BOTNET Kumar Mukherjee Mike Ladd Nazia Raoof Rajesh Radhakrishnan Bret Walker.

Slides:



Advertisements
Similar presentations
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Advertisements

A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
An Introduction of Botnet Detection – Part 2 Guofei Gu, Wenke Lee (Georiga Tech)
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Offense: Brute Force A Multifaceted Approach to Understanding the Botnet Phenomenon (Rajab/Zarfoss/Monrose/Terzis)
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Detecting Botnets Using Hidden Markov Models on Network Traces Wade Gobel Bio-Grid, Summer 2008.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
Threat infrastructure: proxies, botnets, fast-flux
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
2009/9/151 Rishi : Identify Bot Contaminated Hosts By IRC Nickname Evaluation Reporter : Fong-Ruei, Li Machine Learning and Bioinformatics Lab In Proceedings.
1. Introduction The underground Internet economy Web-based malware The system analyzing the post-infection network behavior of web-based malware How do.
A M ULTIFACETED A PPROACH TO U NDERSTANDING THE B OTNET P HENOMENON Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Computer Science Department.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman.
1 Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling - Proceedings.
Towards Network Containment in Malware Analysis Systems Authors: Mariano Graziano, Corrado Leita, Davide Balzarotti Source: Annual Computer Security Applications.
Presentation by Kathleen Stoeckle All Your iFRAMEs Point to Us 17th USENIX Security Symposium (Security'08), San Jose, CA, 2008 Google Technical Report.
Botnets An Introduction Into the World of Botnets Tyler Hudak
Introduction to Honeypot, Botnet, and Security Measurement
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
BotNet Detection Techniques By Shreyas Sali
Niels Provos and Panayiotis Mavrommatis Google Google Inc. Moheeb Abu Rajab and Fabian Monrose Johns Hopkins University 17 th USENIX Security Symposium.
A MULTIFACETED APPROACH TO UNDERSTANDING THE BOTNET PHENOMENON (2006) Jonathan Brant CAP 6135 – Spring 2010 Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose,
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Honeypot and Intrusion Detection System
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Final Introduction ---- Web Security, DDoS, others
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
A Multifaceted Approach to Understanding the Botnet Phenomenon Authors : Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Computer Science.
Appear in IEEE TDSC 2008 Presented by Wei-Cheng Xiao.
Nullcon Goa 2010http://nullcon.net Botnet Mitigation, Monitoring and Management - Harshad Patil.
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
Presented by Spiros Antonatos Distributed Computing Systems Lab Institute of Computer Science FORTH.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
A MULTIFACETED APPROACH TO UNDERSTANDING THE BOTNET PHENOMENON Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose & Andreas Terzis IMC’06.
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
Dealing with Malware By: Brandon Payne Image source: TechTips.com.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
AN INSIDE LOOK AT BOTNETS Barford, Paul and Yegneswaran Advances in Information Security, Springer, 2006 Kishore Padma Raju.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Published: Internet Measurement Conference (IMC) 2006 Presented by Wei-Cheng Xiao 2015/11/221.
Omar Hemmali CAP 6135 Paul Barford Vinod Yegneswaran Computer Sciences Department University of Wisconsen, Madison.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
November 19, 2008 CSC 682 Use of Virtualization to Thwart Malware Written by: Ryan Lehan Presented by: Ryan Lehan Directed By: Ryan Lehan Produced By:
Studying Spamming Botnets Using Botlab
Security in Cloud Computing Zac Douglass Chris Kahn.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Measurements and Mitigation of Peer-to-peer Botnets: A Case Study on Storm Worm Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling.
A Multifaceted Approach to Understanding the Botnet Phenomenon Aurthors: Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Publication: Internet.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Presented by D Callahan.
1 Modeling and Measuring Botnets David Dagon, Wenke Lee Georgia Institute of Technology Cliff C. Zou Univ. of Central Florida Funded by NSF CyberTrust.
Role Of Network IDS in Network Perimeter Defense.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
“A Multifaceted Approach to Understanding the Botnet Phenomenon”
Data Mining & Machine Learning Lab
Presentation transcript:

BOTNET Kumar Mukherjee Mike Ladd Nazia Raoof Rajesh Radhakrishnan Bret Walker

network of infected hosts, under control of a human operator (botmaster) tens of thousands of nodes victims claimed by remote exploits Botnet Background

use of Command & Control (C&C) channels used to disseminate botmaster's commands Defining Characteristic

Spam ID Theft Piracy DDOS Ex bots w/ 128KBit/s connection > many corporate systems IP distribution makes filtering difficult Uses of Botnets

Lifecycle of Botnet Infection

IRC designed for both point-to-point and point-to-multipoint communication one-to-one, or one-to-group chat flexible, open-source protocol Why IRC?

authenticate to IRC server via PASS message C&C channel authentication Botmaster authenticates to bot population to issue commands Bot-to-IRC Communication

400,000+ nodes 50+ Forture 500 companies 2x the size of ‘Storm’ Used for spam (bots sending 500,000+ messages daily) Bot-News: Kraken

Designed as image file Regular updates to binary C&C communication via customized UDP/TCP Able to generate new domain names if C&C is disabled Bot-News: Kraken

/botnet_pr.html Further Background

Collection of as many bot binaries as possible Distributed darknet used 14 nodes access the darknet Modified version of Nepenthes (a Malware collection framework) platform: -- Mimics the replies generated by vulnerable services in order to collect the first stage exploit or shellcodes -- Generate URL that are to retrieve binaries Honeynet is used to compliment Nepenthes in order to catch exploits missed. -- Honeypots are unpatched Windows XP VM’s -- Honeypots become infected and compared later to a clean Windows XP image. -- Infected Honey pots are also allowed to sustain IRC connections until VM gets reimaged Methodology: Malware Collection Phase

Methodology: Data Collection Architecture

Methodology: Gateway Darknet routing to various parts of the internal network Cross-infection prevention among honeypots configuring honeypots in separate VLANSs Termination of traffic across VLANs and gateways Monitor and Analyze the malware traffic for infections Dynamic rule insertion block further inbound attack traffic towards honeypot that is infected single malware instance honeypots due to lack of resources Other funcitons Triggering re-imaging with clean Windows images pre-filtering and control during downloads local DNS to resolve queries

Methodology: Defense Points With the methodology we now have the ability to model other types of bots. Although methodology utilized Windows OS, we can model it for other platforms The methodology analyzes all aspects of bots and botnets.

A multifaceted approach to understanding the Botnet Phenomenon Results - I

Overall traffic 27% of total traffic are from known botnet spreaders 73% of traffic includes traffic from unknown botnet spreaders 60% of malicious binaries were IRC bots Only handful were HTTP based Authors concerns about botnets spread are justifiable.

Traffic directed to vulnerable ports 76% of traffic targeted to vulnerable ports are from botnet spreaders Malicious traffic to vulnerable ports cannot be differentiated between botnet and non-botnet traffic How much of total traffic was directed to vulnerable ports is desired.

Peak traffics 90% of total traffic during the peak time targets ports used by botnet spreaders 70% of traffic during the peak time sent shell exploits similar to those sent by botnet spreaders.

Probed servers 11% of probed servers had at least one botnet activity 29% of probed.com servers had at least one cache hit 95% of probed.cn servers had at least one cache hit.

Botnet Types Total botnets captured of 192 botnets captured were type I botnets (worm-like) 158 of them were type II

Botnets and Network types When channel was set to topic 80% of targeted scanning was aimed at CLASS A networks 89% of localized scanning was aimed at CLASS B networks When channel was set to botmaster commands 88% of targeted scanning was aimed at CLASS A networks 82% of localized scanning was aimed at CLASS B networks

DNS & IRC tracker views Both DNS & IRC tracker views demonstrated three type of growth pattern: semi exponential growth Staircase type growth Linear growth  Semi-exponential growth exhibited random scanning activity  Staircase type growth exhibited intermittent activity  Linear growth pattern exhibit time scoped activity

Key Points based on results Botnets pose serious threats to the internet Major contributor of unwanted traffic on the internet IRC is the dominant protocol used in the Botnet communications Botnets have achieved a high degree of sophistication in terms of self-protection mechanisms and modular package structures

Effective Botnet Sizes Footprint Size vs. Effective Size Significantly smaller At most 3,000 bots online w/ networks of up to 10k bots Smaller effective sizes limit certain activities: Timely commands DDoS attacks Effective botnet sizes fluctuate with timezone changes

Lifetime Botnets have relatively long lifetimes Even after they’re shut down, live on average for 47 days 84% of servers up longer than the 3 month survey 55% of those botnets still scanning the Internet If taken offline, able to be brought back online quickly Bots do not stay long on IRC channels Average time ~ 25 minutes 90% stayed less than 50 minutes High churn rate Botmasters spend great lengths of time managing and monitoring their botnets

Botnet Software Dissection 49% disable firewall and anti-virus software Many run inetd, which is used to identify the user of a computer. Used to verify bots joining an IRC channel 40% execute a System Security Monitor command, securing client machines from further exploitation Average of 15 exploits per botnet binary -- bots can infect machines in a variety of ways Windows XP constitutes 82.6% of observed exploited hosts, with 99% of those hosts running SP1 or less

Insight from an “Insider’s View” Botmasters range in skill level Botmasters: 1.Share information about networks 2.Tweak their bots to use the network efficiently 3.Prune misbehaving bots and exploit “super-bots” Botmasters are probably leasing their bots or attacking each other Most commands (75%) are for control, scanning and cloning. 7% are for attacking.

Related Work Honeynet group was the first to do an informal study Freiling et al. on countering certain classes of DDoS attacks Cooke et al. on prevalence of botnets by measuring elapsed time before an un-patched system was infected by a botnet Barford et al. on an in-depth anaylsis on bot software sourcecode Vrable et al. presented Potemkin, a scalable virtual honeynet system Cui et al. presented RolePlayer—a protocol independent lightweight responder that tries to overcome some of these limitations by reverting to a real server when the responder fails to produce the proper response Dagon et al. provide an initial analytical model for capturing the spreading behavior of botnets.

Conclusion Long presence and few formal studies One of the most severe threats to the Internet. Our knowledge of botnet behavior is incomplete To improve our understanding, we present a composite view Results show that botnets are a major contributor to the overall unwanted traffic on the Internet Botnet scanning behavior is markedly different from that seen by autonomous malware (e.g., worms) because of its manual orchestration IRC is still the dominant protocol used for C&C communications Use is adapted to satisfy different botmasters’ needs Botnet footprints are usually much larger Graybox testing technique enabled us to understand the level of sophistication reached by bot software today