A General-purpose Laboratory for Large-scale Botnet Experiments



Similar documents
A Cost-efficient Building Automation Security Testbed for Educational Purposes

3-7 Reproduction and Emulation Technologies for Researches on Secure Networking

Isolated virtualised clusters: testbeds for high-risk security experimentation and training

TECHNICAL REPORT. An Analysis of Domain Silver, Inc..pl Domains

ISERink Overview. Version 1.1. February 1, 2015

The Network Meets the Cloud

NTT R&D s anti-malware technologies

How To Create A Botnet Lab

WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS

SimSecLab (SSL) A simulated environment for learning security, building trust, fostering privacy, and providing openness in e- Society

The DETER Project. Advancing the Science of Cyber Security Experimentation and Test

Operation Liberpy : Keyloggers and information theft in Latin America

LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages

This How To guide will take you through configuring Network Load Balancing and deploying MOSS 2007 in SharePoint Farm.

4 Applied Virtualization Technology

Microsoft Dynamics CRM 2011 Installation and Deployment

Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures

VIRTUALIZATION SECURITY IN THE REAL WORLD

Keep you computer running Keep your documents safe Identity theft Spreading infection Data Integrity (DPA: Data Protection Act)

An isolated virtual cluster for SCADA network security research

Multifaceted Approach to Understanding the Botnet Phenomenon

Automatic Extraction of Domain Name Generation Algorithms from Current Malware

When a testbed does more than testing


CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Emulating an Embedded Firewall

Network Security Demonstration - Snort based IDS Integration -

REPORT DOCUMENTATION PAGE

Network Intrusion Analysis (Hands-on)

Bio-Inspired Anomaly Detection

SINGLE COURSE. 136 Total Hours. After completing this course, students will be able to:

Evading Android Emulator

Testing ARES on the GTS framework: lesson learned and open issues. Mauro Femminella University of Perugia

ToMaTo - a network experimentation tool

BioCatch Fraud Detection CHECKLIST. 6 Use Cases Solved with Behavioral Biometrics Technology

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

PLUMgrid Open Networking Suite Service Insertion Architecture


Resilient Botnet Command and Control with Tor

24/7 Visibility into Advanced Malware on Networks and Endpoints

Architecture Overview

LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Clouds. Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage

Using GENI, CloudLab and AWS together within a Cloud Computing course

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

Emulation of Open Content Aware Networks on the ilab.t Virtual Wall. Steven Latre Jeroen Famaey Wim Van de Meerssche Tim Wauters Filip De Turck

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms

Google. Iustin Pop, <iustin@google.com> Google Switzerland. Sponsored by:

CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015

Korea s experience of massive DDoS attacks from Botnet

Course 10751A: Configuring and Deploying a Private Cloud with System Center 2012

M6422A Implementing and Managing Windows Server 2008 Hyper-V

Hyper-V Replica Broker Configuration Lab By Yung Chou, Microsoft Platform Evangelist,

Comprehensive Understanding of Malicious Overlay Networks

Configuring and Deploying a Private Cloud with System Center 2012 MOC 10751

HIDING THE NETWORK BEHIND THE NETWORK. BOTNET PROXY BUSINESS MODEL Alexandru Maximciuc, Cristina Vatamanu & Razvan Benchea Bitdefender, Romania

Cloud Defense. Kevin Hall Cyber Security Technology Department 4/17/2012. Sandia National Laboratories SAND C

MCSE: server infrastructure Syllabus

VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION

Configuring and Deploying a Private Cloud with System Center 2012

10751-Configuring and Deploying a Private Cloud with System Center 2012

Corporate I.T. Services Limited Updating your Network Infrastructure Technology Skills to Windows Server 2008 (Beta 3)

McAfee Network Security Platform

Beyond the Hype: Advanced Persistent Threats

Evolution of the ASSERT Computer Security Lab

Course Outline: Designing a Windows Server 2008 Network Infrastructure

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Nuclear Plant Information Security A Management Overview

SWOON: A Testbed for Secure Wireless Overlay Networks

VMsources Group Inc

THE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing

1. Simulation of load balancing in a cloud computing environment using OMNET

MS-10751: Configuring and Deploying a Private Cloud with System Center Required Exam(s) Course Objectives. Price. Duration. Methods of Delivery

Designing and Implementing a Server Infrastructure

Course 6331A: Deploying and Managing Microsoft System Center Virtual Machine Manager

Threat Intelligence. How to Implement Software-Defined Protection. Nir Naaman, CISSP Senior Security Architect

Krishna Markande, Principal Architect Sridhar Murthy, Senior Architect. Unleashing the Potential of Cloud for Performance Testing

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS

MS 10751A - Configuring and Deploying a Private Cloud with System Center 2012

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

DESIGN OF A LABORATORY FOR INFORMATION SECURITY EDUCATION

Denial of Service Attacks

RackSim Virtualized Data Center Simulation

vsphere Upgrade vsphere 6.0 EN

Virtualization for Security

Risk and Security Assessment. Zbigniew Kalbarczyk

Sales Slide Midokura Enterprise MidoNet V1. July 2015 Fujitsu Limited

Designing a Windows Server 2008 Network Infrastructure

ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park

using OpenFlow HIDEyuki Shimonishi System Platforms Research Labs, NEC corp 11 th Feb, 2009 Page 1

Research Article Overhead Analysis and Evaluation of Approaches to Host-Based Bot Detection

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

Description: Objective: Attending students will learn:

Experiments.

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.

Deploy Your First CF App on Azure with Template and Service Broker. Thomas Shao, Rita Zhang, Bin Xia Microsoft Azure Team

Virtualizing Enterprise Desktops and Apps

Stratusphere Solutions

Transcription:

A General-purpose Laboratory for Large-scale Botnet Experiments Thomas Barabosch, Sebastian Eschweiler, Mohammad Qasem, Daniel Panteleit, Daniel Plohmann and Elmar Gerhards-Padilla Cyber Defense Fraunhofer FKIE

http://images.techhive.com/images/article/2013/04/botnet-100034898-orig.jpg 2

http://michaelhyatt.com/wp-content/uploads/2009/06/the-wow-is-in-the-details1.jpg 3

http://www.doc.govt.nz/pagefiles/58827/big-picture-223.jpg 4

Botnet Analysis Approaches Mathematical modelling Stochastic simulation Real world data analysis In-laboratory emulations 5

Reasons for us to design a new laboratory Previous work already exists, e.g. Deter or SecSI/LHS labs Need for own laboratory due to confidentiality requirements Complementary analysis to our in-house reverse engineering process Long term goal: improving the state-of-the-art 6

Design of our Botnet Analysis Laboratory 7

Design Criteria Design criteria based on Calvet et. Al, Isolated virtualised clusters: testbeds for high-risk security experimentation and training Security Scale Realism Flexibility Sterilizability 8

Architectural key aspects Realistic simulation of selected parts of the Internet Total isolation of the laboratory Total observability within the laboratory 9

10

11

12

13

Network nodes Virtualization 14

Network topology 16

Architectural key aspects Realistic simulation of selected parts of the Internet Total isolation of the laboratory Total observability within the laboratory 17

Experiment control 18

Usability 19

Security 20

Sensor infrastructure 21

Sensor infrastructure 22

Sensor infrastructure 23

Architectural key aspects Realistic simulation of selected parts of the Internet Total isolation of the laboratory Total observability within the laboratory 24

Using our Botnet Analysis Labratory 25

Setting up an experiment: infrastructure Select network-template and VM templates Experimenter can also provide his own templates In case additional infrastructure is needed Provide entities Adjust DNS 26

Setting up an experiment: information gathering Network-based sensors Choose routers that should capture network traffic Easy adjustment using BPF syntax Host-based sensors Choose/add plugins to Agent 27

Setting up an experiment: roll out Once properly configured: roll it out! Initial setup time 32 VMs ~ 50 minutes 512 VMs ~ 7 hours 28

29

CASE STUDY CITADEL 30

What is Citadel? Zeus Zeus 31

Communication with C&C server 3 CnC server 11.22.33.44 4 Citadel bot 2 1 DNS 32

Countermeasure Takedown via domain replacement CnC server 11.22.33.44 Citadel bot What shall I do? 2 3 4 Benign action 5 DNS DNS entry 1 citadel-cnc.com -> 55.66.77.88 11.22.33.44 Sinkhole 55.66.77.88 33

EXPERIMENTS WITH CITADEL 34

Network infrastructure of the experiment 35

SETTING UP A BOTNET 36

37

Architectural key aspects Realistic simulation of selected parts of the Internet Total isolation of the laboratory Total observability within the laboratory secure analysis of malware secure testing of countermeasures 38

BOTNET TAKEDOWN 39

Countermeasure Takedown via domain replacement Malicious DNS entry is replaced by benign DNS entry at certain point in time DNS DNS entry citadel-cnc.com -> 55.66.77.88 11.22.33.44 40

41

Architectural key aspects Realistic simulation of selected parts of the Internet Total isolation of the laboratory Total observability within the laboratory secure analysis of malware secure testing of countermeasures 42

CONCLUSION & OUTLOOK 43

Conclusion & Outlook Presentation of a general-purpose laboratory for large-scale botnet experiments Realistic simulation of selected parts of the Internet Total isolation of the laboratory Total observability within the laboratory Future work Integration of bare-metal machines Automatic provisioning of basis templates 44

45