Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.

Slides:



Advertisements
Similar presentations
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
Advertisements

Botnet Behavior and Detection Strategies Brad Wilder.
Your Botnet is My Botnet: Analysis of a Botnet Takeover
BRETT STONE-GROSS, MARCO COVA, LORENZO CAVALLARO, BOB GILBERT, MARTIN SZYDLOWSKI, RICHARD KEMMERER, CHRISTOPHER KRUEGEL, AND GIOVANNI VIGNA PRESENTATION.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
ECrime Research Richard Clayton Luxembourg 11 th May 2010.
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
Detecting Botnets Using Hidden Markov Models on Network Traces Wade Gobel Bio-Grid, Summer 2008.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
Threat infrastructure: proxies, botnets, fast-flux
On the Feasibility of Large-Scale Infections of iOS Devices
Borrowed from Brent ByungHoon Kang, GMU. A Network of Compromised Computers on the Internet IP locations of the Waledac botnet. Borrowed from Brent ByungHoon.
Authors: Thomas Ristenpart, et at.
Bayesian Bot Detection Based on DNS Traffic Similarity Ricardo Villamarín-Salomón, José Carlos Brustoloni Department of Computer Science University of.
2009/9/151 Rishi : Identify Bot Contaminated Hosts By IRC Nickname Evaluation Reporter : Fong-Ruei, Li Machine Learning and Bioinformatics Lab In Proceedings.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology USENIX Security '08 Presented by Lei Wu.
1 Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling - Proceedings.
Sravanthi Vattikuti Sri Harsha Devabhaktuni
Botnets An Introduction Into the World of Botnets Tyler Hudak
Introduction to Honeypot, Botnet, and Security Measurement
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.
BotNet Detection Techniques By Shreyas Sali
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang, and.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
11 Automatic Discovery of Botnet Communities on Large-Scale Communication Networks Wei Lu, Mahbod Tavallaee and Ali A. Ghorbani - in ACM Symposium on InformAtion,
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Botnets: Yesterday, Today, and Tomorrow CS 598: Advanced Internet Presented by: Imranul Hoque.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
FluXOR: Detecting and Monitoring Fast-Flux Service Networks Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni, and Danilo Bruschi 5th international.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
A Multifaceted Approach to Understanding the Botnet Phenomenon Authors : Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Computer Science.
1 An Advanced Hybrid Peer-to-Peer Botnet Ping Wang, Sherri Sparks, Cliff C. Zou School of Electrical Engineering & Computer Science University of Central.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross,
Botnets By: Brandon Sherman. What is a Botnet? Botnet is a term referring to a network of multiple computers being affected by software robots. These.
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
Not So Fast Flux Networks for Concealing Scam Servers Theodore O. Cochran; James Cannady, Ph.D. Risks and Security of Internet and Systems (CRiSIS), 2010.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
Speaker: Hom-Jay Hom Date:2009/11/17 Botnet, and the CyberCriminal Underground IEEE 2008 Hsin chun Chen Clinton J. Mielke II.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Host and Application Security Lesson 17: Botnets.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Published: Internet Measurement Conference (IMC) 2006 Presented by Wei-Cheng Xiao 2015/11/221.
Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer,
Studying Spamming Botnets Using Botlab
Malicious Software.
Know your Enemy: Tracking Botnets The Honeynet Project & Research Alliance Presented by: Jonathan Dowdle.
A Multifaceted Approach to Understanding the Botnet Phenomenon Aurthors: Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Publication: Internet.
Speaker:Chiang Hong-Ren An Investigation and Implementation of Botnet Detection Schemes.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Presented by D Callahan.
1 Modeling and Measuring Botnets David Dagon, Wenke Lee Georgia Institute of Technology Cliff C. Zou Univ. of Central Florida Funded by NSF CyberTrust.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
Botnets Borrowed from Brent ByungHoon Kang, GMU. A Network of Compromised Computers on the Internet IP locations of the Waledac botnet. Borrowed from.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
A lustrum of malware network communication: Evolution & insights
Speaker : YUN–KUAN,CHANG Date : 2009/11/17
Your Botnet is My Botnet: Analysis of a Botnet Takeover
Your Botnet is my Botnet: Analysis of a Botnet Takeover
An overview over Botnets
Presentation transcript:

Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings of the 16th ACM conference on Computer and communications security,2009 Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings of the 16th ACM conference on Computer and communications security,2009 Presented by Rajesh Avula 3/7/2016 Your Botnet is My Botnet: Analysis of a Botnet Takeover

Outline  Introduction  Domain flux  Taking control of the Botnet  Botnet analysis  Threats and data analysis  Conclusion  Introduction  Domain flux  Taking control of the Botnet  Botnet analysis  Threats and data analysis  Conclusion

Introduction  The main purpose of this paper is to analyze the Torpig botnet’s operations.  Botnet size.  The personal information is stolen by botnets.  The main purpose of this paper is to analyze the Torpig botnet’s operations.  Botnet size.  The personal information is stolen by botnets. 3

Introduction (cont.)  What is botnet? A Botnet is a collection of software agents, or robots that run autonomously and automatically. The term is most commonly associated with malicious software.  Main motivation: recognition and financial gain.  Bot controller can ‘rent’ services of the botnet to third parties (Botnet as service)  What is botnet? A Botnet is a collection of software agents, or robots that run autonomously and automatically. The term is most commonly associated with malicious software.  Main motivation: recognition and financial gain.  Bot controller can ‘rent’ services of the botnet to third parties (Botnet as service)

Introduction (cont.)  Botnets are the primary means for cyber-criminals to carry out their nefarious tasks, such as  sending spam mails,  launching denial-of-service attacks  stealing personal data such as mail accounts or bank credentials.  Botnets are the primary means for cyber-criminals to carry out their nefarious tasks, such as  sending spam mails,  launching denial-of-service attacks  stealing personal data such as mail accounts or bank credentials.

Introduction (cont.)  Once infected with a bot, the victim host will join a botnet, which is a network of compromised machines that are under the control of a malicious entity, typically referred to as the botmaster.  Malware was developed for fun, to the current situation, where malware is spread for financial profit.  Once infected with a bot, the victim host will join a botnet, which is a network of compromised machines that are under the control of a malicious entity, typically referred to as the botmaster.  Malware was developed for fun, to the current situation, where malware is spread for financial profit.

Introduction (cont.)  One approach to study botnets is to perform passive analysis of secondary effects that are caused by the activity of compromised machines.  Collected spam mails that were likely sent by bots  Similar measurements focused on DNS queries or DNS blacklist queries  analyzed network traffic (netflow data) at the tier-1 ISP level for cues that are characteristic for certain botnets  One approach to study botnets is to perform passive analysis of secondary effects that are caused by the activity of compromised machines.  Collected spam mails that were likely sent by bots  Similar measurements focused on DNS queries or DNS blacklist queries  analyzed network traffic (netflow data) at the tier-1 ISP level for cues that are characteristic for certain botnets

Introduction (cont.)  Active approach to study botnets is via infiltration.  Using an actual malware sample or a client simulating a bot, researchers join a botnet to perform analysis from the inside.  To achieve this, honeypots, honey clients, or spam traps are used to obtain a copy of a malware sample.  For some botnets that rely on a central IRC-based C&C server, joining a botnet can also reveal the IP addresses of other clients (bots) that are concurrently logged into the IRC channel  Active approach to study botnets is via infiltration.  Using an actual malware sample or a client simulating a bot, researchers join a botnet to perform analysis from the inside.  To achieve this, honeypots, honey clients, or spam traps are used to obtain a copy of a malware sample.  For some botnets that rely on a central IRC-based C&C server, joining a botnet can also reveal the IP addresses of other clients (bots) that are concurrently logged into the IRC channel

Introduction (cont.)  Attackers have unfortunately adapted, and most current botnets use stripped-down IRC or HTTP servers as their centralized command and control (C&C)channels.  With such C&C infrastructures, it is no longer possible to make reliable statements about other bots by joining as a client.  One way to take the control of botnet is to directly seize the physical machines that host the C&C infrastructure.  Attackers have unfortunately adapted, and most current botnets use stripped-down IRC or HTTP servers as their centralized command and control (C&C)channels.  With such C&C infrastructures, it is no longer possible to make reliable statements about other bots by joining as a client.  One way to take the control of botnet is to directly seize the physical machines that host the C&C infrastructure.

Introduction (cont.)  Therefore, by collaborating with domain registrars, it is possible to change the mapping of a botnet domain to point to a machine controlled by the defender.  Several recent botnets, including Torpig, use the concept of domain flux.  With domain flux, each bot periodically (and independently) generates a list of domains that it contacts.  The first host that sends a reply that identifies it as a valid C&C server is considered genuine, until the next period of domain generation is started.  Therefore, by collaborating with domain registrars, it is possible to change the mapping of a botnet domain to point to a machine controlled by the defender.  Several recent botnets, including Torpig, use the concept of domain flux.  With domain flux, each bot periodically (and independently) generates a list of domains that it contacts.  The first host that sends a reply that identifies it as a valid C&C server is considered genuine, until the next period of domain generation is started.

IP flux  Botnet authors have identified several ways to make these schemes more flexible and robust by using IP fast-flux techniques.  With fast-flux, the bots would query a certain domain that is mapped onto a set of IP addresses, which change frequently.  However, fast-flux uses only a single domain name, which constitutes a single point of failure.  Botnet authors have identified several ways to make these schemes more flexible and robust by using IP fast-flux techniques.  With fast-flux, the bots would query a certain domain that is mapped onto a set of IP addresses, which change frequently.  However, fast-flux uses only a single domain name, which constitutes a single point of failure.