Netgator: Malware Detection Using Program Interactive Challenges. Brian Schulte, Haris Andrianakis, Kun Sun, and Angelos Stavrou



Similar documents
SSL Inspection Step-by-Step Guide. June 6, 2016

Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Multifaceted Approach to Understanding the Botnet Phenomenon

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

ADVANCED SECURITY How Zscaler Tackles Emerging Web Threats with High Speed, Real- Time Content Inspection in the Cloud

Chapter 7 Transport-Level Security

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Inspection of Encrypted HTTPS Traffic

WildFire Cloud File Analysis

Webmail Using the Hush Encryption Engine

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

CS 558 Internet Systems and Technologies

HTTPS Inspection with Cisco CWS

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Malicious Network Traffic Analysis

Internet Content Distribution

Fighting Advanced Threats

EE 7376: Introduction to Computer Networks. Homework #3: Network Security, , Web, DNS, and Network Management. Maximum Points: 60

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

User Guide. You will be presented with a login screen which will ask you for your username and password.

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

VOICE OVER IP SECURITY

The Secure Web Access Solution Includes:

Network Security - ISA 656 Application Firewalls

Overview. SSL Cryptography Overview CHAPTER 1

NETASQ MIGRATING FROM V8 TO V9

Skoot Secure File Transfer

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Hack Proof Your Webapps

Topics in Network Security

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Cyber Security Workshop Ethical Web Hacking

Protecting the Infrastructure: Symantec Web Gateway

Firewalls, Tunnels, and Network Intrusion Detection

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Synology QuickConnect

Advanced Persistent Threats

Networking and High Availability

Intrusion Detection System

Unified Security, ATP and more

Advanced Higher Computing. Computer Networks. Homework Sheets

Data Sheet. VLD 500 A Series Viaedge Load Director. VLD 500 A Series: VIAEDGE Load Director

The Application Delivery Controller Understanding Next-Generation Load Balancing Appliances

Cleaning Encrypted Traffic

Chapter 17. Transport-Level Security

Brocade Virtual Traffic Manager and Oracle WebLogic Applications Deployment Guide

SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation

Using a Malicious Proxy to Pilfer Data & Wreak Havoc. Edward J. Zaborowski ed@thezees.net


Network Security Solution. Arktos Lam

Securing Web Services From Encryption to a Web Service Security Infrastructure

Networking and High Availability

Basheer Al-Duwairi Jordan University of Science & Technology

Project X Mass interception of encrypted connections

Blind as a Bat? Supporting Packet Decryption for Security Scanning

Tor Anonymity Network & Traffic Analysis. Presented by Peter Likarish

The Evolution of Application Acceleration:

Name: 1. CSE331: Introduction to Networks and Security Fall 2003 Dec. 12, /14 2 /16 3 /16 4 /10 5 /14 6 /5 7 /5 8 /20 9 /35.

Divide and Conquer Real World Distributed Port Scanning

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

S y s t e m A r c h i t e c t u r e

The Benefits of SSL Content Inspection ABSTRACT

Implementation of Botcatch for Identifying Bot Infected Hosts

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Chapter 9 Firewalls and Intrusion Prevention Systems

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Security vulnerabilities in the Internet and possible solutions

DiamondStream Data Security Policy Summary

Network Address Translation (NAT)

What is Web Security? Motivation

Linux Network Security

Firewall Design Principles Firewall Characteristics Types of Firewalls

Cisco Application Networking for IBM WebSphere

Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Lecture 15 - Web Security

Jort Kollerie SonicWALL

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Covert Operations: Kill Chain Actions using Security Analytics

ReadyNAS Remote White Paper. NETGEAR May 2010

Networking for Caribbean Development

Reverse Proxy for Trusted Web Environments > White Paper

The Application Front End Understanding Next-Generation Load Balancing Appliances

Transcription:

Netgator: Malware Detection Using Program Interactive Challenges Brian Schulte, Haris Andrianakis, Kun Sun, and Angelos Stavrou

Intro Increase of stealthy malware in enterprises Obfuscation, polymorphic techniques Often uses legitimate communication channels HTTP Volume of traffic makes it difficult to process all communications HTTPS Lack of inspection currently Disguised as legitimate applications

Intro Netgator Inspection of legitimate ports/protocols Port 80, HTTP/S Transparent proxy 2 parts Passive Determine type of application Easily catch dumb malware Active Challenge based on expected functionality (PICs)

Intro Focus on HTTP/S, browsers Study of 1026 malware samples Out of samples where network activity was observed, ~80% utilized HTTP/S Very high percentage of HTTP/S malware try to masquerade as browsers None passed our challenges

Intro PIC Challenge comprised of a request and expected response pair Communication intercepted Response it sent back to exercise known functionality of advertised program If expected answer is returned, communication is allowed to pass through If not, drop connection

Intro 2 pronged approach Passive to classify traffic Active to challenge application Prototype built using HTML, Javascript, and Flash challenges Low overhead 353 ms end-to-end latency

Design and Implementation 2 major parts Passive Active Passive Establish type of application Browser, VOIP, OS updates, etc Signatures are determined by unique HTTP header orderings

Active Challenge Architecture Proxy & ICAP server duo Squid, HTTP/S transparent proxy Greasyspoon, Java based ICAP server What is ICAP? Internet Content Adaption Protocol Allows modification of all elements of HTTP request/response Body, headers, URL, etc

Active Challenge Architecture

Active Challenges For known applications, we challenge them based on known functionality For browsers, HTML/Flash/Javascript Challenge code comprised of a redirect to the originally requested file with a hash appended as a parameter To cut down on overhead, text/html data is challenged on the response

Active Challenges Two types Request Response Request challenging Stop the initial communication Send back challenge immediately Higher latency, good protection Response challenging Allow original response to come back Imbed challenge in original response Lower latency, possibly lower security

Active Challenges Request Challenge

Active Challenges Request challenging Hash is unique each time Based on time, requesting IP, requested URL, and secret key Headers replaced with HTTP response headers Forces the new response back to the client Challenge code example, Javascript:

Active Challenge Response Challenge Challenging every request at the request would cause a lot of overhead Challenge text/html data at the response Let the original request pass through Insert challenge inside the original response Client gets response and then challenge is processed

Active Challenge Response Challenge

Active Challenges The hash is what tells the proxy if the application passed the challenge Attacker can just parse out hash Encrypt the hash with a Javascript implementation of AES The challenge that is sent back now contains the code (and key) to decrypt the hash Forces the attacker to have a full Javascript engine to decrypt the hash

Active Challenges Handling SSL Squid s SSL-bump utilized Traffic encrypted with Netgator s key Decrypted at proxy for processing Re-encrypted with external site s key when leaving proxy

Active Challenges Further cutting down on overhead Automatically pass network requests if the client has passed a challenge for that site s domain Client has passed challenge for www.foo.com Request for www.foo.com/bar passes automatically Records are periodically cleaned Avoid malware piggy-backing off legitimate client s who passed challenges

Experimental Evaluation Used PlanetLab nodes for download tests Downloads of 3 different file sizes 10KB, 100KB, 1MB 3 challenges types HTML, Javascript, Flash Request and Response challenging

Experimental Evaluation

Experimental Evaluation HTML lowest overhead Javascript results Nice middle ground between difficulty to pass challenge and measured overhead Flash results Highest overhead Toughest challenge, combines Javascript and Flash Response challenge results By far the lowest, lower security though since the original response is let through

Discussion Attackers will attempt evasion Using a different user-agent/header signature If unknown, communications are blocked If known, challenge will still be sent Some legitimate applications might not be able to have challenges crafted Whitelist can be created

Related Works Closest to our work is work by Gu et al. Active botnet probing to identify obscure command and control channels Main differences We do not expect nor ever rely on a human to be behind an application s communications Our work focuses on legitimate applications rather than malicious botnets

Related Works Our work similar to OS and application fingerprinting Nmap CAPTCHA puzzles Instead of focusing on humans, focus on the application Traditional botnet detection BotSniffer, BotHunter, BotMiner

Conclusion Netgator Inline malware detection system 2 parts Passive to classify traffic and thwart dumb malware Active to challenge applications identity Program Interactive Challenges Fully transparent to the user Average latency 353ms for request challenges 24ms for response challenges