CS 6262 - Network Security: Botnets



Similar documents
Lecture 19 - Network Security

CSC574 Computer and Network Security Module: Internet Malware

Changing threat landscape The Botnet perspective

Multifaceted Approach to Understanding the Botnet Phenomenon

A Critical Investigation of Botnet

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Network attack and defense

The HoneyNet Project Scan Of The Month Scan 27

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

Detecting peer-to-peer botnets

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

BotNets- Cyber Torrirism

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

About Botnet, and the influence that Botnet gives to broadband ISP

An Efficient Methodology for Detecting Spam Using Spot System

ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Security A to Z the most important terms

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

Implementation of Botcatch for Identifying Bot Infected Hosts

Denial of Service (DoS) Technical Primer

Malicious Network Traffic Analysis

Seminar Computer Security

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Symantec enterprise security. Symantec Internet Security Threat Report April An important note about these statistics.

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

WHITE PAPER. Understanding How File Size Affects Malware Detection

Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries

Why to talk about Botnets

A TASTE OF HTTP BOTNETS

Denial of Service Attacks

How To Stop A Ddos Attack On A Website From Being Successful

BOTNET Detection Approach by DNS Behavior and Clustering Analysis

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

CEH Version8 Course Outline

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

Ram Dantu. VOIP: Are We Secured?

Storm Worm & Botnet Analysis

DDoS Attacks & Mitigation

Phone Fax

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

Spyware. Summary. Overview of Spyware. Who Is Spying?

Detailed Description about course module wise:

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division

THE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing

5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)

Top 5 Essential Log Reports

Current Threat Scenario and Recent Attack Trends

Networking for Caribbean Development

A Literature Survey About Recent Botnet Trends

SECURING APACHE : DOS & DDOS ATTACKS - II

Protecting the Infrastructure: Symantec Web Gateway

Malware Analysis Quiz 6

Stopping zombies, botnets and other - and web-borne threats

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

2010 Carnegie Mellon University. Malware and Malicious Traffic

Proxies. Chapter 4. Network & Security Gildas Avoine

IRC Forensic Basics. by: James Guess. Internet Relay Chat (IRC) first met the world in the late 1980 s. It was the first

Countermeasures against Bots

Overview of computer and communications security

Detection of Botnets Using Honeypots and P2P Botnets

1 Introduction. Agenda Item: Work Item:

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

HONEYPOT SECURITY. February The Government of the Hong Kong Special Administrative Region

ACCEPTABLE USE AND TAKEDOWN POLICY

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

. Daniel Zappala. CS 460 Computer Networking Brigham Young University

NETWORKS AND THE INTERNET

Networks and the Internet A Primer for Prosecutors and Investigators

Whose IP Is It Anyways: Tales of IP Reputation Failures

How CNCERT/CC fighting to Botnets. Dr.Mingqi CHEN CNCERT/CC March 31, Beijing

Multi-phase IRC Botnet and Botnet Behavior Detection Model

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

INFORMATION SECURITY REVIEW

1 Introduction. Agenda Item: Work Item:

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Shellshock. Oz Elisyan & Maxim Zavodchik

Infoblox Inc. All Rights Reserved. Securing the critical service - DNS

ThreatSTOP Technology Overview

2014 ASE BIGDATA/SOCIALCOM/CYBERSECURITY Conference, Stanford University, May 27-31, 2014 ASE 2014 ISBN:

Resilient Botnet Command and Control with Tor

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

CS 356 Lecture 16 Denial of Service. Spring 2013

SAC 025 SSAC Advisory on Fast Flux Hosting and DNS

CYBERTRON NETWORK SOLUTIONS

Transcription:

CS 6262 - Network Security: Botnets Professor Patrick Traynor Fall 2011

Story 2

Botnets A botnet is a network of software robots (bots) run on zombie machines which run are controlled by command and control networks IRCbots - command and control over IRC Bot herder - owner/controller of network "scrumping" - stealing resources from a computer Surprising Factoid: the IRC server is exposed. 3

Statistics (controversial) The actual number of bots, the size of the botnets and the activity is highly controversial. As of 2005/6: hundreds of thousands of bots 1/4 of hosts are now part of bot-nets Growing fast (many more bots) Assertion: botnets are getting smaller(?!?) When they become large, they are more likely to be to to be noticed and targeted for takedown. 4

What are botnets being used for? piracy mining attacks hosting Activities we have seen Stealing CD Keys: 50 botnets ying!ying@ying.2.tha.yang PRIVMSG #atta :BGR 0981901486 $getcdkeys BGR 0981901486!nmavmkmyam@212.91.170.57 100-20,000 PRIVMSG #atta :Microsoft Windows Product ID bots/net CD Key: (55274-648-5295662-23992). BGR 0981901486!nmavmkmyam@212.91.170.57 PRIVMSG #atta :[CDKEYS]: Search completed. Clients/servers spread around the world Reading a user's clipboard: B][!Guardian@globalop.xxx.xxx PRIVMSG ##chem## :~getclip Ch3m 784318!~zbhibvn@xxx-7CCCB7AA.click-network.com PRIVMSG ##chem## :- [Clipboard Data]- Ch3m 784318!~zbhibvn@xxx-7CCCB7AA.click-network.com PRIVMSG ##chem## :If You think the refs screwed the seahawks over put your name down!!! Different geographic concentrations DDoS someone: devil!evil@admin.of.hell.network.us PRIVMSG #t3rr0r0fc1a :!pflood 82.147.217.39 443 1500 s7n 2K503827!s7s@221.216.120.120 PRIVMSG #t3rr0r0fc1a :\002Packets\002 \002D\002one \002;\002>\n s7n 2K503827!s7s@221.216.120.120 PRIVMSG #t3rr0r0fc1a flooding...\n Set up a web-server (presumably for phishing): [DeXTeR]!alexo@l85-130-136-193.broadband.actcom.net.il PRIVMSG [Del]29466 :.http 7564 c:\\ [Del]38628!zaazbob@born113.athome233.wau.nl PRIVMSG _[DeXTeR] :[HTTPD]: Server listening on IP: 10.0.2.100:7564, Directory: c:\\. 5

Other goals of a botnet... SPAM relays Click fraud Spamdexing Adware 6

IRC 1988 - one-to-many or many-to-many chat (for BBS) Client/server -- TCP Port 6667 Used to report on 1991 Soviet coup attempt Channels (sometimes password protected) are used to communicate between parties. Invisible mode (no list, not known) Invite only (must be invited to participate) Server Server Server Server Server 7

IRC botnets An army of compromised hosts ( bots ) coordinated via a command and control center (C&C). The perpetrator is usually called a botmaster. IRC Server Find and infect more machines! Bots (Zombies) A botnet is comparable to compulsory military service for windows boxes -- Bjorn Stromberg 8

Typical (IRC) infection cycle optional Bots usually require some form of authentication from their botmaster 9

P2P Botnets Bots that rely on centralized communications mechanisms such as IRC are generally easy to attack. Single point of failure for the bad guys... Increasingly, botnets have turned to P2P-based architectures to avoid such weaknesses. e.g., Slapper, Phatbot, Conficker What are the challenges for a botmaster relying on a P2P architecture? 10

P2P Botnets What advantages do defenders have in this situation? How do communication patterns compare to IRC bots? How do you tell between legitimate P2P traffic and that associated with bots? 11

Wireless/Mobile 0 1 2 3 Mobile devices offer new avenues for botnets. With the ability to communicate over multiple (5) interfaces, how does a provider defend against such multi-homed botnets? How does this change the game in terms of communications strategies for botmasters? 12

Infection Worms, Tojan horses, backdoors, browser-bugs, etc... Note: the software on these systems is updated Bot theft: bot controllers penetrate/"steal" bots. 13

Not only for launching attacks... Some botmasters pay very close attention to their bots hence covert infiltration is important In many cases, Botmasters inspect their bots fairly regularly, and isolate certain bots ( cherry picking ) #HINDI-FILMZ :#1 294x [698M] [Movie] Dil Bechara Pyar Ka Mara DvD-RiP [ Full / AVI / 2001 ] #HINDI-FILMZ :#2 126x [141K] [English Subtitles] Dil Bechara Pyar Ka Mara #HINDI-FILMZ :** 2 packs ** 3 of 3 slots open, Record: 45.3KB/s #HINDI-FILMZ :** Bandwidth Usage ** Current: 0.0KB/s, Record: 304.5KB/s #HINDI-FILMZ :** To request a file type: /"/msg [HF]-[Street-Hunk]-30 xdcc send #x/" ** #HINDI-FILMZ :** -= #Hindi-Filmz=- ** #HINDI-FILMZ :** I M 100% Desi!! ** #HINDI-FILMZ :Total Offered: 698.5 MB Total Transferred: 206.57 GB That s a lot of movies served! ( ~ 300) 14

How are researchers learning? Honeypots are often used to attract, observer and eventually dissect bots. A number of recent efforts in this space have actually hijacked active botnets. Large portions of these networks have been monitored:... to learn about the targets of the botnet (and their success in exploiting them).... to learn about weaknesses in their architecture to use as a means of potentially interfering with the botnet.... to figure out whether deployed defenses are helping at all. 15

Lots of bots out there Level of botnet threat is supported by the conjecture that large numbers of bots are available to inflict damage Press Quotes Three suspects in a Dutch crime ring hacked 1.5 million computers worldwide, setting up a zombie network, Associated Press The bot networks that Symantec discovers run anywhere from 40 systems to 400,000, Symantec 16

Measuring botnet size Two main categories Indirect methods: inferring botnet size by exploiting the side-effects of botnet activity (e.g., DNS requests) Direct methods: exploiting internal information from monitoring botnet activity 17

Indirect Methods Mechanism DNS blacklists DNS snooping What does it provide? DNS footprint Caveats DNS footprint is only a lower bound of the actual infection footprint of the botnet DNS records with small TTLs DNS servers blocking external requests (~50%) 18

DNS Blacklist The value of a bot is related to its status on the DNS blacklists Compromised hosts often used as SMTP servers for sending spam. DNS blacklists are lists maintained by providers that indicate that SPAM has been received by them. Organizations review blacklists before allowing mail from a host. A "clean" bot (not listed) is worth a lot A listed bot is largely blocked from sending SPAM A B C D E F... 19

DNS-BL Monitoring Observation: bot controllers/users need to query for BL status of hosts to determine value. Idea: if you watch who is querying (and you can tell the difference from legitimate queries), then you know something is a bot Understanding the in/out ratio: λ n = d n,out d n,in Q: what does a high ratio mean? Low? #queries by host #queries for host 20

Direct Methods Mechanisms Infiltrate botnets and directly count online bots DNS redirection (by Dagon et al.) What do they provide? Infection footprint & effective size (infiltration) Infection footprint (DNS redirection) Caveats Cloning (infiltration) Counting IDs vs. counting IPs (infiltration) Measuring membership in DNS sinkhole (DNS redirection) Botmasters block broadcasts on C&C channel (infiltration) (~48%) 21

Estimating size [Monrose et. al] DNS redirection sinkhole Identify, then self poison DNS entries DNS cache hits Idea: query for IRC server to see if in cache If yes, at least one bot in the network within the TTL (see [14]) Limitations: TTL, not all servers answer, lower bound on bots 22

How many bots? Approach: infiltration templates based on collected honeynet data, e.g., observing compromised hosts that are identified within the channel How many? 1.1 million distinct user IDs used 425 thousand distinct IP addresses Issues: NAT/DHCP? Cloaked IP address (SOCKS proxies?) Botnet membership overlap 23

Botnet size, what does it mean? Infection Footprint: the total number of infected bots throughout a botnet s lifetime Relevance: how wide spread the botnet infection Effective Botnet Size: the number of bots simultaneously connected to the command and control channel Relevance: the botnet capacity to execute botmaster commands (e.g., flood attacks) An Example: While a botnet appeared to have a footprint of 45,000 bots, the number of online bots (i.e. its effective size) was < 3,000 24

Are we counting unique infections? Temporary migration Cloning Cloning activity observed in 20% of the botnets tracked (moving between bot channels) 130,000 bots created more than 2 million clones during our tracking period 25

Summary Size estimation is harder than it seems Botnet size should be a qualified term Different size definitions lead to radically different estimates Current estimation techniques are laden with a number of caveats Cloning, counting method, migration, botnet structures, DHCP, NAT, etc. A prudent study of the problem requires persistent multifaceted tracking of botnet activity 26