Presented by Shashank Shekhar Sahoo

Slides:



Advertisements
Similar presentations
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Advertisements

A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
High Speed Internet Access At Home Broadband Technologies Security Concerns Hardware/Software Solutions William Kramp 4/12/2001.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
1 Network Quarantine At Cornell University Steve Schuster Director, Information Security Office.
Introduction to Honeypot, Botnet, and Security Measurement
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Article presentation for: The Dark Cloud: Understanding and Defending against Botnets and Stealthy Malware Based on article by: Jaideep Chandrashekar,
Computer Safety Workshop Presented by Roy Coleman April 14, 2015 © 2015 Roy Coleman.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Final Introduction ---- Web Security, DDoS, others
CIS 450 – Network Security Chapter 3 – Information Gathering.
Lecture 15 Page 1 Advanced Network Security Perimeter Defense in Networks: Firewalls Configuration and Management Advanced Network Security Peter Reiher.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Office of Campus Information Security Incident Response Briefing Jeffrey Savoy, CISSP.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Security at NCAR David Mitchell February 20th, 2007.
Zakir Durumeric, James Kasten,David Adrian, J. Alex Halderman, Michael Bailey, Frank Li, Nicholas Weaver, Johanna Amann, Jethro Beekman, Mathias Payer,
Modelling Incentives for Blocking Strategies Andrei Serjantov Richard Clayton WEIS 2005 KSG, Harvard 2 nd June 2005.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Presented by Teererai Marange. Background Open SSL Hearbeat extension Heartbleed vulnerability Description of work Methodology Summary of results Vulnerable.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Understand Malware LESSON Security Fundamentals.
Know your Enemy: Tracking Botnets The Honeynet Project & Research Alliance Presented by: Jonathan Dowdle.
1 Network Quarantine At Cornell University Steve Schuster Director, Information Security Office.
Cybersecurity Test Review Introduction to Digital Technology.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Spike DDoS Toolkit A Multiplatform Botnet Threat.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
Understanding Threat Models for Embedded Devices Jake Edge LWN.net Embedded Linux Conference Europe October 28, 2010.
Botnets A collection of compromised machines
BUILD SECURE PRODUCTS AND SERVICES
Trend Micro Consumer 2010 Easy. Fast. Smart.
What they are and how to protect against them
Office 365 is cloud-based productivity, hosted by Microsoft.
Port Knocking Benjamin DiYanni.
DDoS Attacks on Financial Institutions Presentation
A lustrum of malware network communication: Evolution & insights
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Wireless Network Security
Information Technology Deanship
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Understanding Threat Models for Embedded Devices
QianZhu, Liang Chen and Gagan Agrawal
Computer Virus and Antivirus
Virtual Private Networks
Pulse: An Adaptive Intrusion Detection System for the Internet of Things (IoT) Good morning every one , I will give you a brief overview of the work my.
Botnets A collection of compromised machines
Securing Information Systems
How to Secure Facebook Using Norton. If you are Norton customers and holds a Facebook account, this is how you can secure your account in few simple steps:
Call AVG Antivirus Support | Fix Your PC
Risk of the Internet At Home
Internet Basics.
Network Security: IP Spoofing and Firewall
Remove Security Tool Recently, quite a number of staff infected by Security Tool. This is so called Rogue software. User simply click some link in the.
Internet Worm propagation
Home Internet Vulnerabilities
PRESENTATION COMPUTER NETWORKS
The Internet-of-Insecure-Things Causes, Trends and Responses
Understanding the Mirai Botnet
Marcial Quinones-Cardona
Botnet of Things: Cybersecurity
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai Zhuohao Li Sep 25, 2019.
Cleaning Up the Internet of Evil Things
Presentation transcript:

Presented by Shashank Shekhar Sahoo Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai Presented by Shashank Shekhar Sahoo

Introduction

Background Knowledge Botnet - A network of internet connected devices, where each device is running one or more bots. - Can be used for sending spam emails, keylogging activities, and even performing Distributed Denial of Service attacks. Mirai - First surfaced in 2016, it is an IoT malware that infects smart devices. - Allows the attacker to control the devices remotely and launch DDoS attacks which can go upto 620 Gbps, or even more.

Background Knowledge Recent rise in IoT devices and consequently, IoT Botnets attacks. Majority of the world’s population have little or no information on malwares. Millions of IoT devices are being compromised. Low security of the devices.

Motivation How to remediate the population of vulnerable and compromised IoT devices effectively? To understand the impact of notifications on the remediation process.

Problem Problem: There is no clear and simple remediation path. There are three underlying problems: There is no public information to identify the owner. There is no established channel to reach the owner. Even if they are reachable, then how to provide them with an actionable notification.

Solution

Experiment Where do these Mirai infected devices reside? - 87% of Mirai infected devices IoT devices reside in broadband ISP consumer networks. - Less than 1% reside in other types of networks such as education, hosting or governmental networks. Since majority of the devices lie inside the broadband ISP networks, the ISPs can play a major role in the remediation of the IoT botnets.

Experiment Divided the experiment into two stages:

Notification Methods Walled Garden Notification - Infected users are kept in Quarantine. - Redirected to a landing page whenever user browses the web. - Landing page contains instructions on how to clean the device. - Difficult to ignore. An email is sent as well. Two versions: 1. Standard Walled Garden Notification (Observational Study) 2. Improved Walled Garden Notification (Randomized Control Study)

Notification Methods Control Group - No notifications were sent. Email Notification - Commonly used by ISPs. - Cheap and easy to scale. - Major drawbacks: - No assurance that the user has read it or not. - A different email might be associated with the ISP. - Email might be classified as spam.

Identifying and Tracking Infections Identifying Infected Machines - Shadowserver Abuse feeds Tracking Infected Machines - Darknet - IoT Honeypot Device Information - NMAP Scanner - Censys Scan

Results Impact of Notification Mechanism - Control group had the lowest cleanup rate of 74%. - Email only had a cleanup rate of 77%. - Improved Walled Garden remediated about 92%. Impact of Notification Content - Improved Walled Garden had a higher clean up rate (92%) as compared to Standard Walled Garden (88%). - Improved Walled Garden had a shorter median infection time as well.

Results Natural Remediation - High remediation rate (74%) even though they were not notified. - Surprising! - Decided to observe remediation rates of: - Two other networks (Business and Subsidiary). - Four random ISPs in the country. - Observed high natural remediation rates as well! - Along with high remediation rate, there was low reinfection rate (5%) as well.

Results Impact of Device Type - Censys and NMAP were used to identify the type of devices. - Couldn’t identify all the devices. Only 28% of them were identified. - Analyzed banner information and identified: - Routers - Cameras - Storage Units - DVRs - Set Top Box

Results Impact of Device Type - Routers cleaned up faster than cameras and DVRs.

User Experience Themes of User Experience in Communication with ISP - Improved Walled Garden - Significantly reduced the number of calls. - Less requests for technician. - Less complaints.

Criticism

Criticism Their research was based on a specific malware, i.e. Mirai. - Non persistent in nature. - There are persistent malwares as well. - Drawback: - Different types of malwares may have different effect on remediation rates. - Possible Solution: - Conduct a study with a mix of persistent and non-persistent malwares.

Criticism No explanation for low reinfection rates in the Control Group. - Mere rebooting of device doesn’t protect against reinfection. - Mirai has an aggressive scanning behaviour. - Devices still vulnerable to Mirai when once they are back online. - Drawback: - Didn’t conduct phone interviews with those customers. - Possible Solution: - Should have conducted interviews with them as well and find the underlying reason for low reinfection rate.

Criticism Results based on a very small sample of customers in one country. - Considered only 220 customers for their experiment. - Drawback: - On a larger scale, such as customers from multiple countries, the results may vary drastically. - Possible Solution: - Could consider a larger sample of customers belonging to different countries.

Criticism Results in Improved Walled Garden may be biased. - Customers may have already heard about this in the news or in the internet articles. - Helped them to clean it. - Drawback: - Studies conducted in two different time periods. - Possible Solution: - Conduct the studies in the same time period to avoid this.

Thank you!