Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures Erhan J. Kartaltepe 1, Jose Andre Morales 1, Shouhuai Xu 2, Ravi.

Slides:



Advertisements
Similar presentations
Symptoms-Based Detection of Bot Processes Jose Andre MoralesErhan Kartaltepe Shouhuai XuRavi Sandhu MMM-ACNS – St Petersburg, Russia 2010 ©2010 Institute.
Advertisements

Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
MIRAGE MALWARE SIDDARTHA ELETI CLEMSON UNIVERSITY.
VOYAGER: Yet Another Secure Web Browser to Demonstrate Secure Socket Layer Working and Implementation By : Shrinivas G. Deshpande Advisor: Dr. Chung E.
Bradley Cowie, Barry Irwin and Richard Barnett Security and Networks Research Group Department of Computer Science Rhodes University MANAGEMENT, PROCESSING.
1. AGENDA History. WHAT’S AN IDS? Security and Roles Types of Violations. Types of Detection Types of IDS. IDS issues. Application.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Security Issues and Challenges in Cloud Computing
Web 2.0 security Kushal Karanjkar Under guidance of Prof. Richard Sinn.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
On the Feasibility of Large-Scale Infections of iOS Devices
2009/9/151 Rishi : Identify Bot Contaminated Hosts By IRC Nickname Evaluation Reporter : Fong-Ruei, Li Machine Learning and Bioinformatics Lab In Proceedings.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Website Hardening HUIT IT Security | Sep
Norman SecureSurf Protect your users when surfing the Internet.
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman.
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
Presentation by Kathleen Stoeckle All Your iFRAMEs Point to Us 17th USENIX Security Symposium (Security'08), San Jose, CA, 2008 Google Technical Report.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Prevent Cross-Site Scripting (XSS) attack
APT29 HAMMERTOSS Jayakrishnan M.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
--Harish Reddy Vemula Distributed Denial of Service.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Protecting Students on the School Computer Network Enfield High School.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu 1,2, Liu Wantao 3,4, Frank Siebenlist 1,2 and Ian Foster 1,2,3 1.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Module 7: Advanced Application and Web Filtering.
Presented By: Chandra Kollipara. Cross-Site Scripting: Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected.
Malicious Software.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Social Network-Based Botnet Command- and-Control: Emerging Threats and Countermeasures Reporter: Chia-Yi Lin Advisor: Chun-Ying Huang Mail:
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Android and IOS Permissions Why are they here and what do they want from me?
Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
ADVANCED PERSISTENT THREATS (APTs) - Simulation
Ways to Secure CMS Websites. The most widely used Content Management Systems are Wordpress, Joomla and Drupal as per statistics. The highest CMS platforms.
Chap 10 Malicious Software.
Chap 10 Malicious Software.
ONLINE SECURE DATA SERVICE
Operating System Concepts
Exploring DOM-Based Cross Site Attacks
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Presentation transcript:

Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures Erhan J. Kartaltepe 1, Jose Andre Morales 1, Shouhuai Xu 2, Ravi Sandhu 1 1 Institute for Cyber Security University of Texas at San Antonio 2 Department of Computer Science University of Texas at San Antonio ACNS10, Beijing, China

Threats of Botnets Can launch many attacks Including against crypto --- putting trustworthiness of cryptographic services/utilities in question: Compromising cryptographic keys (without being detected after a long time) Compromising cryptographic functions (oracle accesses)

Part I: Twitter-based Bots & Beyond Current Generation Possible Future Generation Part II: Defense & limitations

NazBot (TwitterBot) Refresher In 2009, Jose Nazario from Arbor Networks accidentally found a bot that used Twitter as its command-and-control (were nicknaming it NazBot). A user (upd4t3) updated its Twitter account to control NazBot; the bot read the updates via an RSS feed. The bot decoded the messages, which were Base64- encoded URLs, and downloaded their malicious payload. The payload (gbpm.exe and gbpm.dll) were password and info stealers that did the actual malicious work.

NazBot: Abusing twitter.com

NazBot Flow (controlled experiment) 1. Makes a HTTP GET request to (our fake) upd4t3s Twitter RSS feed. 2. Returns the RSS feed, containing Base64-encoded text. 3. Decodes text as bit.ly URLS (we set up); makes a request to each. 4. Redirects to a malicious zip file on our server. 5. Downloads malicious payload (the real ones). 6. Unzips the payload, copies itself, executes the contents. 7. Gather and transmits victims information to botmaster.

NazBot Control Flow (anatomy) Based on monitored network activities and CWSandbox output.

NazBotnet C&C Strengths The Naz Botnet C&C has a number of strengths. Abusing trusted popular websites as a C&C server: Sites such as Twitter, FaceBook, are legitimate and heavily used. Exploiting popular port for C&C communication: Using port 80 with legitimate HTTP requests and responses are not suspicious. Abusing application features for C&C: Common features such as an RSS feeds to auto-update bots are indiscernible from normal traffic. The above demonstrates that botmasters have begun to exploit the hiding in plain sight approach to conduct stealthy botnet C&C.

NazBotnet C&C Weaknesses The Naz Botnet C&C also demonstrated weaknesses (not meant to help the bad guys) The bots only read from RSS feeds:, not Atom, , etc.. The bots read commands from one account on two sites: easy to dismantle the botnets, once detected. The bots used Base64-encoded ASCII: Trivial to recognize/decode. The bots did not use other standard ports: Port 80 is stealthy, but others such as SSL port 443. As we discuss, these weaknesses can be avoided in future social network-based, help the defenders look ahead.

Imagine NazBot+ Imagine a next-gen botnet C&C (call it Naz+). The bots can read commands via any social network-based automatic channel. The bots read commands from any account on any website. The bots can employ other encoding, encryption, and steganography. The bots can read from multiple ports, including SSL port 443. Such a bot might have a more complicated flow.

Part I: Twitter-based Bots & Beyond Part II: Defense & limitations Server-side Defense Client-side Defense Integrated Server-Client Defense

Server-side Defense As demonstrated, sites such as Twitter are currently abused to conduct botnet C&C. Thus, these servers must defend against both current and future botnets that would abuse them for botnet C&C. Observations All social network messages are text, and botmasters must encode their commands textually. Moreover, just like legitimate messages may include web links, so might C&C messages (e.g., links for downloading payload). A server-side defense should distinguish between encoded and plain text and to follow links to their destination.

Server-side Defense: Advantages Account agnostic: Looks for text attributes that are shared with encoded text rather than individual behavioral patterns. Language agnostic: Looks at text for attributes that are shared with encoded text rather than individual words. Easy to deploy: Uses light-weight machine learning algorithms and thus deployed as software-as-a-service. Web aware: Follows links to determine if the destination is trusted, using SSL authentication (if possible) as a trust infrastructure.

Server-side Defense: Architecture 2.Social networks content updater sends the text content to the server-end system. 3.Detection mechanism determines if the text is suspicious. Security embedded here

Server-side Testing and Results Prototype used Wekas decision tree algorithm to classify Base64/Hex-encoded and natural language text messages from 200 Twitter accounts built a pool of non-suspicious text. Our bot commands were 400 encrypted, encoded, random commands.

Server-side Performance Twitters usage analysis is displayed below. Verifying one message daily (and first three for new accounts) check mps (increasing 12.1 monthly). Only active and explosive users 25.6 mps (increasing 2.1 monthly).

Client-side Defense Attributes we look at: Self-Concealing: Attempts to avoid detection with the use of stealth mechanisms (lack of a GUI or HCI). Dubious Network Traffic: Engages in network communication with another machine in a covert or devious way (exclusive social network request, encoded text processing). Unreliable Provenance: Lacks a reliable origin (self- reference replication, dynamic code injection, or unverifiable digital signature of code). We classify a process P as being suspicious of being a social network-based bot C&C process if it is either self-concealing or has an unreliable provenance (or both), and engages in dubious network traffic.

Detection Model

Client-side Detection Results We used a test set of benign applications, non-social network-based bots, and Naz/Naz+. A limitation is the lack of other social network-based botnet C&Cs analysis, due to their lack of discovery.

Client-side Performance Using CPU Marks PerformanceTest 7.0 Running the data collector added a 4.8% overhead to the overall system. Track one to five processes added between 13.3% and 28.9% overhead.

Integrated Defense We can certainly integrate the client-side and the server- side countermeasures We have the prototype systems based on this paper (and others) that we plan to put into real-life experiments at some point

Limitations (of Integrated Defense) Even when our classifier is utilized by a social network provider and a machine has our client solution installed, using both still has some limitations due to steganography. A bot that reads steganographic commands and can evade our client-side sensors. A bot that reads steganographic commands and masquerades as a benign process. A bot that reads steganographic commands and runs scripts.

Related Work Well-recognized approaches (many references): Network-centric Host-centric Yet-to-understand approaches: Application-centric (hinted/reiterated by the fact that the twitter.com bots were detected by digging around although the concept was mentioned several times years ago)

Conclusions and Future Work Our future work includes: implementing the client-side countermeasures as real- time detection systems improving the server-side classifier to detect steganography handling multiple stepping stones in payload redirection porting the client-side countermeasures to other computer and mobile platforms.

Thank You Questions and comments?