Multifaceted Approach to Understanding the Botnet Phenomenon



Similar documents
A Multifaceted Approach to Understanding the Botnet Phenomenon

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Seminar Computer Security

Detecting peer-to-peer botnets

Symptoms Based Detection and Removal of Bot Processes

Networks and Security Lab. Network Forensics

A Critical Investigation of Botnet

The HoneyNet Project Scan Of The Month Scan 27

HoneyBOT User Guide A Windows based honeypot solution

Revealing Botnets Using Network Traffic Statistics

Storm Worm & Botnet Analysis

CS Network Security: Botnets

Keep you computer running Keep your documents safe Identity theft Spreading infection Data Integrity (DPA: Data Protection Act)

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

SECURING APACHE : DOS & DDOS ATTACKS - II

UNMASKCONTENT: THE CASE STUDY

Detecting Botnets with NetFlow

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

Shellshock. Oz Elisyan & Maxim Zavodchik

DISTRIBUTED LOW-INTERACTION HONEYPOT SYSTEM TO DETECT BOTNETS

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

Network Monitoring Tool to Identify Malware Infected Computers

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division

Norton Personal Firewall for Macintosh

Multi-phase IRC Botnet and Botnet Behavior Detection Model

Protecting the Infrastructure: Symantec Web Gateway

2014 ASE BIGDATA/SOCIALCOM/CYBERSECURITY Conference, Stanford University, May 27-31, 2014 ASE 2014 ISBN:

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 21

Botnet Detection by Abnormal IRC Traffic Analysis

USE HONEYPOTS TO KNOW YOUR ENEMIES

ThreatSTOP Technology Overview

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Implementation of Botcatch for Identifying Bot Infected Hosts

Proxies. Chapter 4. Network & Security Gildas Avoine

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Symantec enterprise security. Symantec Internet Security Threat Report April An important note about these statistics.

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

About Botnet, and the influence that Botnet gives to broadband ISP

THE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing

Computer Security Maintenance Information and Self-Check Activities

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Firewalls, Tunnels, and Network Intrusion Detection

BotNets- Cyber Torrirism

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Medical Image Manager (MIM) Version 6.1.

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Networks & Security Course. Web of Trust and Network Forensics

A Review on IRC Botnet Detection and Defence

Malware Analysis Quiz 6

WORMS HALMSTAD UNIVERSITY. Network Security. Network Design and Computer Management. Project Title:

Malicious Network Traffic Analysis

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Chapter 9 Firewalls and Intrusion Prevention Systems

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Lecture 19 - Network Security

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Linux Network Security

SPAM FILTER Service Data Sheet

Introduction to Endpoint Security

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Computer Networks & Computer Security

Introduction to Computer Security Benoit Donnet Academic Year

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

Introducing IBM s Advanced Threat Protection Platform

Description: Course Details:

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Guidance Regarding Skype and Other P2P VoIP Solutions

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

End-user Security Analytics Strengthens Protection with ArcSight

HIDING THE NETWORK BEHIND THE NETWORK. BOTNET PROXY BUSINESS MODEL Alexandru Maximciuc, Cristina Vatamanu & Razvan Benchea Bitdefender, Romania

Adaptability of IRC Botnet Detection Method to P2P Botnet Detection

Networking for Caribbean Development

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

8 steps to protect your Cisco router

Coimbatore-47, India. Keywords: intrusion detection,honeypots,networksecurity,monitoring

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

SNI Vulnerability Assessment Report

How To Classify A Dnet Attack

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

How To Mitigate A Ddos Attack

Stephen Coty Director, Threat Research

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

Detecting Bots with Automatically Generated Network Signatures

Application Firewalls

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

Test Case 3 Active Directory Integration

Netgator: Malware Detection Using Program Interactive Challenges. Brian Schulte, Haris Andrianakis, Kun Sun, and Angelos Stavrou

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010

Detection of Botnets Using Honeypots and P2P Botnets

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Transcription:

Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon

Basic concepts Botnet is a set of connected end hosts(bots), which are infected by malicious software and controlled by the botmaster(attacker). Honeynet is a network of security vulnerable end hosts (honeypots). The shell code is small binary or script code which is used to download the real bot binaries

Nepenthes is a special software which mimics known vulnerabilities in order to collect shell codes. Planetlab is a group of computers available as a testbed for computer networking and distributed systems research. UnrealIRC mimics the operations of an IRC server.

Efforts The construction and evaluation of a multifaceted infrastructure for capturing and tracking the botnets. The infrastructure is a distributed system which collects as many bots as possible and tracks the botnets with an IRC tracker(internal behavior) and an DNS prober (for footprint). The structural and behavioral analysis based on the data collected by the multifaceted infrastructure. They present results for 192 botnets.

Bot characteristics. One host( the hostmaster) controls and checks every infected host over a Command and Control channel (C&C). This channel is implemented over well known and used Internet protocols like Http and IRC protocols(or p2p protocols) Most popular is the IRC because it supports large number of clients, different network topologies, extendable protocol design

Typical botnet communication

Botnet security choices. Bot authentication to the server with a pass protocol message (IRC supported). Bot authentication to the channel with the password defined by the botmaster(irc supported). Botmaster authentication to the bots(supported by bot creator). Every botnet can use any combination of them.

After the join the bot parses and executes the default package message. In some cases the bot can see every exchanged message. It depends on the channel modes.

The measurement consists of: Malware Collection Binary analysis Tracking with the usage of IRC tracker and DNS prober.

Collection Infrastructure Darknet based on local network and 14 Planetlab nodes with IP address space (10 different /8 prefixes). Nepenthes. HoneyNet with Windows XP images running on virtual machines and VLANS.

Binary Analysis gray box method Usage of private network. Network fingerprint, looking for IPs, ports, DNS requests. IRC fingerprint, looking for PASS, NICK format, USERnames and autojoined channels. This state also creates a dialect template with the help of UnrealIRC Special tactics for managing botmaster authentication

Tracking IRC tracking based on the dialect template of the binary analysis and the network and irc fingerprints. It applies filter on the dialect template to avoid 'bad' replies. It offers special handling for statefull nature of the bots. DNS probing on a cleaned list of DNS servers. The results refer to the lower bound of the footprint because we don't check every DNS server and a cache hit doesn't give information about the number of requests.

Infrastructure Architecture

Contribution to the unwanted traffic. About the 27% of the unwanted transfers is generated by the botnet activities. They present the SYN packets number in comparison with the SYN packets generated only by the botnet, over the time. The peak values for them are aligned and in this period the botnet usually generates the 90% of the cumulative traffic

The two bot groups The worm like bots. These bots attack continuously specific ports with a single algorithm. Many times try to connect a hardcoded list of unreached servers. The result is a botnet without master. The current approach, bot supports a number of algorithms and scans only after botmaster's command or if the channel's message requests it. Their behavior can be rescheduled on the fly and they support modification options. They usually scans \8 or \16 IP prefixes.

Growth Patterns (Based on IRC tracker and DNS prober) The semi-exponential model, the bots apply permanent scanning on random selected ports. The attacking method is permanent, same port and it attacks always.. The pattern of the botnets with intermittent activity profile. In this category we have bot designs where they are almost stable when the IRC server is down but if it turns on the botnet starts expanding itself again

Time scoped botnets. In this case the botnet is active for attacking and spreading for a specific time period. This kind of botnets target specific IP prefixes.

Bot IRC structure All the bots connect to a single IRC server. This approach is good only for small infected network because an effective vulnerability attack can easily 'catch' the server's client capacity. Unexpected similarities on different bots, as the name conventions, channel names and operators ids refer to the same bot master creator.

Multiple servers consist an IRC network (IRC server farm). The bridging could been done in different ways, but the principal idea is identical, the servers share the overhead. For checking if the bot net uses multiple servers they either read the status message of the connected servers or or check for equality between the local and the connected users number. A group of bots has the feature to download updated binaries of themselves, feature which is mainly used for migration to other servers.

Common bot thread services The AV/FW killer which is located to the 50% of the bots it deactivates anti-virus and firewall processes. Identd server (40%) is a tcp based server which is used for the identification of the user over the connection. Register monitor (38%), monitors the register and informs if someone tries to disable or limit the bot. The system security monitor(40%), uses known vulnerability issues and with calls to secure() function achieves to deactivate system services.

Every binary use from 3 to 29 vulnerabilities and the average number is 15. The modular design of the bots in conjunction with exploits' variations and combination reports the same results. For testing the protection level of the end systems, they tried to classify each of the 192 bots with the ClamAv and Norton's Antivirus, the first classified the 137 and the second the 179.

Effective Size The footprint of the botnets is usually much larger from the number of the connected bots on the IRC server(effective size), this is not something unexpected because the networking infrastructure of the IRC server(s) is poor for serving thousands of connected bots, this means that a bot connects to the IRC network periodically, fact which has not any impact for the relatively permanent commands(ex the channel's status), but this point is significant for instantly-on the fly instructions, because only the connected bots at the current time execute this kind of instructions. The difference between the footprint and the lifetime of botnets is important because the life of a bot is much bigger tha the time it stays connected to the IRC server. A bot usually joins a channel in an average period of 25 minutes (the 90% stays less than 50 minutes) but it exists as a host to the infected network for about 47 days. Also death (stop of execution) which can be caused by a number of reasons like patching, system shutdown and network failure can unstabilize the difference between footprint and effective size.

The client who stays the biggest time connected at the C&C channel is the bot master, for two reasons, for giving new commands and for keeping the operator privileges. A noticed paradox is the fact that botnets which use directly static IP have bigger lifetime than the others which use domain names.

The paper presents some special characteristics that many botmaster shares. They share information about incapable prefixes and they don't scan them, guide the bots in order to do all only the necessary communication and investigate for fake bots in order to limit them and seeks for bots with big resources. A botmaster also is able to migrate bots from one network to another, in order do it, they request them to download an updated version of the binary code.