Active Botnet Probing to Identify Obscure Command and Control Channels Guofei Gu, Vinod Yegneswaran, Phillip Porras, Jennifer Stoll, and Wenke Lee Georgia.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan Department of Computer Science Florida State University.
An Introduction of Botnet Detection – Part 2 Guofei Gu, Wenke Lee (Georiga Tech)
Software Certification and Attestation Rajat Moona Director General, C-DAC.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
PROMISE: Peer-to-Peer Media Streaming Using CollectCast Mohamed Hafeeda, Ahsan Habib et al. Presented By: Abhishek Gupta.
 Firewalls and Application Level Gateways (ALGs)  Usually configured to protect from at least two types of attack ▪ Control sites which local users.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
1 Validation and Verification of Simulation Models.
Bro: A System for Detecting Network Intruders in Real-Time Presented by Zachary Schneirov CS Professor Yan Chen.
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
Bayesian Bot Detection Based on DNS Traffic Similarity Ricardo Villamarín-Salomón, José Carlos Brustoloni Department of Computer Science University of.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
2009/9/151 Rishi : Identify Bot Contaminated Hosts By IRC Nickname Evaluation Reporter : Fong-Ruei, Li Machine Learning and Bioinformatics Lab In Proceedings.
Battle of Botcraft: Fighting Bots in Online Games withHuman Observational Proofs Steven Gianvecchio, Zhenyu Wu, Mengjun Xie, and Haining Wang The College.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
11 Active Botnet Probing to Identify Obscure Command and Control Channels G Gu, V Yegneswaran, P Porras, J Stoll, and W Lee - on Annual Computer Security.
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology USENIX Security '08 Presented by Lei Wu.
Introduction to Honeypot, Botnet, and Security Measurement
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
1 Autonomic Computing An Introduction Guenter Kickinger.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
Amir Houmansadr CS660: Advanced Information Assurance Spring 2015
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang, and.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
11 Automatic Discovery of Botnet Communities on Large-Scale Communication Networks Wei Lu, Mahbod Tavallaee and Ali A. Ghorbani - in ACM Symposium on InformAtion,
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Appear in IEEE TDSC 2008 Presented by Wei-Cheng Xiao.
Who Is Peeping at Your Passwords at Starbucks? To Catch an Evil Twin Access Point DSN 2010 Yimin Song, Texas A&M University Chao Yang, Texas A&M University.
Automated Classification and Analysis of Internet Malware M. Bailey J. Oberheide J. Andersen Z. M. Mao F. Jahanian J. Nazario RAID 2007 Presented by Mike.
Identification of Bot Commands By Run-time Execution Monitoring Younghee Park, Douglas S. Reeves North Carolina State University ACSAC
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets,
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
AN INSIDE LOOK AT BOTNETS Barford, Paul and Yegneswaran Advances in Information Security, Springer, 2006 Kishore Padma Raju.
1 COPYRIGHT © 2015 ALCATEL-LUCENT. ALL RIGHTS RESERVED. Cognitive Security: Security Analytics and Autonomics for Virtualized Networks Lalita Jagadeesan.
Automating Analysis of Large-Scale Botnet Probing Events Zhichun Li, Anup Goyal, Yan Chen and Vern Paxson* Lab for Internet and Security Technology (LIST)
Published: Internet Measurement Conference (IMC) 2006 Presented by Wei-Cheng Xiao 2015/11/221.
Omar Hemmali CAP 6135 Paul Barford Vinod Yegneswaran Computer Sciences Department University of Wisconsen, Madison.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Leveraging Delivery for Spam Mitigation.
Chien-Chung Shen Bot and Botnet Chien-Chung Shen
Botnets Usman Jafarey Including slides from The Zombie Roundup by Cooke, Jahanian, McPherson of the University of Michigan.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
BotCop: An Online Botnet Traffic Classifier 鍾錫山 Jan. 4, 2010.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
Speaker:Chiang Hong-Ren An Investigation and Implementation of Botnet Detection Schemes.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Presented by D Callahan.
HoneyStat: Local Worm Detection Using Honeypots David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, et al from Georgia Institute of Technology Authors: The.
Role Of Network IDS in Network Perimeter Defense.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Real-Time Botnet Command and Control Characterization at the Host Level JHEN-HUANG Gao.
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
11 A First Step towards Live Botmaster Traceback Daniel Ramsbrock, Xinyuan Wang, and Xuxian Jiang - the 11th International Symposium on Recent Advances.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Chapter 7: Identifying Advanced Attacks
Introduction to Networking
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee
Data Mining & Machine Learning Lab
Presentation transcript:

Active Botnet Probing to Identify Obscure Command and Control Channels Guofei Gu, Vinod Yegneswaran, Phillip Porras, Jennifer Stoll, and Wenke Lee Georgia Institute of Technology Annual Computer Security Applications Conference 2009, ACSAC ‘09

Outline Introduction Problem Statement and Assumption Active Botnet Probing: Architecture and Algorithm Experiments with BotProbe Policy Implications and Limitations Conclusions and Future Work 2

Introduction A unique property of a botnet that separates it from other malware families is the command and control (C&C) channel. Although botnet developers have the option of devising novel protocols for C&C, most contemporary botnet C&C communications are overlaid onto existing protocols – IRC, available software, less suspicion, good enough 3

Introduction (cont’d) The authors have observed a substantial collection of current IRC botnets utilizing obscure C&C communications. Steathy botnets with small sizes, obfuscated C&C dialogs, and infrequent C&C interactions pose an ongoing challenge to the malware research community. Assume there is only one round of (obscure) chat-like botnet C&C interaction from one bot, can we still detect the bot with a high probability? 4

Introduction (cont’d) Active botnet probing: One can engage in the active manipulation of selected suspicious sessions to better identify botnet dialogs. – a typical botnet C&C interaction has a clear command-response pattern – bots are preprogrammed to respond to the set of commands they receive and, unlike humans 5

Introduction (cont’d) First, we provide a set of candidate filters that use heuristics to filter out a large class of well- behaved connections. Second, we provide a hypothesis testing framework that enables network administrators to tune the level of expected interference with detection rates. In addition, a whitelist approach to avoid disturbing known critical/legitimate programs/sessions are used. 6

Problem Statement and Assumption By active, we mean that we assess traffic for suspicious traffic sessions, which may lead us to dynamically inject packets that will probe the internal client to determine whether that side of the communicating/chatting session is being managed by a human or a bot. Invariant – predefined commands – tolerating typographical errors 7

Detection Assumption Input Perspective – Our assumed solution will reside at the network egress point (as a middlebox), where it can observe all flows that cross the network perimeter. – Furthermore, the system is in-line with the communication, and has the authority to inject or modify inbound packets, as necessary. Chat Protocol Awareness – Our solution incorporates knowledge of the standard (chat, IRC) protocols that botnets use to overlay their C&C communications. 8

Active Botnet Probing: Architecture and Algorithm The first component performs benign traffic filtering, protocol matching and flow sampling. – e.g., duration of the flow, average bytes per packet, average bytes per second – remove non-TCP; find NICK, USER, PRIVMSG, TOPIC – Thus, it leaves only a small portion of highly suspicious candidates. 9

Active Botnet Probing: Architecture and Algorithm (cont’d) Once we have completed the above down- selection to our candidate flows, we then focus our analyses on the TOPIC and PRIVMSG message packets. BotProbe analysis: identify whether there is another layer of overlay C&C-like protocol – a command-then-response- like packet pair (Pc, Pr) where Pc is a short packet from the server, and Pr is a response from the client immediately after the receiving of Pc 10

Design Choices of Active Probing Techniques P0 (Explicit-Challenge-Response) – CAPTCHA or – BotProbe can inject a simple puzzle for the internal participant to solve. P1 (Session-Replay-Probing) – The BotProbe monitor spoofs the address of the server and inserts additional TCP packets that replay the same application command Pc to the client several times. 11

Design Choices of Active Probing Techniques (cont’d) P2 (Session-Byte-Probing) – The BotProbe monitor randomly permutes certain bytes of the application command. Note that strategies P1 and P2 may break existing connections (by injecting new packets) if subsequent C&C communications occur in the same TCP connection. – To recover from this, our in-line botnet probing system should adjust the TCP sequence/acknowledge numbers and checksums to account for the new packets. 12

Design Choices of Active Probing Techniques (cont’d) P3 (Client-Replay-Probing) – Chat protocols like IRC and IM allow users to directly message each other. – In such instances, we instantiate a new user that logs into the channel and sends the observed command(s) Pc to the selected client (pretending to be the botmaster). – By doing this, we do not break existing connections. 13

Design Choices of Active Probing Techniques (cont’d) P4 (Man-In-The-Middle-Probing) – in some cases such as highly stateful C&Cs where simple replaying may not work – we intercept the new command, and launch a man-in- the-middle-like chat message injection P5 (Multiclient-Probing) – when multiple likely infected clients in the monitored network are communicating with the same C&C server, we distribute the probes among multiple clients and reduce the number of probing rounds needed to test our hypothesis. 14

15

16

Algorithm Design for Botnet Detection Using Active Probing H1 as the hypothesis “botnet C&C,” H0 as the hypothesis “normal chat.” Let a binary random variable D denote whether or not we observe a wrong reply for a challenge from the client (that is, D = 1 means an incorrect reply). 17

Algorithm Design for Botnet Detection Using Active Probing (cont’d) 18 i.i.d. (let us denote α, β as the false positive rate and false negative rate we want to achieve.)

Evaluating User Disturbance and Detection Accuracy Tradeoff As discussed earlier, to have a high confidence of hypothesis testing, we may need N rounds of probing. 19

Disturbance to normal user and the effect on detection 20

Experiments with BotProbe In Situ Experimental Evaluation – We evaluate the detection performance in a virtual network environment with several malicious IRC bots including Sdbot, Phatbot, Rbot, RxBot, Agobot, Wargbot, and IRCBot. – The purpose is to test the false negative rate. – BotProbe essentially acts as a faithful NAT middlebox interposing all communications. 21 (VMware)

Three classes of Bots Open-source bots with obfuscated communication – Spybot: 2003, obfuscates C&C communication (simple byte shift scheme), FP=FN= Bot binaries with cleartext communication – Phatbot, Rbot, Rxbot, Sdbot Bot binaries with obfuscated communication – Wargbot: The botmaster put an encrypted command in the IRC TOPIC message for bots to execute upon joining the channel. 22

Obfuscated Communication 23

User Study on Normal Chat Probing False positive rate – Since we are not allowed to directly alter live network flows on campus, we recruited human users to go online and chat with real users at diverse channels on multiple networks. – Our goal was to confirm our hypothesis about human response to tampered messages and evaluate the degree to which simulated BotProbe techniques affect normal users, e.g., how many actual rounds would we need on average to detect a normal user? 24

Study procedure We designed six different question sets to test on 123 different users. Our question set includes – simple messages like “what’s up,” “nice weather,” “you like red?” “how may I help you?” “English only! I play nice fun” – and Turing test messages such as “what’s 3+6=?” 25

User or Bot? 26

Policy Implications and Limitations It is likely that in some cases there are legal “bots,” e.g., some client-side legitimate programs or automatic scripts that build their application logic over the chat protocols such as IRC. – the detection of such a chat bot is not considered as a false positive Furthermore, there are several heuristics that can help differentiate these chat bots from real malicious bots. 27

Policy Implications and Limitations (cont’d) Limitations and Potential Solutions – Strong encryption – Timer-based evasions – Stateful C&C protocols 28

Conclusions We validated our system on several contemporary malicious IRC bots and conducted an actual user study on around 100 users. This work represents the first feasibility study of the use of active techniques in botnet detection. 29

Future Works More general class of botnet C&C detection (e.g., applicable to HTTP- and P2Pbased botnets. In addition to detection, active techniques can be used for other purposes, e.g., server-side probing and injecting watermarks to trace the location of botmasters. 30