Kindred Domains: Detecting and Clustering Botnet Domains Using DNS Traffic "" " Matt Thomas" Data Architect, Verisign Labs"



Similar documents
Detecting Search Lists in Authoritative DNS

Comprehensive Understanding of Malicious Overlay Networks

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA

DNS Footprint of Malware

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION

We Know It Before You Do: Predicting Malicious Domains

Report. Takeover of Virut domains

ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park

STATE OF DNS AVAILABILITY REPORT

Preetham Mohan Pawar ( )

Classifying DNS Heavy User Traffic by using Hierarchical Aggregate Entropy. 2012/3/5 Keisuke Ishibashi, Kazumichi Sato NTT Service Integration Labs

Domain Name Service (DNS) Training Division, NIC New Delhi

Detecting Algorithmically Generated Malicious Domain Names

Protecting the Infrastructure: Symantec Web Gateway

High Availability for Citrix XenApp

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

ARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table

INFORMATION SECURITY REVIEW

New Trends in FastFlux Networks

Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager

Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security

SIDekICk SuspIcious DomaIn Classification in the.nl Zone

Internet Security and Resiliency: A Collaborative Effort

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

The Growing Problem of Outbound Spam

DATA SHEET. What Darktrace Finds

Appendix D: Configuring Firewalls and Network Address Translation

Internet Monitoring via DNS Traffic Analysis. Wenke Lee Georgia Institute of Technology

Conficker Summary and Review Dave Piscitello, ICANN Senior Security Technologist 7 May 2010

Citrix Server: Citrix Server work as a remote connection by users

DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic

EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

Multifaceted Approach to Understanding the Botnet Phenomenon

The Domain Name Industry Brief Volume 4 - Issue 4 - June 2007

Next-Generation DNS Monitoring Tools

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

Indicator Expansion Techniques Tracking Cyber Threats via DNS and Netflow Analysis

Security Business Review

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Winning with DNS Failures: Strategies for Faster Botnet Detection

WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware

McAfee Network Security Platform Administration Course

D&D of malware with exotic C&C

Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis

THE DOMAIN NAME INDUSTRY BRIEF VOLUME 11 ISSUE 1 APRIL 2014

Botnet Detection with DNS Monitoring

VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Windows Server 2008 R2 Initial Configuration Tasks

DNS ROUND ROBIN HIGH-AVAILABILITY LOAD SHARING

Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS

Blind Spot Analysis Finding RAT Communications through Entropy and Analytics

Implementation of Botcatch for Identifying Bot Infected Hosts

DNS Firewalls with BIND: ISC RPZ and the IID Approach. Tuesday, 26 June 2012

BOTNET Detection Approach by DNS Behavior and Clustering Analysis

How To Mitigate A Ddos Attack

Adaptive Intelligent Firewall - der nächste Entwicklungssprung der NGFW. Jürgen Seitz Systems Engineering Manager

trends in mobile malware and importance of network based user protection

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

GroupWise SMTP Infrastructure Design:

How To Install A Citrix Netscaler On A Pc Or Mac Or Ipad (For A Web Browser) With A Certificate Certificate (For An Ipad) On A Netscaler (For Windows) With An Ipro (For

GLOBAL SERVER LOAD BALANCING WITH SERVERIRON

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries

CIT 480: Securing Computer Systems. Malware

dnsperf DNS Performance Tool Manual

A General-purpose Laboratory for Large-scale Botnet Experiments

Deploying the BIG-IP System with Microsoft Lync Server 2010 and 2013 for Site Resiliency

Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic

How To Test For Security Protection

Measurement of the Usage of Several Secure Internet Protocols from Internet Traces

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Botnet Detection by Abnormal IRC Traffic Analysis

Transcription:

Kindred Domains: Detecting and Clustering Botnet Domains Using DNS Traffic "" " Matt Thomas" Data Architect, Verisign Labs"

About the Author"! Matthew Thomas! Data Architect" Verisign Labs"! Aziz Mohaisen! Sr. Research Scientist" Verisign Labs"

An Overview of Command & Control Botnets" Malware commonly uses Domain Fast-Fluxing or Domain Generation Algorithms (DGA)" Typically seeded by system clock" Domains span many TLDs" DNS traffic lookup patterns will emerge as all infected hosts resolve the same set of domains" " Most result in NXDomain"

Conficker: The Quintessential DGA" A malware family that popularized the concept of DGA" Thousands of infected machines still exist" Many variants each generates different set of domains" " DGA Algorithm was reverse engineered" Provides set of domains generated for each variant for a given day" Useful ground truth for detection" " How does Conficker traffic differ from typical NXD traffic?"

NXDomain Traffic Data" Daily volume of NXD traffic for CC/TV/NET/COM" NXD traffic is associated with domains not registered, mistyped, etc"

NXDomain Traffic Data" Daily number of unique Second Level Domains (SLDs)" The traffic is NXD (not registered domains, mistyped, etc)"

NXDomain Traffic Data" COM typically sees ~2.5 billion NXD requests per day and spans over 350 million unique SLDs" NET receives 500 million NXD requests over 60M SLDs (SLDs that are not registered, or mistyped)" cctlds receive significantly less traffic, and less NXD" What s the distribution of requests per SLD?"

NXDomain Traffic Data" CDF of average number of NXD requests per SLD "

NXDomain Traffic Data" CDF of number of days an SLD appears in a week"

NXDomain Traffic Data" Average SLD receives minimal amount of NXD traffic" 95% of SLD s NXD receive less than 10 requests within 24 hours" High churn rate within the SLD set during a week" How does Conficker s NXD traffic compare?"

Conficker s NXDomain Traffic Data" NXD traffic volume for DGA domains prior, during and after their expected generation date"

Conficker s NXDomain Traffic Data" NXD traffic diversity (/24 of the RNS) for DGA domains prior, during and after their expected generation date"

Conficker s NXDomain Traffic Data" Despite specific generation date, DGA domains receive traffic pre and post its specific generation date" Possible global clock skew; also possible misconfiguration " Large amount of traffic from diverse set of RNS for SLDs" Statistical abnormal compare to whole NXD population" How can we detect and associate malware domains?"

Detection and Clustering" 14"

Computing Traffic Similarity" We try to address the following questions:" How similar are traffic streams to each other?" Can the similarity be used to group different traffic streams?" " The similarity function is a real-valued function that quantifies the similarity between two entities" Jaccard Index is a statistic for comparing the similarity and diversity of sample sets (one among many)"

Conficker s Traffic Similarity" CDF of pairwise domain similarities for a set of DGA domains based on on their /24 RNS set for a given day"

Conficker s Traffic Similarity" Count 0 300 Color Key and Histogram 0.2 0.6 1 Value DPNRUQ.NET CBCBXK.NET NPQNVINF.NET USELIWHA.NET QKYHNAYL.NET HSHANWTDLL.NET EHFDZ.NET MVTJJUXUPV.NET HZWCBP.NET XBEUEHK.NET EASNKBZWVV.NET WVVXHZFHQH.NET HXMLZIZLTZK.NET Subset of domains from Conficker A & B clustered based on similarity using single-linkage algorithm" BBXGVLDEGGF.NET TGAABUXBHB.NET QBUJK.NET OQXMBVJYXU.NET VVVSBPUEHOL.NET LQWMPTBZHW.NET IMZDCFIMQJ.NET SZSEVX.NET LALLKHU.NET NEJINHU.NET RLRZHORFIB.NET JGHUGKXS.NET ATQMS.NET DYBRGJS.NET AOENGA.NET OLDWTRKC.NET ZAKTDU.NET ZAKTDU.NET OLDWTRKC.NET AOENGA.NET DYBRGJS.NET ATQMS.NET JGHUGKXS.NET RLRZHORFIB.NET NEJINHU.NET LALLKHU.NET SZSEVX.NET IMZDCFIMQJ.NET LQWMPTBZHW.NET VVVSBPUEHOL.NET OQXMBVJYXU.NET QBUJK.NET TGAABUXBHB.NET BBXGVLDEGGF.NET HXMLZIZLTZK.NET WVVXHZFHQH.NET EASNKBZWVV.NET XBEUEHK.NET HZWCBP.NET MVTJJUXUPV.NET EHFDZ.NET HSHANWTDLL.NET QKYHNAYL.NET USELIWHA.NET NPQNVINF.NET CBCBXK.NET DPNRUQ.NET

Conficker s NXDomain Traffic Data" Domains on a specific DGA date have very high similarity measures, most measuring higher than 0.9" Techniques such as hierarchical clustering could potentially group domains from a specific DGA into distinct clusters based on DNS traffic similarity" " How do various similarity thresholds affect the cluster?" Count 0 300 0.2 0.6 Value 1 ZAKTDU.NET OLDWTRKC.NET AOENGA.NET DYBRGJS.NET ATQMS.NET JGHUGKXS.NET RLRZHORFIB.NET NEJINHU.NET LALLKHU.NET SZSEVX.NET IMZDCFIMQJ.NET LQWMPTBZHW.NET VVVSBPUEHOL.NET OQXMBVJYXU.NET QBUJK.NET TGAABUXBHB.NET BBXGVLDEGGF.NET HXMLZIZLTZK.NET WVVXHZFHQH.NET EASNKBZWVV.NET XBEUEHK.NET HZWCBP.NET MVTJJUXUPV.NET EHFDZ.NET HSHANWTDLL.NET QKYHNAYL.NET USELIWHA.NET NPQNVINF.NET CBCBXK.NET DPNRUQ.NET DPNRUQ.NET CBCBXK.NET NPQNVINF.NET USELIWHA.NET QKYHNAYL.NET HSHANWTDLL.NET EHFDZ.NET MVTJJUXUPV.NET HZWCBP.NET XBEUEHK.NET EASNKBZWVV.NET WVVXHZFHQH.NET HXMLZIZLTZK.NET BBXGVLDEGGF.NET TGAABUXBHB.NET QBUJK.NET OQXMBVJYXU.NET VVVSBPUEHOL.NET LQWMPTBZHW.NET IMZDCFIMQJ.NET SZSEVX.NET LALLKHU.NET NEJINHU.NET RLRZHORFIB.NET JGHUGKXS.NET ATQMS.NET DYBRGJS.NET AOENGA.NET OLDWTRKC.NET ZAKTDU.NET Color Key and Histogram

19"

Clustering Similarity Thresholds" 20"

Clustering Similarity Thresholds" The number of SLDs contained in a cluster at various similarity threshold levels"

Clustering Similarity Thresholds" The number of distinct clusters formed at various similarity threshold levels"

Clustering Similarity Thresholds" Temporal evolution of clusters based on SLDs present"

Global Malware Detection" 24"

Global Malware Detection" Similarity thresholds influence the number of clusters and the number of domains within each cluster" What resulting clusters appear when such a technique is applied to all NXD traffic?"

Global Malware Detection" Clusters identified with a similarity threshold set to > 0.9 " Each point is a cluster measures # domains and # RNS"

Global Malware Detection" Many detected clusters of malware/variants use a small amount of domains observable in our dataset" A few clusters generated several hundred domains" May influence evasiveness and resilience of a botnet" Several clusters have thousands of distinct /24s" Infection rate or prevalence of a malware"

Concluding Remarks and Future Work" We look at using the authoritative NXD traffic for identifying DGA s used as the C&C channel of malware" " We use the largest dataset from com/net resolution" Domain names used for C&C are identifiable by their request pattern" Different generations of the Conficker malware family are identified" Clustering of traffic yields interesting structures identifying evasion" Future works: We will look into extending the work" To other malware families using DNS for C&C" Highlight operation impact and evolution of evasion techniques" Explore spread of infections via remote sensing at the DNS level"

2014 VeriSign, Inc. All rights reserved. VERISIGN and other Verisign-related trademarks, service marks, and designs appearing herein are registered or unregistered trademarks and/or service marks of VeriSign, Inc., and/or its subsidiaries in the United States and in foreign countries. All other trademarks, service marks, and designs are property of their respective owners."