Revealing Botnet Membership Using DNSBL Counter-Intelligence David Dagon Anirudh Ramachandran, Nick Feamster, College of Computing,

Slides:



Advertisements
Similar presentations
Nick Feamster Georgia Tech
Advertisements

Revealing Botnet Membership Using DNSBL Counter-Intelligence Anirudh Ramachandran, Nick Feamster, David Dagon College of Computing, Georgia Tech.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
11/20/09 ONR MURI Project Kick-Off 1 Network-Level Monitoring for Tracking Botnets Nick Feamster School of Computer Science Georgia Institute of Technology.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Understanding the Network- Level Behavior of Spammers Anirudh Ramachandran Nick Feamster Georgia Tech.
Spam and Botnets: Characterization and Mitigation Nick Feamster Anirudh Ramachandran David Dagon Georgia Tech.
Research Summary Nick Feamster. The Big Picture Improving Internet availability by making networks easier to operate Three approaches –From the ground.
Spamming with BGP Spectrum Agility Anirudh Ramachandran Nick Feamster Georgia Tech.
Spamming with BGP Spectrum Agility Anirudh Ramachandran Nick Feamster Georgia Tech.
Understanding the Network- Level Behavior of Spammers Anirudh Ramachandran Nick Feamster Georgia Tech.
Network-Based Spam Filtering Anirudh Ramachandran Nick Feamster Georgia Tech.
Network-Based Spam Filtering Nick Feamster Georgia Tech Joint work with Anirudh Ramachandran and Santosh Vempala.
Network Security Highlights Nick Feamster Georgia Tech.
1 Network-Level Spam Detection Nick Feamster Georgia Tech.
Spam Sinkholing Nick Feamster. Introduction Goal: Identify bots (and botnets) by observing second-order effects –Observe application behavior thats likely.
Spamming with BGP Spectrum Agility Anirudh Ramachandran Nick Feamster Georgia Tech.
Network Operations Research Nick Feamster
Network Security Highlights Nick Feamster Georgia Tech.
Using Traffic Analysis to Detect Spam Richard Clayton TERENA, Lyngby, 22 nd May 2007.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
Spam Sagar Vemuri slides courtesy: Anirudh Ramachandran Nick Feamster.
Understanding the Network-Level Behavior of Spammers Anirudh Ramachandran Nick Feamster.
Network Security: Spam Nick Feamster Georgia Tech CS 6250 Joint work with Anirudh Ramachanrdan, Shuang Hao, Santosh Vempala, Alex Gray.
1 BotGraph: Large Scale Spamming Botnet Detection Yao Zhao EECS Department Northwestern University.
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
Correlating Spam Activity with IP Address Characteristics Chris Wilcox, Christos Papadopoulos CSU John Heidemann USC/ISI IEEE Global Internet Symposium.
Threat infrastructure: proxies, botnets, fast-flux
BotGraph: Large Scale Spamming Botnet Detection Yao Zhao Yinglian Xie *, Fang Yu *, Qifa Ke *, Yuan Yu *, Yan Chen and Eliot Gillum ‡ EECS Department,
1 Authors: Anirudh Ramachandran, Nick Feamster, and Santosh Vempala Publication: ACM Conference on Computer and Communications Security 2007 Presenter:
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Can DNS Blacklists Keep Up With Bots? Anirudh Ramachandran, David Dagon, and Nick Feamster College of Computing, Georgia Tech.
Fighting Spam, Phishing and Online Scams at the Network Level Nick Feamster Georgia Tech with Anirudh Ramachandran, Shuang Hao, Nadeem Syed, Alex Gray,
Bayesian Bot Detection Based on DNS Traffic Similarity Ricardo Villamarín-Salomón, José Carlos Brustoloni Department of Computer Science University of.
Spam Sonia Jahid University of Illinois Fall 2007.
Team Excel What is SPAM ?. Spam Offense Team Excel '‘a distinctive chopped pork shoulder and ham mixture'' Image Source:Appscout.com.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
1 RedIRIS Reputation Block List September RedIRIS Reputation Block ListPágina 2 RedIRIS and mail services At the beginning, RedIRIS was directly.
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray,
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Application-Level Attacks, Network-Level Defenses Nick Feamster CS 7260 April 9, 2007.
Harness Your Internet Activity. Zeroing in On Zero Days DNS OARC Spring 2014 Ralf Weber
Botnets An Introduction Into the World of Botnets Tyler Hudak
PhishNet: Predictive Blacklisting to Detect Phishing Attacks Pawan Prakash Manish Kumar Ramana Rao Kompella Minaxi Gupta Purdue University, Indiana University.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Understanding the Network-Level Behavior of Spammers Best Student Paper, ACM Sigcomm 2006 Anirudh Ramachandran and Nick Feamster Ye Wang (sando)
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
1 Characterizing Botnet from Spam Records Presenter: Yi-Ren Yeh ( 葉倚任 ) Authors: L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, I. Osipkov, G. Hulten,
Jhih-sin Jheng 2009/09/01 Machine Learning and Bioinformatics Laboratory.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
Spam from an ISP perspective Simon Lyall, Ihug Uniforum NZ NetForum Conference July 2003.
BotGraph: Large Scale Spamming Botnet Detection Yao Zhao, Yinglian Xie, Fang Yu, Qifa Ke, Yuan Yu, Yan Chen, and Eliot Gillum Speaker: 林佳宜.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, and Ivan Osipkov. SIGCOMM, Presented.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Exploiting Network Structure for Proactive Spam Mitigation Shobha Venkataraman * Joint work with Subhabrata Sen §, Oliver Spatscheck §, Patrick Haffner.
11 Shades of Grey: On the effectiveness of reputation- based “blacklists” Reporter: 林佳宜 /8/16.
A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.
1 Modeling and Measuring Botnets David Dagon, Wenke Lee Georgia Institute of Technology Cliff C. Zou Univ. of Central Florida Funded by NSF CyberTrust.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Microsoft Research, Silicon Valley Geoff Hulten,
1 Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Speaker: Jun-Yi Zheng 2010/01/18.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
An Effective Defense Against Spam Laundering Author: Mengjun Xie, Heng Yin, Haining Wang Presented At: CCS’ 06 Prepared By: Amit Shrivastava.
Published: USENIX HotBots, 2007 Presented: Wei-Cheng Xiao 2016/10/11.
Marcial Quinones-Cardona
Presentation transcript:

Revealing Botnet Membership Using DNSBL Counter-Intelligence David Dagon Anirudh Ramachandran, Nick Feamster, College of Computing, Georgia Tech

From the presses… “Botnets send masses of spam until they are blacklisted by anti-spam firms. Once blacklisted, the owner sells the botnet to people who launch denial- of-service (DDOS) attacks.” “Spam clubs also advertise lists of botnets on hire and fresh proxies -- computers that have recently been taken over.” -- Steve Linford, CEO, Spamhaus ZDNet UK News, September 2004

Motivation for this work Fact: Bot-herds advertise and sell their “clean” bots at a premium Insight: If the claims are true, they must be looking up their bots’ status in some blacklist! Opportunistic Application: Might it be possible to mine DNS Blacklist queries to reveal such reconnaissance activity?

DNS Blacklists – How they work First: Mail Abuse Prevention System (MAPS) Paul Vixie, Dave Rand Today: Spamhaus, spamcop, dnsrbl.org etc. $ dig bl.spamcop.net ;; ANSWER SECTION: bl.spamcop.net IN A ;; ANSWER SECTION: bl.spamcop.net IN TXT "Blocked - see Different Addresses refer to different reasons for blocking

5 DNSBLs: Useful ~80% listed on average ~95% of bots listed in one or more blacklists Number of DNSBLs listing this spammer Only about half of the IPs spamming from short-lived BGP are listed in any blacklist Fraction of all spam received DNSBLs have some value; spam from IP-agile senders tend to be listed in fewer blacklists

Outline Motivation Detecting Reconnaissance Reconnaissance Techniques Analysis and Results Mitigation and Countermeasures Conclusion

Detecting Reconnaissance Key Requirement: Distinguish reconnaissance queries from queries performed by legitimate mail servers Our Solution: Develop heuristics based on the spatial and temporal properties of a DNSBL Query Graph We focus (mostly) on spatial heuristics

Heuristics Spatial Heuristic: Legitimate mail servers will perform queries and be the object of queries. –Hosts issuing reconnaissance queries usually will not be queried Temporal Heuristic: Legitimate lookups reflect arrival patterns of legitimate DNSBL Legit Server A mx.a.com Legit Server B mx.b.com to mx.a.com lookup mx.b.com to mx.b.com lookup mx.a.com

Applying the Spatial Heuristic Construct the directed DNSBL Query Graph G Extract nodes (and their connected components) with the highest values of the spatial metric λ, where λ = (Out-degree/In-degree) A DNSBL lookup B Add E (A, B) to G

Outline Motivation Detecting Reconnaissance Reconnaissance Techniques –Third-party reconnaissance –Self-reconnaissance –Distributed reconnaissance Analysis and Results Mitigation and Countermeasures Conclusion

Third-Party Reconnaissance Third-party performs reconnaissance query Relatively easy to detect using the spatial metric List of Bots Lookup Each Bot C&C or other Dedicated machine DNS Blacklist

Other Techniques Self-Reconnaissance –Each bot looks itself up –This should not happen normally (at least, not en-masse) – thus, easy to detect Distributed Reconnaissance –Bots perform lookups for other bots –Complex to deploy and operate –We witnessed evidence of this technique

Outline Motivation Detecting Reconnaissance Reconnaissance Techniques Analysis and Results Mitigation and Countermeasures Conclusion

Analysis Data –Two days’ worth of pcaps of DNSBL lookups from a mirror of a large DNS Blacklist Provider –A ‘seed’ list of known spambots (Bobax) active around the same time-period, to prune lookup logs Analysis –Extract nodes with highest values of λ, with their respective connected components

Prevalence of Reconnaissance Long tail – Bot-herds might already have the capability to distribute reconnaissance among many bots A few high out-degree nodes – multiple vantage points might help identify “prominent players” Distribution of Out-degrees for nodes in the pruned DNSBL Query Graph Outdegree (number of queries made) CCDF 90% only issue one query

Findings Many of the nodes with highest values of λ were known bots Nodes being looked-up were unlisted, possibly newly compromised bots –Our spam trap had already captured spam from a few of these nodes 419,5305 (E-xpedient, AS17054) 826,5024 (UPC Broadband, AS6830) 531,6823 (UUNet, AS701) 732,1592 (IQuest, AS7332) 1236,8751 (Everyone’s Internet, AS13749) Known Spammers (observed at spam trap) Out- degree Node #

Implications Bad news! Bot reconnaissance techniques are pretty advanced Good news, too –Can use these spatial dependencies to opportunistically identify new bots

Opportunistic Bot Detection Many sources of data for bootstrapping passive botnet detection (i.e., to compile a ‘seed’ list) like –SMTP/Spam logs, –Portscan logs from Intrusion Detection Systems Knowledge of botnet membership  ability to stop attacks closer to the source Multiple vantage points increase confidence and reduce risk of false positives.

Countermeasures Proactive blacklisting of newly-identified bots Reconnaissance Poisoning –Return ‘listed’ for an unlisted bot: might prevent bot from being used –Return ‘unlisted’ for a listed bot: trick bot-herd into using blacklisted IPs Caveats –Risk of false positives

Summary DNSBL logs provide a means for passive botnet detection, by correlating with a set of known bots More vantage points, and other data sources containing bot activity (e.g., spam logs), will help increase confidence Potential to identify bots before they are used, and also to mislead bot-herds into using blacklisted bots

The botnet use of DNSBLs is an abuse requiring future study Currently performing distributed data mining for DNSBLs –3 sites; soon to be more –Focused on botnet recon Run a mirror (or want to)? Want to help a research project? –Please contact Future Work

Questions? Thank you for your time Thanks to our hosts