BRETT STONE-GROSS, MARCO COVA, LORENZO CAVALLARO, BOB GILBERT, MARTIN SZYDLOWSKI, RICHARD KEMMERER, CHRISTOPHER KRUEGEL, AND GIOVANNI VIGNA PRESENTATION.

Slides:



Advertisements
Similar presentations
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Advertisements

Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Botnet Behavior and Detection Strategies Brad Wilder.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Your Botnet is My Botnet: Analysis of a Botnet Takeover
Attacking Session Management Juliette Lessing
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Web server security Dr Jim Briggs WEBP security1.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Threat infrastructure: proxies, botnets, fast-flux
On the Feasibility of Large-Scale Infections of iOS Devices
Borrowed from Brent ByungHoon Kang, GMU. A Network of Compromised Computers on the Internet IP locations of the Waledac botnet. Borrowed from Brent ByungHoon.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
1. Introduction The underground Internet economy Web-based malware The system analyzing the post-infection network behavior of web-based malware How do.
Norman SecureSurf Protect your users when surfing the Internet.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
APA of Isfahan University of Technology In the name of God.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.
JOHN P. JOHN FANG YU YINGLIAN XIE MARTÍN ABADI ARVIND KRISHNAMURTHY PRESENTATION BY SAM KLOCK Searching the Searchers with SearchAudit.
APT29 HAMMERTOSS Jayakrishnan M.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Chapter 13 – Network Security
Botnets: Yesterday, Today, and Tomorrow CS 598: Advanced Internet Presented by: Imranul Hoque.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Final Introduction ---- Web Security, DDoS, others
Understanding the Network-Level Behavior of Spammers Best Student Paper, ACM Sigcomm 2006 Anirudh Ramachandran and Nick Feamster Ye Wang (sando)
Security Update Vincent BRILLAULT HEPiX Spring 2014, Annecy.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
1 An Advanced Hybrid Peer-to-Peer Botnet Ping Wang, Sherri Sparks, Cliff C. Zou School of Electrical Engineering & Computer Science University of Central.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross,
Appear in IEEE TDSC 2008 Presented by Wei-Cheng Xiao.
Nullcon Goa 2010http://nullcon.net Botnet Mitigation, Monitoring and Management - Harshad Patil.
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
CHAPTER 9 Sniffing.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Host and Application Security Lesson 17: Botnets.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Module 7: Advanced Application and Web Filtering.
Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer,
Studying Spamming Botnets Using Botlab
1 Modeling and Measuring Botnets David Dagon, Wenke Lee Georgia Institute of Technology Cliff C. Zou Univ. of Central Florida Funded by NSF CyberTrust.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Presented by : Matthew Sulkosky COSC 316 (Host Security) BOTNETS A.K.A ZOMBIE COMPUTING.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Published: USENIX HotBots, 2007 Presented: Wei-Cheng Xiao 2016/10/11.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Botnets A collection of compromised machines
Secure Software Confidentiality Integrity Data Security Authentication
Botnets A collection of compromised machines
Your Botnet is My Botnet: Analysis of a Botnet Takeover
Your Botnet is my Botnet: Analysis of a Botnet Takeover
Presentation transcript:

BRETT STONE-GROSS, MARCO COVA, LORENZO CAVALLARO, BOB GILBERT, MARTIN SZYDLOWSKI, RICHARD KEMMERER, CHRISTOPHER KRUEGEL, AND GIOVANNI VIGNA PRESENTATION BY SAM KLOCK Your Botnet is my Botnet: Analysis of a Botnet Takeover

Background Botnet: network of machines compromised by malware (bots) under control of external agent Botmaster: agent controlling a botnet Command and control (C&C): mechanism by which botmaster controls a botnet

Motivation Botnets: big and growing security issue on the Internet  More broadband Internet access makes them easier to build  Wealth of information transported makes them profitable  Sizeable botnets can participate in large-scale malicious acts We want to know more about them  How do they grow?  What can they do?  How do we address the threats existing and potential botnets pose?  How do we preempt their growth (address user vulnerabilities)?

Problem Analyzing botnets is difficult  Topologies vary: top-down, P2P, random  Protocols and goals vary  Sizes vary widely Several techniques are typical  Passive analysis: collect spam likely sent from bots; analyze query patterns to DNS/DNSBL; examine network traffic  Can’t scale to entire Internet  Some metrics only work for botnets engaging in certain activities  Infiltration: join the botnet and monitor  Most botnets avoid supplying information to member bots Images: Wang, Sparks, Zou, “An Advanced Hybrid Peer-to-Peer Botnet”, in IEEE Transactions on Dependable and Secure Computing, 7(2):

Approach Hijack the botnet  Idea: investigate botnet C&C, then tamper with it  Learn about botnet behavior from perspective of botmaster Two ways to accomplish  Seize botmaster’s C&C machines  Law enforcement’s job  Better: collaborate with DNS providers  Goal: redirect C&C traffic to us  Then mimic C&C behavior Approach depends on targeted botnet

Target: Torpig “One of the most advanced pieces of crimeware ever created”  Mainly harvests personal information  Opens ports for HTTP and SOCKS on victim machines  Useful for anonymous browsing, sending spam  Not yet clear what Torpig does with them Good candidate for DNS-based hijacking  Centralized C&C  Bots identify C&C via domain names  Communication via HTTP

Torpig vs. Others Torpig has interesting characteristics  Domain flux  Bot identifiers  A lot of harvested information  Implementable protocol Past attempts:  Conficker: no bot identifiers, protocol authentication  Size estimation is hard  No authentication  no data  Kraken: no data collection (spam sending)  Little insight into data harvesting

Torpig Characteristics Basic idea: Trojan-horsed based rootkit  Uses Mebroot  Attack via drive-by-download  Vulnerable web server  Vulnerable client/OS  Install Mebroot, then install Torpig malware (0) Inject URL (1) Client HTTP GET (2) Deliver injected URL (3) Client HTTP GET from DbD server (4) Download & run Mebroot

Torpig Characteristics (cont’d) (5) Fetch Torpig libraries (6) Configure, monitor (7) Execute man-in-the- browser phishing

Bot Behavior Periodic C&C communication  ~20 minutes  Uploads harvested data  Server responds okn or okc Man-in-the-browser more complex  List of targeted URLs  Requests sent to special injection server  Bypasses SSL, certificates, etc.  Can be hijacked (not attempted here)

Hijacking Torpig Domain flux  Related to fast flux  C&C hidden behind shifting domains  Bots generate list of domains to check periodically  Iterate through list; stop on valid response Domain generation algorithm (DGA) reverse- engineered Botmaster didn’t register domains in advance: big weakness Pseudocode for daily DGA

Hijacking Torpig (cont’d) Conceptually simple with DGA, protocol, botmaster carelessness  Register domains first  Mimic protocol (encryption easily broken) Not a general approach  Conficker: 50,000 domains per day  Nondeterministic  Estimated cost: > $91.3m per year In practice:  Two different hosting providers, two different registrars  Redundancy  Apache handled requests  Data obtained downloaded and discarded from hosts  Total: 8.7 GB Apache logs, 69 GB pcap  Up three weeks, collected ten days

Hijacking Torpig (cont’d) Legal/ethical implications  Botnet is a criminal instrument Precedent in past research Follow-through:  No new config ( okn only)  Shared data with DoD, FBI, ISPs

Torpig Data Format Communication via HTTP POST URL: bot ID ( nid ), header Body: stolen data Header info:  ts  ip  hport, sport  os, cn  bld, ver

Torpig Data Collected

Analysis: Botnet Size nid may be used to count bots  Computed from HDD model/serial  Not completely unique: couple with os, cn, bld, ver  Subtract researchers, probes, casual machines Found 182,800 likely infected hosts Identifying researchers  Intuition: analyze in controlled environment  Use virtual machine  VMs have default hardware specs (HDD model/serial)  Eliminate nid s computed from VM defaults  Discounted 40 hosts

Analysis: Botnet Size (cont’d) Much more accurate than IP counting  DHCP churn causes overcount  706 machines: > 100 IPs  One host: 694 unique IPs  NAT causes undercount  1,247,642 unique IPs vs. 182,800 est. bots Traffic characteristics  Peaks at 9am PST, troughs 9pm PST  Within hour: unique IPs = unique bots  Within day: unique IPs > unique bots

Analysis: Botnet Growth Most bots in U.S., Germany, Italy  Intuition: targeted websites mainly English, German, Italian  IP counting overestimates Italian/German infections Found 49,294 new infections  Most on Jan 25, 27  How? ts = 0

Analysis: Botnet as Service Why bld ?  Twelve different values  Some values more active than others  dxtrbc : 5,432,528 submissions  mentat : 1,582,547 submissions  Features do not seem to differ from build to build Explanation: customers  Treat bld as identifier for customers  Can process output on basis of customer payment, wants Q: Paper doesn’t mention distribution of builds over members. Could build activity be attributable to that?

Analysis: Stolen Data Institutional data  8,310 accounts, 410 institutions  Paypal (1,770)  Poste Italiane (765)  Capital One (314)  E*Trade (304)  Chase (214)  310 institutions: < 10 accounts  Notifying victims: complicated 38% credentials stolen from password managers

Analysis: Stolen Data (cont’d) Credit cards  Checked prefixes, used Luhn heuristic  Found 1,660 unique debit/credit card numbers  1,056 Visa  447 MasterCard  81 American Express  36 Maestro  24 Discover  49% in U.S., 12% in Italy, 8% in Spain, rest in 40 others 86%: only one card number One case: 30 numbers Value (via Symantec):  $0.10 to $25 per card  $10 to $1000 per account  $83k to $8.3m over ten days: profitable Assumes all data is fresh

Analysis: Proxies and Other Uses HTTP/SOCKS proxies  20.2% machines public accessible  Looked at 10,000 most active IPs  Most likely to be used  Checked IPs against Spamhaus list  One is known spammer  244 flagged as proxies or malware-infected Conclusion: usable, but can’t claim current use Distributed denial-of- service (DDoS)  Question: how much bandwidth?  Looked up connection types for IPs via ip2location  65% analyzable IPs used cable/DSL  Low baseline of 435 kbps upstream: 19 Gbps total  Add in corporate connections (22%) – much higher Caveat: could not look up for two-thirds of hosts

Analysis: Passwords Sophos poll (March 2009): 33% of Internet users use poor password practices (n = 676)  Torpig supplied a lot of passwords: we can validate  297,262 user/password pairs from 52,540 machines 28% reused passwords for 368,501 sites, similar to Sophos Password strength  Fed 173,686 unique passwords to John the Ripper  65 minutes: ~56,000 cracked (simple replacement)  +10 minutes: ~14,000 cracked (wordlist)  +24 hours: ~30,000 cracked (brute force) 40% cracked in < 75 mins

Conclusion Contributions:  Comprehensive analysis of Torpig  Insight into victims  Usability of botnets for fun, profit, attack Lessons:  IP-counting wildly imprecise. Do not use it  User culture is a big problem  Lots of passwords were guessed easily in this sample  Intuition: users do not understand usage risks  Solution: educate, educate, educate  Coordination with registrars, hosting facilities, victim institutions, law enforcement is hard  Makes redressing victims difficult  Solution: regulatory intervention