Under the Shadow of sunshine

Slides:



Advertisements
Similar presentations
Dynamics of Online Scam Hosting Infrastructure
Advertisements

ICANN SSAC, Cairo Nov 2008 Page 1 Summary of Fast Flux Dave Piscitello ICANN SSAC.
A look into Bullet Proof Hosting November DefCamp 5 Silviu Sofronie – Head of Forensics
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee ACSAC.
Design and Evaluation of a Real-Time URL Spam Filtering Service
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
SESSION ID: #RSAC Chaz Lever Characterizing Malicious Traffic on Cellular Networks A Retrospective MBS-W01 Researcher Damballa,
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
Threat infrastructure: proxies, botnets, fast-flux
Prophiler: A fast filter for the large-scale detection of malicious web pages Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2011/03/31 1.
Mapping Out Cyber Crime Infrastructure A Law Enforcement Approach Jon Flaherty UK National Cyber Crime Unit 13 th May 2015 RIPE 70 - Amsterdam.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Norman SecureSurf Protect your users when surfing the Internet.
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology USENIX Security '08 Presented by Lei Wu.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
PhishNet: Predictive Blacklisting to Detect Phishing Attacks Pawan Prakash Manish Kumar Ramana Rao Kompella Minaxi Gupta Purdue University, Indiana University.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 1 Scaling IP Addresses.
Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs Justin Ma, Lawrence Saul, Stefan Savage, Geoff Voelker Computer Science.
Chapter 9: Cooperation in Intrusion Detection Networks Authors: Carol Fung and Raouf Boutaba Editors: M. S. Obaidat and S. Misra Jon Wiley & Sons publishing.
Amir Houmansadr CS660: Advanced Information Assurance Spring 2015
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
FluXOR: Detecting and Monitoring Fast-Flux Service Networks Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni, and Danilo Bruschi 5th international.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets,
Cross-Analysis of Botnet Victims: New Insights and Implication Seungwon Shin, Raymond Lin, Guofei Gu Presented by Bert Huang.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Lexical Feature Based Phishing URL Detection Using Online Learning Reporter: Jing Chiu Advisor: Yuh-Jye Lee /3/17Data.
Reporter: Jing Chiu Advisor: Yuh-Jye Lee /3/17 1 Data Mining and Machine Learning Lab.
Inaccuracy of IRT-Objects Aftab A. Siddiqui Cyber Internet Services (Pvt) Ltd/ IPv6 Task Force Pakistan/ NRO NC/ASO AC.
The Koobface Botnet and the Rise of Social Malware Kurt Thomas David M. Nicol
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal of all fast flux variants –Avoid detection and take down of.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Identifying Suspicious URLs: An Application of Large-Scale Online Learning Justin Ma, Lawrence Saul, Stefan Savage, Geoff Voelker Computer Science & Engineering.
I2Coalition: How To Build Relationships And Save Money With Better Abuse Reporting Moderator: Michele Neylon CEO, Blacknight.
Botnets A collection of compromised machines
Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks Sumayah Alrwais, Xiaojing Liao, Xianghang.
Gross Niv Analyzing Spammer’s Social Networks for Fun and Profit
BUILD SECURE PRODUCTS AND SERVICES
Learning to Detect and Classify Malicious Executables in the Wild by J
Project Statistical Analysis of DNS Abuse in gTLDs (SADAG) Consortium: SIDN and TU Delft Requested by: Competition, Consumer Choice, and Trust Review Team.
Domain Reputation Hussien Othman.
Domain Name Registration, ICANN, Registrars & Hosting Options
A lustrum of malware network communication: Evolution & insights
Measuring and Mitigating OAuth Access Token Abuse by Collusion Networks Shehroze Farooqi1, Fareed Zaffar2, Nektarios Leontiadis3, Zubair Shafiq1 University.
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
Botnets A collection of compromised machines
Author: Tianyu Wang and Li-Chiou Chen Presenter: Tianyu Wang
DNS-based Detection of Computer Worms in an Enterprise Environment
Network Services.
Inside Job: Applying Traffic Analysis to Measure Tor from Within
Proactive Network Protection Through DNS
A New Phishing Detection Approach
Facebook Immune System
Detecting Targeted Attacks Using Shadow Honeypots
CERT-GIB IN 2018 DNS FORUM 2018 Alexander Kalinin Head of CERT-GIB.
The Domain Abuse Activity Reporting System (DAAR)
How We Fight Against Scam
Using Software Restriction Policies
TRANCO: A Research-Oriented Top Sites Ranking Hardened Against Manipulation By Prudhvi raju G id:
Presentation transcript:

Under the Shadow of sunshine Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks [Alrwais SP17] Authors: Sumayah Alrwais, Xiaojing Liao, Xianghang Mi1, Peng Wang, XiaoFeng Wang, Feng Qian, Raheem Beyah and Damon McCoy Published: Security and Privacy (SP), 2017 IEEE Symposium Presented by: Ali Ashraf Date: 18/09/2017

Bullet proof hosting (BPH) Bulletproof Hosting (BPH) offer safe heaven to host different types of Cybercrime operations: Malwares Phishing illicit contents Botnet Scam Cybercriminals BPH Provider Cybercriminal Operations The clients have rights to full freedom and provided protection from any encroachment or take down efforts. Examples: BPservers, 666Hosting, etc.

BPH Services Centralized Services Agile Services Protected Autonomous Systems (ASes) e.g. cyberbunker.com, Compromised Systems (temporary access until detected with small one-time charge) Centralized BPH Services (Owner: BPH Provider) Protected Hosting OR Compromised Systems Cybercriminals Agile Services BPH offer service under multiple legitimate service provider to hide under better reputation of the provider Abused Reputable Hosting Cybercriminals BPH Services Resellers

Evade reputation based defences Better reputation of parent service provider A mix of legitimate and BPH reseller Quickly move client after detecting Blacklisting ASes? Blacklisting IPs?

Blacklisting IP Prefix Sub-Allocations ! Blacking listing IP or As? Blacklisting IP Prefix Sub-Allocations !

Solution - Finding BPH Sub-Allocations Implement a malicious Sub- Allocation Detection System Study on the Bullet proof hosting eco-system Identified 39K malicious Sub- Allocations: 3.2K ASes 260M TLD+3

Data collection Collecting data source Generating Ground Truth 25 Snapshots of full IPv4 WhoIS records Passive DNS Lookup records - 1.7 TB AS Ranking, Spam Haus, CleanMX, BL-A Generating Ground Truth Finding clean sub-allocation Finding malicious sub-allocation Purchasing from BPH service providers

Data Processing and classification 14 Key Features extraction based on WhoIS, Passive DNS and AS reputation lists Finding sub-allocations & Identifying owners & Filtering A unique feature “Domain Churn” Trained two classifiers, Support Vector Machines (SVM) & Random Forest (RF), achieved 98% recall & 1.5% false discovery Starred Features are new PDNS features, not used in previous research.

BPH Ecosystem analysis Recycling (Spanning ASes to avoid blacklisting) Top ASes ranked by their Recycling rate Domain Migration (Average lifetime of 6.7 Months) Selected TLD+3 hoping at least 10 detected sub-allocations

Bph clients 50% of the blacklisted domains are used to distribute the malware 46% of the blacklisted domains running botnet command and control servers 1.6M domain have migrated between at least two sub-allocations

Limitations & Critique Slow Detection & Reactive Approach (Extensive PDNS scanning & Detection occurred after the malicious activity) Dependant (Depends upon the accuracy of WhoIS and PDNS data) Smaller Network Block List, Spamhaus Edrop (Used for the training & validation of Machine Learning detection system)

Limitations & Critique Use machine learning approach to predict sub-allocation ranking at the time of registration (timely detection) RIRs authority should collect and verify sub-allocations owners information (accuracy) Establish a large set of network block list for training and validation of Machine Learning Detection System

Questions!