Botnet Yongdae Kim KAIST. Towards Systematic Evaluation of the evadability of bot/botnet detection methods Elizabeth Stinson, John C. Mitchell 1.

Slides:



Advertisements
Similar presentations
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Advertisements

Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
F3 Collecting Network Based Evidence (NBE)
BOTHUNTER : DETECTING MALWARE INFECTION THROUGH IDS-DRIVEN DIALOG CORRELATION AUTHORS: Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke.
An Introduction of Botnet Detection – Part 2 Guofei Gu, Wenke Lee (Georiga Tech)
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
Botnet Dection system. Introduction  Botnet problem  Challenges for botnet detection.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Host Intrusion Prevention Systems & Beyond
BotFinder: Finding Bots in Network Traffic Without Deep Packet Inspection F. Tegeler, X. Fu (U Goe), G. Vigna, C. Kruegel (UCSB)
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
1. Introduction The underground Internet economy Web-based malware The system analyzing the post-infection network behavior of web-based malware How do.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman.
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology USENIX Security '08 Presented by Lei Wu.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Introduction to Honeypot, Botnet, and Security Measurement
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
APT29 HAMMERTOSS Jayakrishnan M.
BotNet Detection Techniques By Shreyas Sali
Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto Networks.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Amir Houmansadr CS660: Advanced Information Assurance Spring 2015
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang, and.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Trend Micro Confidential 9/23/2015 Threat Rules Sharing Advanced Threats Research.
Honeypot and Intrusion Detection System
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets,
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Topic 5: Basic Security.
Advanced Persistent Threats (APT) Sasha Browning.
Security fundamentals Topic 10 Securing the network perimeter.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Presented by D Callahan.
Role Of Network IDS in Network Perimeter Defense.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Defining Network Infrastructure and Network Security Lesson 8.
Botnets A collection of compromised machines
Critical Security Controls
Instructor Materials Chapter 7 Network Security
TOPIC 8 ADVANCED PERSISTENT THREAT (APT) 進階持續性滲透攻擊
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Botnets A collection of compromised machines
Section 14.1 Section 14.2 Identify the technical needs of a Web server
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee
Data Mining & Machine Learning Lab
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Botnet Yongdae Kim KAIST

Towards Systematic Evaluation of the evadability of bot/botnet detection methods Elizabeth Stinson, John C. Mitchell 1

Purpose  Contribution ▹ Systematic framework for evaluating the evadability of botnet detection methods »Quantifying the evasion cost  Approaches ▹ Examine existing Automated Botnet Detection Methods ▹ Evasive Techniques & its Cost ▹ Problems on detection methods ▹ Future research approaches 2

Bot/Botnet  Definition of a bot ▹ Receive commands through C&C ▹ Carry out attacks by commands ▹ No limit on attack time & format ※ More general than usual  Attack type ▹ DDoS, Identity Theft, Malware Distribution, Phishing, Piracy, Proxying, Scanning, Server hosting(SMTP,HTTP), Spamming 3

Automated Detection Methods  Relying Characteristics 4

#1. Strayer : Detection 5 Eliminate flows unlikely to be botnet 5 Distinct Filters - Non-TCP Traffic - Port Scans - High bit-rate flows (* Bandwidth > 8kb/s) - Flows w/ packet > 300Kb/s - Short lived connection (* > 60’) 5 Distinct Filters - Non-TCP Traffic - Port Scans - High bit-rate flows (* Bandwidth > 8kb/s) - Flows w/ packet > 300Kb/s - Short lived connection (* > 60’) Keep only IRC flows by machine learin alg. Keep only IRC flows by machine learin alg. Cluster related flows by 5D space & topol. anal Flow characteristics - Duration - Role - Bytes per packet (bpp) - Bytes per second (bps) - Packets persecond (pps) Flow characteristics - Duration - Role - Bytes per packet (bpp) - Bytes per second (bps) - Packets persecond (pps) - Keep flows : time period - Use 5d space · Find a cluster of flows their distance is small - Topological analysis · Identify RP -Manual analysis · Identify bot master IP - Keep flows : time period - Use 5d space · Find a cluster of flows their distance is small - Topological analysis · Identify RP -Manual analysis · Identify bot master IP

#2. Rishi : Detection  Identifies bot-infected hosts by passively monitoring network traffic (IRC packets)  Analyzing IRC packets with nicknames that match pre-specified templates  Heavily Rely on IRC client nickname(Syntax) 6

#3. Karasaridis : Detection  Focusing on detecting IRC botnet C&C using 4 steps 7 1.Identify hosts w/ bad behaviors : scan, spam.. 2.Isolate flows to/from those hosts 3.Identify C&C u/ 3 criteria - stad. IRC ports - remote hub having multiple access from suspicious hosts - flows whose characteristics within a flow model for IRC

#3. Karasaridis : Detection  Focusing on detecting IRC botnet C&C using 4 steps 8 4.Analysis of C&C records : 3 stages # of unique suspected bots for a given hub Avrg. fpa, ppf, bpp from most popular hub Distance b/w traffic to hub and model traffic heuristic score (e.g., #of idle clients) 5.Assign confidence score to suspected control servers 6.Alarm when c.score > threshold

#4. Botswat : Detection  Focusing on system call invocation ▹ remotely-initiated vs locally initiated  Characterize each behaviors ▹ Identify data initiated from local user inputs ▹ Track tainted data initiated remotely  Compare ▹ Behavioral separation b/w two 9

BotHunter  Bot Infection Dialog Model ▹ E1 : External to Internal Inbound scan ▹ E2 : External to Internal Inbound exploit ▹ E3 : Internal-to-external binary download ▹ E4 : Internal-to-external C&C communications ▹ E5 : Outbound port scan  Three detection engine ▹ Port scan detection engine ▹ Payload-anomaly detection engine ▹ Snort signatures  Correlation Engine declares host infection (static C&C IP) when ▹ E2 with E3, E4 or E5 ▹ Any 2 of {E3, E4, E5} 10

BotMiner  Clustering similar communication traffic ▹ cluster hosts whose flows are similar bpp, bps, ppf, fph  Clustering similar attack traffic ▹ clustering hosts scanning same ports, spamming, or downloading similar files  Performing cross cluster correlation to identify the bots 11

Conclusion  Limitations on detection methods ▹ Two common assumptions are less true »Bots simultaneous attack participation => Only a few needs that : DDoS, phishing »Coordination through C&C network => This can be achieved outside of the C&C  Alternative approaches ▹ Focus on botnet utility ▹ Ways to negatively affect this utility 12

Sherlock Holmes and the Case of the Advanced Persistent Threat Ari Juels, Ting-Fang Yen 13

What is APT?  Advanced ▹ “Operate[s] in the full spectrum of computer intrusion.” [Bejtlich’10]  Persistent ▹ Maintains presence – Targeted  Threat ▹ Well-resourced, organized, motivated 14

Is This New? Traditional AttackersAPT Means of exploitatio n Software vulnerabilities, Social engineering Objective s Spam, DoS attack, Identity theft Espionage, IP theft MotiveFame, Financial gain Military, Political, Technical Target Machines with certain configurations Users ScopePromiscuousSpecific TimingFastSlow ControlAutomotive malwareManual Intervention 15

Commonalities between Reported APTs 16

Typical APT 17 Targeting Command and Control Lateral movement Data Exfiltration

Targeting : Spear Phishing  Socially Engineered Mail  Zeroday Vulnerability in Attachment 18

Targeting : Watering Hole 19 iOS Developer Site at Core of Facebook, Apple

Targeting : Watering Hole 20

Targeting: Exploit Trusted Relationship 21 SecureID two-factor authentication product ALZip Update Server Attacker

Other Techniques: Tools  Infected digital photo frames  Infected mobile phones  Bluetooth vulnerabilities  Compromised device drivers 22

Command and Control 23 Illustration of links among SK communications, RSA, and Night Dragon

Command and Control : Insights  Uses Specific DNS servers  The TTL of domains  Communicate with C&C at frequent intervals  Inspection of TCP port 443 traffic 24

Data Exfiltration 25 HTTP, FTP High value asset Attacker’s

Case Study : SK Comm. Hack 26 Database Attacker ALZip Update Server Non-targeted Computers C&C Server Tool box Server WayPoint Targeted Computers Gain Acces s Legitimate Update Malicious Update Tool Downloadin g C&C Communication

Reconnaissance & Preparation (1/2)  C&C Server ▹ Registering the domain ‘alyac.org’ ▹ At attack time, a Korean IP was used ▹ Time-To-Live(TTL) = 30 minutes  Tool box server ▹ A large Taiwanese publishing company website ▹ Webserver was used to download malwares 27

Reconnaissance & Preparation (2/2) 28 Attacker from a Chinese IP ALZip Update Server Gained access Uploaded instructions Non-targeted Computers Targeted Computers SK Comm. Info. was gained to distinguish target

Targeting 29 ALZip Update Server Targeted Computers Malicious Update Request malicious update file Over 60 Computers were infected Tool box Server Tool Downloading x.exe: network monitor nateon.exe: access the user databases rar.exe: modified WinRAR

Data Exfiltration 30 Collecting Information Database Targeted Computers Personal details of 35 million SK Comm. users User identifier, password was encrypted but others not WayPoint Attacker Korean IP A Company in Nonhyeon Chinese IP

The Red-Headed-League Attack  Encompass a victim in a general event that conceals a targeted attack.  Red-headed Botnet 31

Other Red-headed Attacks  Open source software  Social Network ▹ Friend finding  Free USB Sticks 32

The Blue-Carbuncle Attack  Conceal unauthorized communications within commonplace objects or activities. 33 HTTP, FTP High value asset Attacker’s

The Bohemian-Scandal Attack  Create disturbances to the victim to obtain intelligence about a target resource  Recommended responses to a breach can reveal... ▹ Location of valuables ▹ Critical services ▹ What you know about the attack 34

The Speckled-Band Attack  Breach a security perimeter through unconventional means  Examples ▹ Infected digital photo frames ▹ Infected mobile phones ▹ Bluetooth vulnerabilities ▹ Compromised device drivers 35

Conclusion  APT is a campaign ▹ No formula or playbook of tactics  How about detection? ▹ Behavior profiling ▹ Defensive deception ▹ Information sharing 36