Using Failure Information Analysis to Detect Enterprise Zombies Zhaosheng Zhu 1, Vinod Yegneswaran 2, Yan Chen 1 1 Department of Electrical and Computer.

Slides:



Advertisements
Similar presentations
Analyzing and Exploiting Network Behaviors of Malware Jose Andre Morales Areej Al-Bataineh Shouhuai XuRavi Sandhu SecureComm Singapore, 2010 ©2010 Institute.
Advertisements

Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
An Introduction of Botnet Detection – Part 2 Guofei Gu, Wenke Lee (Georiga Tech)
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Intrusion Detection Systems and Practices
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
1 BotGraph: Large Scale Spamming Botnet Detection Yao Zhao EECS Department Northwestern University.
Botnet Dection system. Introduction  Botnet problem  Challenges for botnet detection.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
BotFinder: Finding Bots in Network Traffic Without Deep Packet Inspection F. Tegeler, X. Fu (U Goe), G. Vigna, C. Kruegel (UCSB)
Bayesian Bot Detection Based on DNS Traffic Similarity Ricardo Villamarín-Salomón, José Carlos Brustoloni Department of Computer Science University of.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
1. Introduction The underground Internet economy Web-based malware The system analyzing the post-infection network behavior of web-based malware How do.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology USENIX Security '08 Presented by Lei Wu.
Automatically Generating Models for Botnet Detection Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel, Engin Kirda Vienna University.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Introduction to Honeypot, Botnet, and Security Measurement
1 Using Failure Information Analysis to Detect Enterprise Zombies Zhaosheng Zhu, Vinod Yegneswaran, Yan Chen Lab of Internet and Security Technology Northwestern.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
BotNet Detection Techniques By Shreyas Sali
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Amir Houmansadr CS660: Advanced Information Assurance Spring 2015
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang, and.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
Honeypot and Intrusion Detection System
11 Automatic Discovery of Botnet Communities on Large-Scale Communication Networks Wei Lu, Mahbod Tavallaee and Ali A. Ghorbani - in ACM Symposium on InformAtion,
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Intrusion Detection and Prevention. Objectives ● Purpose of IDS's ● Function of IDS's in a secure network design ● Install and use an IDS ● Customize.
Using Failure Information Analysis to Detect Enterprise Zombies Zhaosheng Zhu, Vinod Yegneswaran, Yan Chen Lab of Internet and Security Technology Northwestern.
A Multifaceted Approach to Understanding the Botnet Phenomenon Authors : Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Computer Science.
Nullcon Goa 2010http://nullcon.net Botnet Mitigation, Monitoring and Management - Harshad Patil.
Jhih-sin Jheng 2009/09/01 Machine Learning and Bioinformatics Laboratory.
Automated Classification and Analysis of Internet Malware M. Bailey J. Oberheide J. Andersen Z. M. Mao F. Jahanian J. Nazario RAID 2007 Presented by Mike.
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets,
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
Cross-Analysis of Botnet Victims: New Insights and Implication Seungwon Shin, Raymond Lin, Guofei Gu Presented by Bert Huang.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Omar Hemmali CAP 6135 Paul Barford Vinod Yegneswaran Computer Sciences Department University of Wisconsen, Madison.
Exploiting Temporal Persistence to Detect Covert Botnet Channels Authors: Frederic Giroire, Jaideep Chandrashekar, Nina Taft… RAID 2009 Reporter: Jing.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Botnets Usman Jafarey Including slides from The Zombie Roundup by Cooke, Jahanian, McPherson of the University of Michigan.
BotCop: An Online Botnet Traffic Classifier 鍾錫山 Jan. 4, 2010.
Reading TCP/IP Protocol. Training target: Read the following reading materials and use the reading skills mentioned in the passages above. You may also.
Effective Anomaly Detection with Scarce Training Data Presenter: 葉倚任 Author: W. Robertson, F. Maggi, C. Kruegel and G. Vigna NDSS
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Presented by D Callahan.
Role Of Network IDS in Network Perimeter Defense.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
CompTIA Security+ Study Guide (SY0-401)
A lustrum of malware network communication: Evolution & insights
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
CompTIA Security+ Study Guide (SY0-401)
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee
Data Mining & Machine Learning Lab
Transport Layer Identification of P2P Traffic
Presentation transcript:

Using Failure Information Analysis to Detect Enterprise Zombies Zhaosheng Zhu 1, Vinod Yegneswaran 2, Yan Chen 1 1 Department of Electrical and Computer Engineering, Northwestern University 2 Computer Science Laboratory, SRI International SecureComm 2009 International ICST Conference on Security and Privacy in Communication Networks

Outline Introduction An Empirical Survey of Application Failure Anomalies – Malware Trace Analysis – Failure Patterns of Normal Applications – On the Potential of Failure Analysis to Uncover Suspicious Activities Architecture Correlation and Clustering Engine Evaluation Related Work Conclusion 2

Netfuse: Failure Information A focus of our study is detecting self-propagating malware such as worms and botnets. The author begin by conducting an empirical study of transport- and application-layer failure activity using a collection of long-lived malware traces. – finding their failure patterns – automatically detect and isolate malware-like failure patterns 3

1 Introduction Enterprise network threat – worms, self-propagating bots, spamming bots, client-side infects (drive-by downloads) and phishing attacks – Between ten of thousands to more than hundred thousand per month Shield – Network intrusion detection systems (NIDS) – Antivirus (AV) 4

Introduction (cont’d) NIDS (network intrusion detection systems) – Knowledge-based Signatures Well-known exploits and intrusions  Reliable and accurate performance requires constant maintenance of the knowledgebase to reflect the latest vulnerabilities. – Behavior-based Predefined model of normal behavior Flag deviants from known models as anomalies  inherent difficulty of building robust normal models 5

Introduction (cont’d) Antivirus (AV) – monitors end hosts – performing periodic system scans and real-time monitoring, checking existing files and process images with a dictionary of malware signatures – day-zero detection 3/39 AV engines (Conficker A and B worms) 6

Introduction (cont’d) Objective – be independent of malware family and requiring no apriori knowledge of malware semantics or command and control (C&C) mechanisms. Motivated by – many malware communication patterns (in transport and application level) result in abnormally high failure rates Portscans Network protocol analyzers – Wireshark and L7 filters 7

Introduction (cont’d) Netfuse – A behavior-based detection system whose model for malicious behavior is derived from underlying protocol analyzers – its novelty lies in its use of multipoint failure monitoring for support vector machine (SVM)-based classification of malware failure profiles Failures – (Transport) TCP RSTs, ICMP – (Application) TCP/25 (SMTP), TCP/80 (HTTP), UDP/53 (DNS) and TCP/6667 (IRC). Also common protocols in non-standard ports 8

2 An Empirical Survey of Application Failure Anomalies Case Study – the failure patterns of malware using over 30 long-lived malware (5-8 hour) traces – failure profiles of several normal applications webcrawlers, P2P software and popular video sites Failure 9

Malware Trace Analysis 32 different malware – in a controlled virtual machine – From our honeynet, malicious attachments, and the Offensive Computing website [6] – collected tcpdump traces of all network activity A diverse set of failures – broken C&C channel – scanning and spam delivery attempts – malware instances periodically retry failed communication attempts 10

Malware Trace Analysis (cont’d) 8 out of 32 did not generate failures. – 2 worms, 3 IRC bots, 3 spyware  well-behaved spyware binaries simply contacted a few active websites DNS – unresolved domain names or NXDOMAIN responses – C&C servers have been taken down? 11

Malware Trace Analysis - DNS (cont’d) While many well-behaved applications terminate connection attempts after a few failed tries, malware tends to be remarkably persistent in its repeated attempts. For some bots, such as Kraken, DNS failures could be considered part of normal behavior. – Failure -> Need to get new list Botmaster and the malware may use the same algorithm to generate (next) domain names DNS failures in about 5 hours 12

Malware Trace Analysis - SMTP (cont’d) SMTP failures result from spamming behaviors. Certain SMTP servers immediately close the connection after the TCP handshake. “550 Recipient address rejected: User unknown” Storm does not retry a rejected username on the same SMTP server. 13

Malware Trace Analysis – HTTP (cont’d) sending mal-formed packets for DoS attacks querying for a configuration file that has since been removed from the control server HTTP 400: Bad or Malformed HTTP request HTTP 404: File not found 14

Malware Trace Analysis (cont’d) IRC – The channel is removed – Channel might be full due to too many bots TCP – which do complete a TCP handshake and/or terminate the connection with RST prior to sending any payload – because the server has been taken down or because it is too busy ICMP – Scanning behavior and communication patterns of P2P botnets 15

Failure Patterns of Normal Applications 16 The website news.sohu.com, there were only 18 transport layer (TCP) failures and 66 HTTP failures in 2 days. They used BitTorrent to download a popular Linux distribution (Fedora 10); they used eMule to download another popular Linux distribution (Ubuntu).

Failure Patterns of Normal Applications (cont’d) 17

On the Potential of Failure Analysis to Uncover Suspicious Activities (high volume) Failures in malware occur frequently in both the transport and application levels. – except for certain P2P (persist) DNS failures and in particular NXDOMAIN errors are common, these failures tend to persist. (low entropy) Failures be restricted to a few ports and often a few domains. 18

3 Architecture 19

Tools Wireshark – ICMP: error type, client IP – TCP: client and server IP, port numbers – DNS: failure type, domain name, client IP – FTP, IRC, HTTP and SMTP the server IP address, error code, client IP address, and detailed failure information L7 filter (non-standard ports) 20

Tools (cont’d) 21

4 Correlation and Clustering Engine First, they classify and aggregate failure information based on host IP address, protocol, and failure type. Four different (normalized) scores for each host – (i) composite failure – (ii) failure divergence – (iii) failure persistence – (iv) failure entropy Then, using SVM-based learning technique to classify suspicious hosts. 22

(i) composite failure This score estimates the severity of the observed failures by each host based on volume. – For every host, a vector {N i } N i represents the number of failures of the i th protocol Let α i is the number of application level failures β i is the # of TCP RSTs; γ i is the # of ICMP failures – Three constraints α i > τ, τ = 15 β i > μ(β) + 2* σ(β) γ i > μ(γ) + 2 * σ(γ) 23 T i is the total number of failures for i th protocol across all hosts.

(ii) failure divergence measure the delta between a host’s current (daily) failure profile and past failure profiles Exponentially weighted moving averages (EWMA) – Let E ijt correspond to the expected number of failures for host i, on protocol j on day t. (They set α to be 0.5.) 24 (normalize)

(iv) failure entropy For every server H i, we record the number of N i failures from it. They repeat the same for each server port P i. – DNS: the entropy in the domain names – HTTP, FTP IRC, and SMTP: entropy in the distribution of various failure types 25

(iii) failure persistence Malware failures tend to be long-lived. They simply split the time horizon into N parts (where N is set to 24 in our prototype implementation), and compute the percentage of parts where the failure happens. High failure persistence values provide yet another useful indicator of potential malware infections. 26

SVM-based Algorithm to Classify Suspicious Hosts A hyper-plane that separates positive and negative examples with maximal distance – publicly available tool WEKA – The input to the system is a series of four- dimensional vectors where each vector corresponds to the four scores of a individual host. 27

Detecting Failure Groups They want to know whether they belong to the same botnet. (similarity) Each type of failure can be represented as a set of (F i, N i ), where F i is the failure property and N i is the number of failures with this property. 28

Clustering Peter Kleiwig’s publicly available clustering package [1] – 29 Data clustering.

5 Evaluation Data – Malware Trace I: 24 traces from Table 2 – Malware Trace II: five malware families that are not included in the training set – Malware Trace III: This data set contains more than 5,000 malware traces that were obtained from a sandnet. – Benign: three weeks, research institute network (> 100 systems) 30

Classification and Detection Results Training Process – An example of a rule generated by the SVM algorithm is 31 For their evaluation the detection rate for training is 97.2% and the false positive rate is 0.3%.

Classification and Detection Results 32 Performance Evaluation 92% 35% = 90/242 5%

Classification and Detection Results Clustering Results 33

Related Work BotHunter [Usenix Security 2007] – Dialog Correlation Engine to detect enterprise bots – Models lifecycle of bots: Inbound Scan / Exploit / Egg download / C & C / Outbound Scans – Relies on Snort signatures to detect different phases Rishi [HotBots 07] – Detects IRC bots based on nickname patterns BotSniffer [NDSS 08] – Uses spatio-temporal correlation to detect C&C activity BotMiner [Usenix Security 08] – Combines clustering with BotHunter and BotSniffer heuristics – Focus on successful bot communication patterns 34

Conclusions Failure Information Analysis – Signature-independent methodology for detecting infected enterprise hosts Netfuse system – Four components: FIA Engine, DNSMon, Correlation Engine, Clustering Correlation metrics: – Composite Failure Score, Divergence Score, Failure Entropy Score, Persistence Score Useful complement to existing network defenses 35