuhammadAmin Araghizadeh3 1 2 3 ICT Department, Malek-Ashtar University of Technology Tehran, Iran [email protected] Department
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
, pp.81-90 http://dx.doi.org/10.14257/ijfgcn.2013.6.6.09 Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1, 2, Lei Yang 1 and Jin Wang 1 1 School of Computer
Symptoms Based Detection and Removal of Bot Processes
Symptoms Based Detection and Removal of Bot Processes 1 T Ravi Prasad, 2 Adepu Sridhar Asst. Prof. Computer Science and engg. Vignan University, Guntur, India 1 [email protected], 2 [email protected]
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
A Review on IRC Botnet Detection and Defence
A Review on IRC Botnet Detection and Defence Bernhard Waldecker St. Poelten University of Applied Sciences, Austria Bachelor programme: IT-Security 1 Introduction Nowadays botnets pose an enormous security
Botnet Detection Based on Traffic Monitoring
201O International Conference on Networking and Information Technology Botnet Detection Based on Traffic Monitoring Hossein Rouhani Zeidanloo, Azizah Bt Manaf Centre for Advanced Software Engineering University
Botnet Detection by Abnormal IRC Traffic Analysis
Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic Guofei Gu, Junjie Zhang, and Wenke Lee School of Computer Science, College of Computing Georgia Institute of Technology Atlanta,
P2P-BDS: Peer-2-Peer Botnet Detection System
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. V (Sep Oct. 2014), PP 28-33 P2P-BDS: Peer-2-Peer Botnet Detection System Navjot Kaur 1, Sunny
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee USENIX Security Symposium (Security 07) Presented by Nawanol
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
An Efficient Methodology for Detecting Spam Using Spot System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
Multi-phase IRC Botnet and Botnet Behavior Detection Model
Multi-phase IRC otnet and otnet ehavior Detection Model Aymen Hasan Rashid Al Awadi Information Technology Research Development Center, University of Kufa, Najaf, Iraq School of Computer Sciences Universiti
Protecting DNS Query Communication against DDoS Attacks
Protecting DNS Query Communication against DDoS Attacks Ms. R. Madhuranthaki 1, Ms. S. Umarani, M.E., (Ph.D) 2 II M.Tech (IT), IT Department, Maharaja Engineering College, Avinashi, India 1 HOD, IT Department,
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Botnet Attacks
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Botnet Attacks R. Kannan Department of Computer Science Sri Ramakrishna Mission Vidyalaya College of Arts and Science Coimbatore,Tamilnadu,India.
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
BOTNET Detection Approach by DNS Behavior and Clustering Analysis
BOTNET Detection Approach by DNS Behavior and Clustering Analysis Vartika Srivastava, Ashish Sharma Dept of Computer science and Information security, JIIT Noida, India Abstract -Botnets are one of the
Social Networking for Botnet Command and Control
Social Networking for Botnet Command and Control Ashutosh Singh, Annie H. Toderici, Kevin Ross, and Mark Stamp San Jose State University, San Jose, California Email: [email protected], [email protected],
A Review on Botnet and Detection Technique
A Review on Botnet and Detection Technique Jignesh Vania #1, Arvind Meniya #2, H. B. Jethva *3 # IT Dept (M.E.)-SSEC, Bhavnagar,*CE Dept-LDCE, Ahmedabad Gujarat Technological University, Ahmedabad Abstract--
Detecting P2P-Controlled Bots on the Host
Detecting P2P-Controlled Bots on the Host Antti Nummipuro Helsinki University of Technology anummipu # cc.hut.fi Abstract Storm Worm is a trojan that uses a Peer-to-Peer (P2P) protocol as a command and
Intrusion Detection System
Intrusion Detection System Time Machine Dynamic Application Detection 1 NIDS: two generic problems Attack identified But what happened in the past??? Application identification Only by port number! Yet
2014 ASE BIGDATA/SOCIALCOM/CYBERSECURITY Conference, Stanford University, May 27-31, 2014 ASE 2014 ISBN: 978-1-62561-000-3 1
ASE 2014 ISBN: 978-1-62561-000-3 1 Network Traffic Analysis of ZeroAccess Bot Shree Garg, Anil K. Sarje, Sateesh K. Peddoju Department of Computer Science & Engineering Indian Institute of Technology Roorkee,
LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic
LASTLINE WHITEPAPER The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic Abstract A distinguishing characteristic of bots is their ability to establish a command and
Multifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Behaviour Based Worm Detection and Signature Automation
Journal of Computer Science 7 (11): 1724-1728, 2011 ISSN 1549-3636 2011 Science Publications Behaviour Based Worm Detection and Signature Automation 1 Mohammed Anbar, 1 Selvakumar Manickam, 2 Al-Samarraie
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013
Security workshop Belnet Aris Adamantiadis Brussels 18 th April 2013 Agenda What is a botnet? Symptoms How does it work? Life cycle How to fight against botnets? Proactive and reactive NIDS 2 What is a
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
Bro at 10 Gps: Current Testing and Plans
U.S. Department of Energy Bro at 10 Gps: Current Testing and Plans Office of Science Brian L. Tierney Lawrence Berkeley National Laboratory Bro s Use at LBL Operational 24 7 since 1996 Monitors traffic
C&C Botnet Detection over SSL
C&C Botnet Detection over SSL Riccardo Bortolameotti University of Twente - EIT ICT Labs masterschool [email protected] Dedicated to my parents Remo and Chiara, and to my sister Anna 2
Peer-to-Peer Botnets. Chapter 1. 1.1 Introduction
Chapter 1 Peer-to-Peer Botnets Ping Wang, Baber Aslam, Cliff C. Zou School of Electrical Engineering and Computer Science, University of Central Florida, Orlando, Florida 32816 Botnet is a network of computers
SECURING APACHE : DOS & DDOS ATTACKS - II
SECURING APACHE : DOS & DDOS ATTACKS - II How DDoS attacks are performed A DDoS attack has to be carefully prepared by the attackers. They first recruit the zombie army, by looking for vulnerable machines,
Review Study on Techniques for Network worm Signatures Automation
Review Study on Techniques for Network worm Signatures Automation 1 Mohammed Anbar, 2 Sureswaran Ramadass, 3 Selvakumar Manickam, 4 Syazwina Binti Alias, 5 Alhamza Alalousi, and 6 Mohammed Elhalabi 1,
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)
ISCA Journal of Engineering Sciences ISCA J. Engineering Sci. Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) Abstract Tiwari Nitin, Solanki Rajdeep
BotNets- Cyber Torrirism
BotNets- Cyber Torrirism Battling the threats of internet Assoc. Prof. Dr. Sureswaran Ramadass National Advanced IPv6 Center - Director Why Talk About Botnets? Because Bot Statistics Suggest Assimilation
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
Detection of Botnets Using Honeypots and P2P Botnets
Detection of Botnets Using Honeypots and P2P Botnets Rajab Challoo Dept. of Electrical Engineering & Computer Science Texas A&M University Kingsville Kingsville, 78363-8202, USA Raghavendra Kotapalli Dept.
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries Kazumichi Sato 1 keisuke Ishibashi 1 Tsuyoshi Toyono 2 Nobuhisa Miyake 1 1 NTT Information Sharing Platform Laboratories,
Storm Worm & Botnet Analysis
Storm Worm & Botnet Analysis Jun Zhang Security Researcher, Websense Security Labs June 2008 Introduction This month, we caught a new Worm/Trojan sample on ours labs. This worm uses email and various phishing
The HoneyNet Project Scan Of The Month Scan 27
The HoneyNet Project Scan Of The Month Scan 27 23 rd April 2003 Shomiron Das Gupta [email protected] 1.0 Scope This month's challenge is a Windows challenge suitable for both beginning and intermediate
Cisco RSA Announcement Update
Cisco RSA Announcement Update May 7, 2009 Presented by: WWT and Cisco Agenda Cisco RSA Conference Announcements Collaborate with Confidence Overview Cisco s Security Technology Differentiation Review of
Networks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
Measuring Botnets in the Wild: Some New Trends
Measuring Botnets in the Wild: Some New Trends Wentao Chang 1 Aziz Mohaisen An Wang 1 Songqing Chen 1 1 George Mason University Verisign Labs {wchang7, awang1, sqchen}@gmu.edu [email protected] ABSTRACT
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains
ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park
21. Botnets ENEE 757 CMSC 818V Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park http://ter.ps/757 https://www.facebook.com/sdsatumd Today s Lecture Where we ve been AuthenDcaDon
Flow-based detection of RDP brute-force attacks
Flow-based detection of RDP brute-force attacks Martin Vizváry [email protected] Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal [email protected] Institute of Computer
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
Nemea: Searching for Botnet Footprints
Nemea: Searching for Botnet Footprints Tomas Cejka 1, Radoslav Bodó 1, Hana Kubatova 2 1 CESNET, a.l.e. 2 FIT, CTU in Prague Zikova 4, 160 00 Prague 6 Thakurova 9, 160 00 Prague 6 Czech Republic Czech
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Attack and Defense Techniques 2
Network Security Attack and Defense Techniques 2 Anna Sperotto, Ramin Sadre Design and Analysis of ommunication Networks (DAS) University of Twente The Netherlands Firewalls Network firewall Internet 25
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Intrusion Forecasting Framework for Early Warning System against Cyber Attack
Intrusion Forecasting Framework for Early Warning System against Cyber Attack Sehun Kim KAIST, Korea Honorary President of KIISC Contents 1 Recent Cyber Attacks 2 Early Warning System 3 Intrusion Forecasting
2010 Carnegie Mellon University. Malware and Malicious Traffic
Malware and Malicious Traffic What We Will Cover Introduction Your Network Fundamentals of networks, flow, and protocols Malicious traffic External Events & Trends Malware Networks in the Broad Working
Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.
TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy
Peer-to-Peer Botnet Detection Using NetFlow Master Thesis
Peer-to-Peer Botnet Detection Using NetFlow Master Thesis Connor Dillon System and Network Engineering University of Amsterdam July 11, 2014. Abstract.. Traditional botnets use a centralized communications
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology Project Proposal 1 Project Proposal 2 Abstract Honeypot systems are readily used by organizations large and
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
An Empirical Analysis of Malware Blacklists
An Empirical Analysis of Malware Blacklists Marc Kührer and Thorsten Holz Chair for Systems Security Ruhr-University Bochum, Germany Abstract Besides all the advantages and reliefs the Internet brought
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
We Know It Before You Do: Predicting Malicious Domains
We Know It Before You Do: Predicting Malicious Domains Abstract Malicious domains play an important role in many attack schemes. From distributing malware to hosting command and control (C&C) servers and
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Network Monitoring Tool to Identify Malware Infected Computers
Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India [email protected] Megha Jain, Payas
VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION
VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION Kleissner & Associates Botconf 14, 3-5 Dec 2014, Nancy/France Worlds largest botnet monitoring system Since September 2012 Originally
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
BotTracer: Execution-based Bot-like Malware Detection
BotTracer: Execution-based Bot-like Malware Detection Lei Liu 1, Songqing Chen 1, Guanhua Yan 2, and Zhao Zhang 3 1 Dept. of Computer Science 2 Information Sciences 3 Dept. of Electrical and Computer Engineering
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
How To Stop A Ddos Attack On A Website From Being Successful
White paper Combating DoS/DDoS Attacks Using Cyberoam Eliminating the DDoS Threat by Discouraging the Spread of Botnets www.cyberoam.com Introduction Denial of Service (DoS) and Distributed Denial of Service
Classic IOS Firewall using CBACs. 2012 Cisco and/or its affiliates. All rights reserved. 1
Classic IOS Firewall using CBACs 2012 Cisco and/or its affiliates. All rights reserved. 1 Although CBAC serves as a good foundation for understanding the revolutionary path toward modern zone based firewalls,
