Preetham Mohan Pawar (1000919136)



Similar documents
Internet Monitoring via DNS Traffic Analysis. Wenke Lee Georgia Institute of Technology

DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic

Detecting Malware Domains at the Upper DNS Hierarchy

WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

We Know It Before You Do: Predicting Malicious Domains

Next-Generation DNS Monitoring Tools

EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION

Chapter 25 Domain Name System Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Building a Dynamic Reputation System for DNS

Understanding DNS (the Domain Name System)

EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis

Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis

Detecting Hidden Anomalies in DNS Communication

Comprehensive Understanding of Malicious Overlay Networks

Whose IP Is It Anyways: Tales of IP Reputation Failures

Lecture 2 CS An example of a middleware service: DNS Domain Name System

3. The Domain Name Service

DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic

Cymon.io. Open Threat Intelligence. 29 October 2015 Copyright 2015 esentire, Inc. 1

Security Intelligence Blacklisting

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Computer Networks: Domain Name System

Glossary of Technical Terms Related to IPv6

Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries

Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic

Zscaler Internet Security Frequently Asked Questions

Understand Names Resolution

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

The Domain Name System

An Empirical Analysis of Malware Blacklists

NET0183 Networks and Communications

LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic

FILTERING FAQ

Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

Concierge SIEM Reporting Overview

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

Inspecting DNS Flow Traffic for Purposes of Botnet Detection

Configuring DNS. Finding Feature Information

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Mobile App Reputation

IMPROVING INTERNET SECURITY VIA LARGE-SCALE PASSIVE AND ACTIVE DNS MONITORING

Next Generation IPS and Reputation Services

The Domain Name System (DNS)

Indicator Expansion Techniques Tracking Cyber Threats via DNS and Netflow Analysis

Domain Name Servers. Domain Types WWW host names. Internet Names. COMP476 Networked Computer Systems. Domain Name Servers

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

STARTER KIT. Infoblox DNS Firewall for FireEye

- Domain Name System -

LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages

McAfee Network Security Platform Administration Course

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

User Documentation Web Traffic Security. University of Stavanger

APPLICATION PROGRAMMING INTERFACE

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Domain Name Service (DNS) Training Division, NIC New Delhi

An Intrusion Detection System for Kaminsky DNS Cache poisoning

Content Inspection Features

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper

Use Domain Name System and IP Version 6

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

NTT R&D s anti-malware technologies

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Tracking and Characterizing Botnets Using Automatically Generated Domains

Operation Liberpy : Keyloggers and information theft in Latin America

The Hillstone and Trend Micro Joint Solution

Lesson 13: DNS Security. Javier Osuna GMV Head of Security and Process Consulting Division

SES / CIF. Internet2 Combined Industry and Research Constituency Meeting April 24, 2012

Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy

SIE, PassiveDNS, and data combining

Naming and the DNS. Focus. How do we name hosts etc.? Application Presentation Topics. Session Domain Name System (DNS) /URLs

How we keep harmful apps out of Google Play and keep your Android device safe

EVILSEED: A Guided Approach to Finding Malicious Web Pages

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

ThreatSTOP Technology Overview

Malware Detection in Android by Network Traffic Analysis

Access Control Rules: URL Filtering

Managing Name Resolution

Implementation of Botcatch for Identifying Bot Infected Hosts

WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware

The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling

Migration Project Plan for Cisco Cloud Security

Transcription:

Charles Lever, Manos Antonakakis, Brad Reaves, Patrick Traynor, Wenke Lee Presented By:- Preetham Mohan Pawar (1000919136) University of Texas, Arlington CSE

Introduction. Basic concepts.( DNS ) Mobile Device Identification Process.(TASK 1) Filtering Benign Domains.(TASK 2) Feature Extraction. Dataset Summary. Results. University of Texas, Arlington CSE

Malware writers have begun to pay attention to mobile phones. Google and Apple have also invested significant resources in an attempt to prevent malicious applications from being installed on mobile devices and for later removing such applications if necessary. The extent to which the mobile ecosystem is actually infected by such malware is not well understood. verify hypothesis experimentally using three weeks of DNS data from a major US based cellular provider and a noncellular provider collected over the course of three months. University of Texas, Arlington CSE

Known mobile malware samples are virtually unseen. Infected: 3,492 out of 380,537,128 devices, or less than 0.0009% of the population. Malware writers are failing to infect mobile devices with much success Compare traffic to suspicious hosts from ios against all other devices. Analysis demonstrates that approximately 8% of ios-based devices communicate with known suspicious hosts, virtually the identical frequency as all other mobile platforms. Observe campaigns with mobile malware clients. Analyze two major threats with mobile malware clients. University of Texas, Arlington CSE

DNS is a backbone protocol for the Internet that maps easy-to-remember domain names to IP network addresses. The domain name space is arranged as a tree, beginning with a root node. under the root node are the top-level domains (TLDs), and under the TLDs are the second-level domains, and so on. A fully qualified domain name (FQDN) includes all domain levels that describe the node in the DNS tree. Effective TLDs University of Texas, Arlington CSE

University of Texas, Arlington CSE

A DNS query is initiated by a DNS resolver running on a host. Issue a recursive request using a stub resolver to the recursive DNS resolver(rdns). RDNS is charged with completing the iterative portion of the DNS resolution process. The RDNS will typically cache the RR locally for up to some period, the Time To Live (TTL). University of Texas, Arlington CSE

Data collection of DNS queries received at the RDNS. pdns data collection typically includes all of the information associated with the successfully resolved DNS queries by the RDNS. University of Texas, Arlington CSE

Advantages: Malicious queries are able to be logged and analyzed without alerting the owners of the malicious domains. pdns data collection allows the discovery of malicious domains not previously known to exist on DNS blacklists (DNSBL) Disadvantages: data collected will be limited by the amount of traffic handled by the RDNS. University of Texas, Arlington CSE

Representation of a DNS query, qj, for a domain name, d, and the related DNS response, rj, as tuple Qj(d) = (Tj,Rj, IPsj), where Tj identifies the epoch in which the query-response was observed Rj is the unique identification of the device that initiated the query qj d is the queried domain, and IPsj is the set of resolved hosts as reported in the response rj

Proprietary data is received from the carrier that allows us to attribute traffic to a mobile device operating on the network for each epoch. set of mobile devices in an epoch. MDEVi = {Rk}k=1...l be a set that contains all l mobile device identifiers (Rk) for epoch i, and i ε EPOCHS. set of domains resolved by MDEVi in epoch i as mdni = {dk}k=1...n, where n is the number of domains (dk).

some domains are strongly or exclusively associated with mobile applications. Examples: Google s AdMob [1] advertising network is only supported on Android and ios Devices are labeled as mobile only if they contact a domain d with a mobile indicator or domains strongly associated with mobile applications or services. small number of cases where overlap exists, we tag a device as unknown and do not consider its behavior as reflective of mobile devices

The first step in this process is identifying and removing known benign traffic from our dataset. We achieve this by whitelisting all requests made to the top 750,000 effective second level domains (e2lds) according to Alexa [ http://preview.alexa.com/about ]. Dynamic Domain name systems are not whitelisted. further filter benign traffic by manually inspecting list of approximately 800 e2lds based on the lookup volume of the queried domains. This follows power law[ http://en.wikipedia.org/wiki/power_law ]. In the small number of cases where overlap exists, we tag a device as unknown and do not consider its behavior as reflective of mobile devices. mdrdcj = {dk}k=1...n, where mdrdcj is a set that contains all n not whitelisted domain names (dk) resolved by mobile devices in epoch j

Two features from this group: The number of elements in the sets fpdns(ip)(non cellular domains). The number of elements in the sets fj cell(ip)(cellular domains). It returns a set of domain names dk The PF feature family, which is based on passive DNS data, will show to what extent the hosts from mobile RRs (directly or indirectly) can be associated with DNS resolutions from a non-cellular ISP.

These features describe direct reputations of the IP addresses in the set HOSTSj. We compute three features for each IP address: fmal(ip), the count of unique malware associated with ip, furl(ip), the count of URLs associated with ip, and fpbl(ip), the count of public blacklisting incidents associated with ip. The EF features, will show us to what extent the already tainted Internet hosting infrastructure is currently used directly by mobile devices.

Observations from the Cellular Carrier Traffic

Comparing cellular DNS traffic with: Public blacklist data (PBL) Phishing and drive-by download evidence (URL) Hosts accessed by known malicious applications (MAL). Mobile Blacklist containing 2,914 domains known to be malicious.

It is important note that our cellular DNS traffic sensor aggregates data from several different locations in different time zones.

Interested in unique Internet-based hosts requested by mobile devices. The filtering process results in the set HOST Sall having the following characteristics: At least one resolution request for each host was observed by the cellular carrier. The observed DNS requests came strictly from devices classified as mobile. The hosts are not associated with any known benign infrastructure, and The host is a routable IP address.

Notos [ http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1 72.8010 ] reputation scores to the RRs that have IPs in the HOST Sall set, and use reputation threshold of 0.8 (or above 80% probability of the RR being malicious), we obtain 51,503 domain names (3,636 distinct IPs) as likely suspicious. Only 18 domain names of them have been listed in mobile blacklist.

We observe that 38% of the hosts corresponding to applications from Zhou et al dataset, have been historically associated with more than one malware samples. Approximately 23% of hosts in HOSTSsoftandroid dataset, can also be linked with more that one malware samples. Google play has the lowest percentage 10% linked with more than one sample.

Tainted hosts requested by mobile platforms

These threat class was found in the public blacklist. All of these threats classes were seen in pdns cellular network and were visited by mobile devices.

Mobile malware in the cellular network

The most prevalent malicious family in the network was FakeDoc. The second most popular malware family was NotCompatible. Only 9,033 devices of any type out of a total of over 480M million (0.001%), and 3,492 devices out of a total of 380M confirmed mobile devices (0.0009%) contacted a domain known to facilitate mobile malware.

Classified into 2 threats. Threat ε and Threat β. Both android application. Threat ε aims on obtaining user s credentials with the help of a login screen. Threat β calls a service with periodically contacts a C&C server. [ http://security.radware.com/knowledgecenter/ddospedia/command-and-control-server/ ] Command and Control (C&C) servers are centralized machines that are able to send commands and receive outputs of machines part of a botnet.

Reactive security measures failed to detect a threat until well after it was most effective. Second, both of these threats show a growth pattern similar to those shown in non-mobile malware studies [5]. Third, the agility in the hosting infrastructure used by these threats are similar to non-mobile botnet operators that commonly use tactics like moving to hosts in different networks and countries to provide agility to their illicit operations.

1. http://security.radware.com/knowledgecenter/ddospedia/command-and-controlserver/ 2. http://citeseerx.ist.psu.edu/viewdoc/summary? doi=10.1.1.172.8010 3. http://preview.alexa.com/about 4. http://en.wikipedia.org/wiki/power_law 5. M. Antonakakis, R. Perdisci, W. Lee, N. Vasiloglou, and D. Dagon. Detecting malware domains at the upper DNS hierarchy. In Proceedings of the 20th USENIX Security Symposium, 2011.

Questions? THANK YOU