Comprehensive Understanding of Malicious Overlay Networks

Similar documents
Internet Monitoring via DNS Traffic Analysis. Wenke Lee Georgia Institute of Technology

Implementation of Botcatch for Identifying Bot Infected Hosts

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

Preetham Mohan Pawar ( )

WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA

We Know It Before You Do: Predicting Malicious Domains

Flow Analysis Versus Packet Analysis. What Should You Choose?

DYNAMIC DNS: DATA EXFILTRATION

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

DNS Firewalls with BIND: ISC RPZ and the IID Approach. Tuesday, 26 June 2012

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Inside the Storm: Protocols and Encryption of the Storm Botnet

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

Secure Your Mobile Workplace

Next-Generation DNS Monitoring Tools

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Network Metrics Content Pack for VMware vrealize Log Insight

Redefining SIEM to Real Time Security Intelligence

Adaptive Intelligent Firewall - der nächste Entwicklungssprung der NGFW. Jürgen Seitz Systems Engineering Manager

SIE, PassiveDNS, and data combining

IBM Advanced Threat Protection Solution

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Next Generation IPS and Reputation Services

Kindred Domains: Detecting and Clustering Botnet Domains Using DNS Traffic "" " Matt Thomas" Data Architect, Verisign Labs"

Cymon.io. Open Threat Intelligence. 29 October 2015 Copyright 2015 esentire, Inc. 1

Network Monitoring using MMT:

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION

SourceFireNext-Generation IPS

Protecting DNS Query Communication against DDoS Attacks

UNMASKCONTENT: THE CASE STUDY

Unified Security, ATP and more

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

Extreme Networks: A SOLUTION WHITE PAPER

APPLICATION PROGRAMMING INTERFACE

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Fighting Advanced Threats

Description: Objective: Attending students will learn:

NGFW is yesterdays news what is next in scope for the firewall in the threat intelligence age

LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic

Nemea: Searching for Botnet Footprints

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

XPROBE-NG. What s new with upcoming version of the tool. Fyodor Yarochkin Armorize Technologies

Multifaceted Approach to Understanding the Botnet Phenomenon

Cloud Based Secure Web Gateway

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

Protecting the Infrastructure: Symantec Web Gateway

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

24/7 Visibility into Advanced Malware on Networks and Endpoints

Operation Liberpy : Keyloggers and information theft in Latin America

Cisco Advanced Malware Protection Sandboxing Capabilities

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Course Content: Session 1. Ethics & Hacking

Network Security Testing using MMT: A case study in IDOLE project

First Line of Defense

Swordfish

Indexing Full Packet Capture Data With Flow

EVILSEED: A Guided Approach to Finding Malicious Web Pages

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

How To Create A Spam Detector On A Web Browser

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

XPROBE. Building Efficient Network Discovery Tools. Fyodor Yarochkin

RAVEN, Network Security and Health for the Enterprise

Machine Learning for Cyber Security Intelligence

CYBERSECURITY INESTIGATION AND ANALYSIS

Analyzing HTTP/HTTPS Traffic Logs

CEH Version8 Course Outline

[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks

Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park

Security Intelligence Services.

Security Intelligence Blacklisting

PREDICT: A Data Repository for Cyber Security Research

Covert Operations: Kill Chain Actions using Security Analytics

Web Application Hosting Cloud Architecture

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

How To Protect Your Data From Being Hacked On Security Cloud

Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic

Anatomy of Cyber Threats, Vulnerabilities, and Attacks

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

NASCIO 2015 State IT Recognition Awards

A perspective to incident response or another set of recommendations for malware authors

Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath)

Symptoms Based Detection and Removal of Bot Processes

HTTPS Inspection with Cisco CWS

Transcription:

Comprehensive Understanding of Malicious Overlay Networks Cyber Security Division 2012 Principal Investigators Meeting October 10, 2012 Wenke Lee and David Dagon Georgia Institute of Technology wenke@cc.gatech.edu 404-808-5172 Roberto Perdisci, University of Georgia April Lorenzen, Dissect Cyber Paul Vixie, Internet Systems Consortium Jody Westby, Global Cyber Risk LLC Chris Smoak, GTRI Matt Jonkman, Open Information Security Foundation

Background Malware churn Very short shelf life Techniques: evasive packing; polymorphic malware; generative programming Noted example: Storm botnet, June 2006 (new sample pushed on hourly-basis) A botnet is not merely a single binary. It is the overlay network of malicious infrastructure and supporting malware samples. 2

Malware Sample Growth 3

Malware Sample Growth Salient points: Exponential growth Within our team, about 50 million samples The challenge is to analyze the clusters and collections of samples, not merely discrete samples. 4

Protocols Used in Malware 5

Protocols Used in Malware Salient points: Trend towards http, use of proxies, and overlay networks Port 80 provides a large haystack in which to hide, frustrating DPI. 6

DNS Agility in Malware 7

DNS Agility in Malware Salient points: Many associate with one domain But this is an artifact of malware churn a botnet may use hundreds of malware samples Our challenge is to identify collections and cluster related samples. 8

Example: TDSS Example Botnet: TDSS Millions of victims Components: rootkit; p2p; DGA; secondary drops reside in RAM-only Created by affiliate program ($20 to $200 for every 1,000 installations) Called indestructible by AV researchers 9

Example: TDSS Salient points: A cloud of DNS services and related malware Hundreds of colos; thousands of domains Incorporate other botnets, e.g., fake AV and clickfraud malware campaigns We must describe the network platform of related binaries and network resources, not just a slice of the botnet 10

Federated Malware Analysis System Will use GT's MNIF (Malware Network Intelligence Gathering and Analysis Framework) DURIP funded 2011 Designed to share intelligence with DETER Participants bring one or more of: Localized storage: I can't run malware, but I can store analysis VM Execution: I can execute/analyze malware, but lack storage/ips Transit/Filter/Egress: I only have IP addresses to offer; assuming there are sane policy controls on exit traffic 11

FMAS Overview 12

FMAS Design Criteria Process 100K+ samples/day, via distributed analysis system Three classes of messaging between federated hosts Management Messages: start/stop VMs, forcing firewall rule updates, add/remove nodes, etc Partial-Evidence Messages: Informational broadcasts representing partial learning from remote nodes. E.g., feature and vector observations, to be used in machine learning. Likely, only analysis nodes subscribe Conclusive Findings Messages: Announcing facts about samples (availability, AV scans, DNS analysis, clustering output, etc.) 13

FMAS Policy Layer Most industrial malware analysis runs samples in honeypots Existential risks Possible harm to 3rd parties Provides robust messaging/support for botnet (e.g. 3322.org takeover omitted 60-misc malicious domains, which then resolved via MS-operated DNS servers.) Taints data/analysis (e.g., if PII is obtained from analysis and shared in network) Global Cyber Risk (GCR) will perform extensive policy analysis 14

GCR Analysis Legal, policy and ethical analysis of proposed framework, noting data sources, handling, and FMAS interactions with other individuals and networks. Operator Agreements Draft MOUs for participants in FMAS Tailored to role (storage, execution, transit) Legal policies for malware analysis Policy analysis of passive DNS collection 15

DNS Analysis Construction of Passive DNS mirror Existing DNSDB mirror proving too critical to security companies, LEO, and analysts; research-oriented mirror required Includes vetting of operator agreements, data collection, identification of policy issues in above-therecursive data collection, etc. 16

Reputation Analysis Identify key properties of NS-reputation Goals Leverage large-scale domain intelligence (prefix whois, bulk whois for gtlds and cctlds) Create indexed datasets for high-speed and mobile access 17

Clustering Analysis Identify semantic equivalence between malware samples using system- and network-level analysis. Goals Identify optimal flexible execution schedule, to speculatively halt analysis of similar/redundant samples Selectively group samples using static/low-cost attributes to execute only a few group representatives, without loss of C&C information Identification of key domain, static, and URL-based features To be exported as a malware channel of broadcast information 18

Scaling Malware Execution Analyze bootstrap malware dataset Run each sample for a relatively long time (e.g., few hours) Group samples that behave similarly into malware families (clustering) Extract family behavior profiles for each malware family bootstrap phase 19

When Should We Stop? Running new samples (post-bootstrap phase) Frequently vet network/system behavior against family behavior profiles If a profile matches a known family: do malware in the family exhibit new behaviors if run for longer? Stop/continue execution accordingly post-bootstrap phase 20

Feature Extraction and Similarity Metrics Extract features from network behavior profiles Domain-related features Set of domain names queried Name, location and reputation of authoritative name servers IP-related features Set of contacted IPs Location and reputation of BGP prefixes and AS Features for HTTP-base malware URL structure path similarity, variable names, etc. Other HTTP request header characteristics E.g., anomalies in header compositions, compared to normal browser-generated headers 21

FMAS Status Identified sources for malware at about 100,000 samples/day No financial arrangement for samples Started work on NS reputation (esp. mobile analysis framework) Android: Search for Early2Rise https://play.google.com/store/apps/details\?id=com.di ssectcyber.early2rise Apple ios: Pending Apple review; request early access via https://testflightapp.com/register/ 22

Technology Transition Several team members are directly involved in network operations and policy work Malware samples, spam, DNS, and other real-world data Directly adopt technologies developed and publish/broadcast data (e.g., SIE at ISC) and guidelines Damballa a Georgia Tech spin-off, on-going collaboration, established tech transfer relationship When appropriate: malware samples to PREDICT, and malware analysis system part of DETER 23

Quad Chart Legal and policy framework for malware exchange Large-scale federated malware exchange and execution system Policy and technical framework for passive DNS collection Next-gen malware and domain correlation algorithms Real-time threat data Federated Malware Analysis System: Large-scale malware execution; scalability and quantitative transparency assessment; innovative egress filtering; next-gen baremetal framework Malware Repository: Vetted mirroring of binary and metadata with transparent, indepth policies Malware Clustering: Based on host- and network- based properties Real-time Data Analysis: Visualization and query of synthesis of data

Thank You!