Botnets. Botnet Threat Botnets are a major threat to the Internet because: Consist of a large pool of compromised computers that are organized by a master.

Slides:



Advertisements
Similar presentations
FIREWALLS Chapter 11.
Advertisements

Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Taxonomy of Botnets Team Mag Five Valerie Buitron Jaime Calahorrano Derek Chow Julia Marsh Mark Zogbaum.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Chapter 12 Network Security.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Slides to add  Botnet slides  Security regulations  Do we have similar laws for transportation?  Terrorism (look for some examples if possible)  Company.
Botnets Usman Jafarey Including slides from The Zombie Roundup by Cooke, Jahanian, McPherson of the University of Michigan.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Threat infrastructure: proxies, botnets, fast-flux
Borrowed from Brent ByungHoon Kang, GMU. A Network of Compromised Computers on the Internet IP locations of the Waledac botnet. Borrowed from Brent ByungHoon.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
PROS & CONS of Proxy Firewall
1 Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling - Proceedings.
Botnets An Introduction Into the World of Botnets Tyler Hudak
Introduction to Honeypot, Botnet, and Security Measurement
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Antivirus Technology in State Government Kym Patterson State Chief Cyber Security Officer Department of Information Systems.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
BotNet Detection Techniques By Shreyas Sali
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 An Advanced Hybrid Peer-to-Peer Botnet Ping Wang, Sherri Sparks, Cliff C. Zou School of Electrical Engineering & Computer Science University of Central.
Appear in IEEE TDSC 2008 Presented by Wei-Cheng Xiao.
Nullcon Goa 2010http://nullcon.net Botnet Mitigation, Monitoring and Management - Harshad Patil.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Studying Spamming Botnets Using Botlab
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
DoS/DDoS attack and defense
Measurements and Mitigation of Peer-to-peer Botnets: A Case Study on Storm Worm Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Presented by D Callahan.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Internet Security and Implications on Transportation Systems 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
Botnets Borrowed from Brent ByungHoon Kang, GMU. A Network of Compromised Computers on the Internet IP locations of the Waledac botnet. Borrowed from.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Published: USENIX HotBots, 2007 Presented: Wei-Cheng Xiao 2016/10/11.
Botnets A collection of compromised machines
Instructor Materials Chapter 7 Network Security
Botnets.
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
Botnets A collection of compromised machines
Presentation transcript:

Botnets

Botnet Threat Botnets are a major threat to the Internet because: Consist of a large pool of compromised computers that are organized by a master. a.k.a., Zombie Armies Carry out sophisticated attacks to disrupt, gather sensitive data, or increase armies Armies are in the 1000’s to aggregate computing power Communication network allows bots to evolve on compromised hosts

Evolution of Botnets Motivation change in computer hacking Vandalism  Financial gains Loss of $67.2 billion (2006 figure)

4 eCrime Market Operation Raw MaterialsGoal Market S S S Buy, Sell, & Trade Wealth Goods(Re)Application

5 Sensitive Data and Market Significance Credit Card #s SSNs Bank Account #s Percentage of Labeled Data Sensitive Data Type

Botnet Architecture Botmaster Bot Recruiting Bot

Botnet Taxonomy A taxonomy model is necessary to develop the intelligence to identify, detect, and mitigate the risk of an attack. Classification Scheme Attacking Behavior C&C Models Rally Mechanisms Communication Protocols Observable botnet activities Evasion Techniques

Attacking Behaviors Infecting new hosts Social engineering and distribution of malicious s or other electronic communications (i.e. Instant Messaging) Example - sent with botnet diguised as a harmless attachment. Stealing personal information Keylogger and Network sniffer technology used on compromised systems to spy on users and compile personal information Phishing and spam proxy Aggregated computing power and proxy capability make allow spammers to impact larger groups without being traced. Distributed Denial of Service (DDoS) Impair or eliminate availability of a network to extort or disrupt business

Command and Control (C&C) Essential for operation and support of botnet 3 Styles – Centralized, P2P and Randomized Weakest link of the botnet because: Elimination of botmaster takes out the botnet High level of activity by botmaster makes them easier to detect than their bots

C&C Centralized Model Advantage: Simple to deploy, cheap, short latency for large scale attacks Disadvantage: Easiest to eliminate

3 Steps of Authentication Bot to IRC Server IRC Server to Bot Botmaster to Bot (*) : Optional Step C&C Centralized Model Example

Peer to Peer Model Advantage: Resilient to failures, hard to discover, hard to defend. Disadvantage: Hard to launch large scale attacks because P2P technologies are currently only capable of supporting very small groups (< 50 peers)

P2P Botnet Example: Storm The Overnet network Storm uses is extremely dynamic. Peers come and go and can change OIDs frequently. In order to stay “well connected” peers must periodically search for themselves to find nearby peers: Storm Node

Rallying Mechanisms Hard-coded IP address The bot communicates using C&C ip addresses that are hard-coded in it’s binary files. Easy to defend against, as ip addresses are easily detectable and blocked, which makes the bot useless.

Rallying Mechanisms Dynamic IP address with DNS domain name resolution Hard-coded C&C domains names. Detection harder when botmaster randomly changes the mapped IP address If connection fails the bot performs DNS queries to obtain the new C&C address for redirection.

Rallying Mechanisms Distributed DNS Service Hardest to detect & destroy. Newest mechanism. Sophisticated. Botnets run own DNS service out of reach of authorities Bots use the DNS addresses to resolve the C&C servers Use high port numbers to avoid detection by security devices and gateways

Communication Protocols In most cases botnets use well defined and accepted Communication Protocols. Understanding the communication protocols used helps to: Determine the origins of a botnet attack and the software being used Allow researchers to decode conversations happening between the bots and the masters There are two main Communication Protocols used for bot attacks: IRC HTTP

IRC Protocol IRC Botnets are the predominant version IRC mainly designed for one to many conversations but can also handle one to one Most corporate networks do not allow IRC traffic so any IRC requests can determine and external or internal bot Outbound IRC requests means an already infected computer on the network Inbound IRC requests mean that a network computer is being recruited

HTTP Protocol Due to prevalence of HTTP usage it is harder to track a botnet that uses HTTP Protocols Using HTTP can allow a botnet to skirt the firewall restrictions that hamper IRC botnets Detecting HTTP botnets is harder but not impossible since the header fields and the payload do not match normal HTTP traffic Some new options emerging are IM and P2P protocols and expect growth in the future

HTTP Botnet Example: Fast- flux Networks Commonly used scheme Used to control botnets w/ hundreds or even thousands of nodes

Chronicle of Botnets

Observable Behaviors Three categories of observable Botnet behaviors: Network-based Host-based Global Correlated

Network patterns can be used to detect Botnets IRC & HTTP are the most common forms of Botnet communications Detectable by identifying abnormal traffic patterns. IRC communications in unwanted areas IRC conversations that human’s can not understand DNS domain names DNS queries to locate C&C server Hosts query improper domain names IP address associated with a domain name keeps changing periodically Traffic Bursty at times, and idle the rest of the time Abnormally fast responses compared to a human Attacks (eg: Denial of Service) - Large amounts of invalid TCP SYN Packets with invalid source IP addresses Network-Based

Host-Based Botnet behavior can be observed on the host machine. Exhibit virus like activities When executed, Botnets run a sequence of routines. Modifying registries Modifying system files Creating unknown network connections Disabling Antivirus programs

Global Correlated Global characteristics are tied to the fundamentals Botnets Not likely to change unless Botnets are completely redesigned and re-implemented Most valuable way to detect Botnets Behavior the same regardless if the Botnets are communicating via IRC or HTTP Global DNS queries increase due to assignment of new C&C servers Network Flow disruptions

Conclusion By using the taxonomy and accurately identifying what type of botnet you are dealing with it will be easier to use the correct evasion technique.

BACKUP SLIDES

Evasion Techniques Sophistication of Botnets allow them to evade AV Engines Signature base intrusion detection systems (IDS) Anomaly-based detection systems Techniques Executable packers Rootkits Protocols

Evasion Techniques Moving away from IRC Taking control of HTTP VoIP IPV6 ICMP Skype protocols

Evasion Techniques Skype, the best botnet ever?? Very popular, 9M+ users, average 4M+ connected Very good firewall ”punching” capabilities Obfuscated and persistent network flow Provides network API Skype provides network connectivity and obfuscation Skype is resilient by design Just need nickname(s) for communications Things are easy Exploit Skype Install bot as Skype plugin Generate plugin authorization token and execute

Beating Evasion Techniques Prevention Find C&C servers and destroying them Most effective method for prevention and cure: Combining traditional detection mechanisms with those based on anomaly network behavior

Bootstrapping Peer Round 2 Round 1 Round 4 Round 3

Overnet Message Passing: Overnet has three basic message types to facilitate proper function of the network: Connect: A peer uses connect messages to report their OID to other peers and to receive a list of peers somewhat close to the peer. Search: A peer uses search messages to find resources and other nodes based on OID. Publicize: A peer uses publicize messages to report ownership of network resources (OIDs) so that other peers can find the resource later.

Random Mechanisms Theoretical architecture: Evan Cooke, et al describe the model Easy implementation and resilient to discovery and destruction Scalability limitations make it impractical for large scale attacks. Bots sleep and are not activated until Bot Master is ready to attack