Analyzing DNS Activities of Bot Processes Dr. Jose Andre Morales Areej Al-Bataineh Dr. Shouhuai Xu Dr.Ravi Sandhu 4th International Conference on Malicious.

Slides:



Advertisements
Similar presentations
Analyzing and Exploiting Network Behaviors of Malware Jose Andre Morales Areej Al-Bataineh Shouhuai XuRavi Sandhu SecureComm Singapore, 2010 ©2010 Institute.
Advertisements

Symptoms-Based Detection of Bot Processes Jose Andre MoralesErhan Kartaltepe Shouhuai XuRavi Sandhu MMM-ACNS – St Petersburg, Russia 2010 ©2010 Institute.
© Ravi Sandhu Introduction to Information Security Ravi Sandhu.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
11/20/09 ONR MURI Project Kick-Off 1 Network-Level Monitoring for Tracking Botnets Nick Feamster School of Computer Science Georgia Institute of Technology.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Ken C. K. Lee, Baihua Zheng, Huajing Li, Wang-Chien Lee VLDB 07 Approaching the Skyline in Z Order 1.
Configuration management
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
UNCLASSIFIED © 2011 Carnegie Mellon University Building Malware Infection Trees Jose Andre Morales 1, Michael Main 2, Weilang Luo 3, Shouhuai Xu 2,3, Ravi.
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee ACSAC.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Analyzing Malware Detection Efficiency with Multiple Anti-Malware Programs Dr. Jose A. Morales – Software Engineering Institute, Carnegie Mellon University.
Analyzing Malware Detection Effectiveness with Multiple Anti- Malware Programs Shouhuai Xu UTSA Ravi Sandhu UTSA Jose A. Morales CMU.
SESSION ID: #RSAC Chaz Lever Characterizing Malicious Traffic on Cellular Networks A Retrospective MBS-W01 Researcher Damballa,
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Bayesian Bot Detection Based on DNS Traffic Similarity Ricardo Villamarín-Salomón, José Carlos Brustoloni Department of Computer Science University of.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
1. Introduction The underground Internet economy Web-based malware The system analyzing the post-infection network behavior of web-based malware How do.
Evaluating Detection & Treatment Effectiveness of Commercial Anti-Malware Programs Jose Andre Morales, Ravi Sandhu, Shouhuai Xu Institute for Cyber Security.
1 Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling - Proceedings.
China Science & Technology Network Computer Emergency Response Team Botnet Detection and Network Security Alert Tao JING CSTCERT,CNIC.
Towards Network Containment in Malware Analysis Systems Authors: Mariano Graziano, Corrado Leita, Davide Balzarotti Source: Annual Computer Security Applications.
Presentation by Kathleen Stoeckle All Your iFRAMEs Point to Us 17th USENIX Security Symposium (Security'08), San Jose, CA, 2008 Google Technical Report.
Denial of Service A Brief Overview. Denial of Service Significance of DoS in Internet Security Low-Rate DoS Attacks – Timing and detection – Defense High-Rate,
1 Using Failure Information Analysis to Detect Enterprise Zombies Zhaosheng Zhu, Vinod Yegneswaran, Yan Chen Lab of Internet and Security Technology Northwestern.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
Supplied on \web site. on January 10 th, 2008 Reducing Risk Through Incremental Malware Detection January 2008.
Honeypot and Intrusion Detection System
Jeong, Hyun-Cheol. 2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
1 Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Speaker: Jun-Yi Zheng 2010/03/29.
FluXOR: Detecting and Monitoring Fast-Flux Service Networks Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni, and Danilo Bruschi 5th international.
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,
A Multifaceted Approach to Understanding the Botnet Phenomenon Authors : Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Computer Science.
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
AccessMiner Using System- Centric Models for Malware Protection Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu and Engin Kirda.
Automated Classification and Analysis of Internet Malware M. Bailey J. Oberheide J. Andersen Z. M. Mao F. Jahanian J. Nazario RAID 2007 Presented by Mike.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Published: Internet Measurement Conference (IMC) 2006 Presented by Wei-Cheng Xiao 2015/11/221.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Lesson 11: Configuring and Maintaining Network Security
Exploiting Temporal Persistence to Detect Covert Botnet Channels Authors: Frederic Giroire, Jaideep Chandrashekar, Nina Taft… RAID 2009 Reporter: Jing.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Copyright © 2011, A Behavior-based Methodology for Malware Detection Student: Hsun-Yi Tsai Advisor: Dr. Kuo-Chen Wang 2012/04/30.
Malicious Software.
Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John Mitchell RAID
Cryptography and Network Security Sixth Edition by William Stallings.
BotCop: An Online Botnet Traffic Classifier 鍾錫山 Jan. 4, 2010.
Introduction to Active Directory
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Presented by D Callahan.
Role Of Network IDS in Network Perimeter Defense.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Social Network-Based Botnet Command- and-Control: Emerging Threats and Countermeasures Reporter: Chia-Yi Lin Advisor: Chun-Ying Huang Mail:
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
©2014 Check Point Software Technologies Ltd Security Report “Critical Security Trends and What You Need to Know Today” Nick Hampson Security Engineering.
An example of peer-to-peer application
A lustrum of malware network communication: Evolution & insights
Protecting your mobile devices away from virus by a cloud-based approach Wei Wu.
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
Risk of the Internet At Home
Botnet Detection by Monitoring Group Activities in DNS Traffic
An overview over Botnets
Presentation transcript:

Analyzing DNS Activities of Bot Processes Dr. Jose Andre Morales Areej Al-Bataineh Dr. Shouhuai Xu Dr.Ravi Sandhu 4th International Conference on Malicious and Unwanted Software (Malware 2009) October – Montreal, Canada

Overview Attempt to detect bot processes based on a processs reaction to DNS activity, RD-behavior. Detect with host based approach that is process- specific Real-time data collection with post analysis Detects bots and non-bot malware Enhances results of some commercial solutions

Bots and DNS Bots need to join a botnet to be useful Botmasters provide several IPs or domains to connect with Brute force connection attempts have many failures DNS activities: DNS and reverse DNS (rDNS) used to lower the failure rate but produces failed DNS results

RD-behavior - 1 RD-behavior: a processs reaction to DNS response behavior Process will use DNS or rDNS queries for various tasks –How should a process react? –When should DNS result be ignored? –When should a DNS result be used?

RD-behavior - 2 Expected RD-behavior An IP address that fails a rDNS query is not used in a connection attempt IP address used in a successful DNS activity should connect. Anomalous (Suspicious) RD-behavior, SRDB An IP address that fails rDNS query is used in any connection attempt. IP address of a successful DNS activity is used in a unsuccessful connection attempt.

RD-behavior Tree with 6 paths

Experiments - 1 Detection occurred after 1 instance of SRDB – 1 instance of P2,P4,P5,P6 Tested three sets of processes for 1 hour period: –Non-bot malware: Netsky, Bredolab, Lovegate, Brontok, Ursnif In the wild between January and May 2009 Worms, Trojan downloaders and Backdoors –Benign: BitTorrent, Kaspersky AV, Cute FTP, LimeWire and Skype All network active

Bot Properties

Experiments - 2 Total # distinct IPs/domains in a DNS, rDNS or both and a connection attempt (successful and failed) Bots had the most, followed by non-bot malware and benign

Experiments - 3 Every P2 instance has at least one instance of P4-P6 P2 assumed anomalous but not suspicious and is pruned Benign had no paths P4-P6 Malware had instances of paths P4-P6 P6 most dominant in bots

Experiments - 4 Two commercial bot detectors Rubotted: 9 false negative Anti-bot: 4 false negatives SRDB (RD-behavior): 0 false negatives Combining SRDB with the two commercial bot detectors improved their detection accuracy.

Result Analysis Benign tend to follow expected RD-behavior Bots follow expected and SRDB –Especially bots with a pool of domains/IPs to choose from Non-bot malware exhibit SRDB behavior –Encouraging, results suggest technique can be extended to detect other malware classes All results acquired in first 7minutes of execution –Early detection mitigates damage and distribution

Limitations Kernel mode bots Paths P1, P3 Beyond join phase Only TCP traffic Web 2.0, socnet bots (Twitterbot)

New Results 1 – Sept-Oct 2009 Benign Processes

New Results 1 – Sept-Oct 2009 Malware Processes 78 samples from CWSandbox malware repository Very diverse, adware, scareware, bots(zbot,harebot), PWS, backdoors, Trojans(all types), Packed Win32 Vxs. Virustotal, 4 not detected

New Results 2 – Sept-Oct 2009 Malware Processes P2: 6 instances, P1: 28 instances, No P3 – P6, Malware observations –DNS many domain names –Each Domain DNSd many times –Unusual, never seen domain names:.kr,.cn,.NU, etc…

Detection Enhancements In addition to detecting RD-Behavior User/machine-based whitelist of commonly visited domain names Process-based –total domain names DNSd per execution –total DNS of one domain name DNS success/failure rate Combining can produce better results GOAL: exploit DNS maximally to detect malware (not just bots), usable as one component of bigger detection strategy Research currently underway

Conclusion and Future Work Combining DNS & connection attempts very useful in bot detection rDNS key element of bots Several bots (non-bot malware) do not follow DNS rules of expected behavior Benign use DNS activities in expected ways Future Work - Kernel bot detection –More malware, benign processes –Diversity of protocols –Detection Enhancements presented here

19 Questions? ¿Preguntas?Вопросы SawaalDomande SoruΕρωτήσεις kyseessä pytanie