A MULTIFACETED APPROACH TO UNDERSTANDING THE BOTNET PHENOMENON (2006) Jonathan Brant CAP 6135 – Spring 2010 Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose,

Slides:



Advertisements
Similar presentations
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Advertisements

Configuration management
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
FIREWALLS Chapter 11.
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
1 MA Rajab, J Zarfoss, F Monrose, A Terzis - Proceedings of the First USENIX Workshop on Hot Topics in Understanding Botnets My Botnet is Bigger than Yours.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Intrusion Detection Systems and Practices
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
1 Authors: Anirudh Ramachandran, Nick Feamster, and Santosh Vempala Publication: ACM Conference on Computer and Communications Security 2007 Presenter:
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
2009/9/151 Rishi : Identify Bot Contaminated Hosts By IRC Nickname Evaluation Reporter : Fong-Ruei, Li Machine Learning and Bioinformatics Lab In Proceedings.
Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage Presenter: Martin Krogel.
1. Introduction The underground Internet economy Web-based malware The system analyzing the post-infection network behavior of web-based malware How do.
A M ULTIFACETED A PPROACH TO U NDERSTANDING THE B OTNET P HENOMENON Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Computer Science Department.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman.
1 Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling - Proceedings.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Presentation by Kathleen Stoeckle All Your iFRAMEs Point to Us 17th USENIX Security Symposium (Security'08), San Jose, CA, 2008 Google Technical Report.
BOTNET Kumar Mukherjee Mike Ladd Nazia Raoof Rajesh Radhakrishnan Bret Walker.
Introduction to Honeypot, Botnet, and Security Measurement
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
Niels Provos and Panayiotis Mavrommatis Google Google Inc. Moheeb Abu Rajab and Fabian Monrose Johns Hopkins University 17 th USENIX Security Symposium.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Implementing a Port Knocking System in C Honors Thesis Defense by Matt Doyle.
A Multifaceted Approach to Understanding the Botnet Phenomenon Authors : Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Computer Science.
Appear in IEEE TDSC 2008 Presented by Wei-Cheng Xiao.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
A MULTIFACETED APPROACH TO UNDERSTANDING THE BOTNET PHENOMENON Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose & Andreas Terzis IMC’06.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets,
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Published: Internet Measurement Conference (IMC) 2006 Presented by Wei-Cheng Xiao 2015/11/221.
Omar Hemmali CAP 6135 Paul Barford Vinod Yegneswaran Computer Sciences Department University of Wisconsen, Madison.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Studying Spamming Botnets Using Botlab
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Module 10: Windows Firewall and Caching Fundamentals.
DoS/DDoS attack and defense
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
A Multifaceted Approach to Understanding the Botnet Phenomenon Aurthors: Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Publication: Internet.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
“A Multifaceted Approach to Understanding the Botnet Phenomenon”
Presentation transcript:

A MULTIFACETED APPROACH TO UNDERSTANDING THE BOTNET PHENOMENON (2006) Jonathan Brant CAP 6135 – Spring 2010 Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Computer Science Department Johns Hopkins University

Overview  Introduction  Background  Measurement Methodology  Malware Collection  Graybox testing  Longitudinal Tracking of Botnets  Results and Analysis  Botnet Prevalence  Spreading Methods  Growth Patterns  Botnet Structures  Effective Botnet Size  Lifetime  “Insider’s view”  Conclusion

Introduction  Botnets – “networks of infected end-hosts that are under the control of a human operator”  Bots – end-hosts  Botmaster – human operator  Command and Control channels facilitate botmaster commands to bots in the botnet  Channels can use different communication mechanisms (e.g. P2P) Most modern botnets use Internet Relay Chat (IRC) Originally used to form large chat rooms

Introduction  Botnets almost always used for illegal activities  Extortion  spamming  Identity theft  Software piracy

Introduction  Paper attempts to address inquiries such as:  Number of botnet “species” Behavioral categorization of different species  Evolution of a botnet

Background  Step 1 – Botnets commandeer victims via remotely exploiting vulnerability of software running on victim  Infection strategies include: Self-replicating worms viruses Social engineering Convincing victims to run malicious code on their machine

Background  Step 2 – Victim executes shellcode and image of bot binary is fetched from location within botnet  When fetch is complete, the binary installs itself on target machine and automatically starts on each reboot

Background  Step 3 – Bot attempts to contact IRC server (address stored in executable)  Using a DNS name instead of IP address allows botmaster to retain control if IP is blacklisted by ISP

Background  Step 4 – Bot attempts to establish IRC session and join C2 channel  Three authentication steps: Bot authenticates itself using PASS message This is the IRC session password Bot issues C2 channel password This password and session password are in bot binary Botmaster authenticates to bot population This prevents other botmasters from seizing control of botnet

Background  Step 5 – Channel topic is parsed and executed  Contains default command that every bot executes  Future commands coming from botmaster can vary widely  Wide variety of available commands/responses increases difficulty of classifying botnet behaviors

Measurement Methodology  Data collection includes three phases:  Malware collection  Binary analysis via gray-box testing  Tracking of IRC botnets through IRC and DNS trackers

Measurement| Malware Collection  Distributed darknet  Locally deployed darknet Allocated but unused portion of IP address space  14 distributed nodes using PlanetLab testbed  Goal is to collect as many bot binaries as possible  Must support a wide array of data collection endpoints and be highly scalable

Measurement| Malware Collection  Modified nepenthes platform  Mimics replies generated by vulnerable services Collects first-stage exploit (shell-code)  Raw packets from PlanetLab nodes translated Using translation module written in Click  Packets were injected into local tunneling interface

Measurement | Malware Collection  On-line download modules in nepenthes disabled to prevent excessive downloads  Binaries retrieved by generating list of URL targets and sending to download station  Download station filtered entries in list and extracted unique sources/URLs

Measurement | Malware Collection  Honeynet catches exploits missed by nepenthes  Composed of honeypots running unpatched, virtual instances of Windows XP Each honeypot assigned private static IP on separate VLAN Infected honeypots sustain IRC connections until VM’s reimaged Suspect binaries retrieved by comparing VM contents to clean Windows image

Measurement | Malware Collection  Gateway routes darknet traffic to various parts on internal network  Half of darknet prefixes directed to local responder and other half to honeynet NAT used to map each honeypot to 128 darknet IP addresses

Measurement | Malware Collection  Serves as firewall preventing honeypots from conducting outbound attacks or infecting each other Cross-infection prevented by: Placing each honeypot on separate VLAN and terminating cross-VLAN traffic Terminating cross-VLAN traffic Outbound traffic block on popular vulnerable ports 135, 139, 445, etc.

Measurement | Malware Collection  Runs IRC detection module Application-level traffic searched for common IRC protocol strings NICK, JOIN, USER Once IRC connection witnessed, detection module establishes record for IRC session When honeypot attempts to reconnect, connection allowed to proceed to IRC server

Measurement | Malware Collection  Detection module only allows one honeypot to connect to an IRC server at given point in time Gateway detects when honeypot is infected Rules inserted to block inbound attacks to that honeypot

Measurement | Malware Collection  Gateway also performs miscellaneous tasks Triggering honeypot re- imaging Loading clean Windows images Pre-filtering for download station Running local DNS server to resolve DNS queries from honeypots

Measurement | Graybox Testing  Graybox testing used to extract features of suspicious binaries  Analysis spans two distinct phases (performed on isolated network segment)  First phase derives network fingerprint of binary  Second phase extracts binaries IRC-specific features

Measurement | Graybox Testing  Phase 1: Creation of a network fingerprint  Server acts as network sink All network activity initiated by malware will be detected  Traffic logs automatically processed to extract network fingerprint DNS – target of DNS requests IPs – destination IP addresses Ports – contacted ports and protocols Scan – whether or not default scanning behavior was detected Default scanning behavior – any attempt to contact more than 20 distinct destinations on the same port during the monitored period

Measurement | Graybox Testing  Phase 2: Extraction of IRC-related features  Modified version of UnrealIRC daemon instantiated on network sink  IRC listens on all ports ever observed in network fingerprint  Upon detecting an IRC connection, IRC-fingerprint is created PASS – initial password to establish IRC session NICK – nickname USER – username MODE – modes set JOIN – IRC channels to be automatically joined (and their associated passwords)

Measurement | Graybox Testing  (Phase 2 continued…)  To learn botnet “dialect”, bot connects to local IRC server and enters default channel IRC query engine plays role of botmaster Bot behavior is learned by subjecting it to series of commands Command set includes: IRC commands observed in honeynet traces Commands extracted from publicly available bot source code

Measurement | Longitudinal Tracking  Botnet tracking is performed by two means:  The use of a custom, lightweight IRC tracker  Probing DNS caches across the globe

Measurement | Longitudinal Tracking  IRC Tracker  “A modified IRC client that can join a specified IRC channel and automatically answer directed queries based on the template created by the graybox testing technique”  IRC tracker instantiates new IRC session to IRC server using fingerprint and template IRC trackers need to appear responsive

Measurement | Longitudinal Tracking  In order to appear “real”, the following must be performed: Traffic filtered so inappropriate information is not included in template Filtering performed automatically while bot is executing Computer specifications (e.g. memory, disk space) are changed to resemble specifications of a real machine IRC query engine issues a set of commands that require stateful responses Emulates a bot’s stateful software

Measurement | Longitudinal Tracking  DNS Tracking  Most bots issue DNS queries to resolve IP addresses of IRC servers  Caches of DNS servers are probed to determine number of DNS servers giving cache hits “Cache hit” implies at least one client queried DNS server during lifetime of its DNS entry

Measurement | Longitudinal Tracking  Original list contained 1.6 million DNS servers First filter removed top level domains.gov,.mil, etc. Second filter checked consistency of replies Two consecutive DNS queries First query was recursive and forced DNS server to completely resolve query Second query was not recursive and obtained local answers from server cache TTL field in second response should be smaller than first After filtering, master list consisted of 800,000 name servers  For a given IRC server, the caches of all DNS servers were probed and any associated cache hits recorded

Results and Analysis  Results include:  Traffic traces captured on local darknet 3 month period  IRC logs gathered 3 month period  DNS cache hit results from tracking 65 IRC servers 45 day period

Results| Botnet Prevalence  Botnet Traffic share  Two week snapshot of total incoming SYN packets to local darknet vs. packets originating from botnet spreaders A botnet spreader is any source that delivered a bot executable  27% of incoming SYNs attributed to botnet spreaders  76% come from botnet spreaders if target ports considered

Results| Botnet Prevalence  More than 90% of all traffic during peaks targeted ports used by botnet spreaders  More than 70% of sources during peak periods sent shell exploits  This suggests the total amount of botnet-related traffic is far greater than 27%

Results| Botnet Prevalence  11% (85,000) of probed servers were involved in at least one botnet activity  55% of servers in dataset are for.com domains 82% of DNS cache hits from name servers in that domain  29% of.com servers had at least 1 cache hit .cn servers only 0.2% of total servers 95% of them exhibited botnet activity

Results|Spreading Methods  Botnets use a variety of means to spread and recruit new victims   Web  Active scanning (most prevalent)  Botnets can be grouped into two types:  Worm-like Continuosly scan ports following target selection algorithm  Variable scanning behavior Uses a number of scanning algorithms Uniform, non-uniform, localized

Results|Spreading Methods  192 botnets captured  34 botnets were Type-I Upon infection, bot starts scanning IP space for new victims Initiates connection to IRC servers (identified by hard-coded list of DNS names) All IRC servers/channels bots tried to join were unreachable Channel was banned by public IRC server DNS name did not resolve to valid IP address Still, botnet grew over time due to persistence of scanning

Results|Spreading Methods  Type-II botnets were the most prevalent class Scanning triggered by a command More difficult to track due to continuosly changing behavior Localized and targeted scanning are were most prevalent techniques Localized scanning focused on Class B address space Targeted scanning focused on Class A address space

Results|Growth Patterns  In order to examine botnet growth patterns, two approaches were taken:  Cumulative number of unique DNS cache hits for distinct botnets over time was plotted  Growth pattern was compared to behavior learned from IRC tracker

Results|Growth Patterns  Botnets with semi-exponential growth patterns exhibit persistent random scanning activity (unchanging over time)  Example: for one botnet, topic of the corresponding channel was set to randomly scan port 445 indefinitely for one month  Related to worm infections

Results|Growth Patterns  Also representative of botnets with intermittent activity profiles  Example: Botnet III corresponds to botnet that infected honeypots on 3/13/2006 IRC server went down between 4/12/2006 – 4/30/2006 When IRC server became available, growth slope increased and honeypots were re-infected by the same botnet

Results|Growth Patterns  Predominantly used time-scoped scanning commands  As opposed to continuous scanning like the previous two

Results|Growth Patterns  Botnet evolution estimated by counting unique sources for message broadcast to the channel  Only plotted botnets of comparable size on a given plot  Trends confirm heterogeneity in botnets

Results | Botnet Structures  60% of 318 collected malicious binaries were IRC bots  Four predominant IRC structures were revealed  All bots connected to a single IRC server Prevalent among smaller classes of botnets (few hundred users) 70% of observed botnets fell into this category  IRC servers can be connected to form an IRC network supporting large numbers of users 30% of botnets bridged on multiple servers 50% bridged between two servers only  Seemingly unrelated botnets appear more similar when comparing their naming conventions, channel names, and operators’ user IDs These botnets may seem to belong to the wrong botmaster  Selected group of bots commanded to download an updated binary Results in bots being moved to a different IRC server

Results | Effective Botnet Size  Botnet footprint can become fairly large (> 15,000 bots)  Predominant structures were botnets managed by a single or few servers  Distinction drawn between  Botnet’s footprint  Number of bots connected to IRC channel at a given time Effective Size

Results | Effective Botnet Size  Some “chatty” IRC servers broadcast join/leave information for members on channel  Number of online bots versus time for these IRC servers is plotted in figure 9  Maximum size of online population is significantly smaller than botnet’s footprint  Footprint greater than 10,000  No more than 3,000 bots online at the same time  Effective size has little impact on long term activity, however, it affects number of bots available to execute commands in a timely manner

Results | Lifetime  Discrepancy between footprint and effective size likely due to the long lifetime of a typical botnet  Bot death rates and high churn rates can affect botnet’s effective size

Results | Lifetime  High churn rates  Bots do not stay long on IRC channel Average stay time: 25 minutes 90% stay less than 50 minutes  Likely causes include  Client instability (as a result of infection)  Machine hibernation  Botmasters commanding bots to leave the channel

Results | Botnet Software Taxonomy  183 of 192 confirmed IRC-based bot executables responded to probes of IRC query engine  49% of bots run AV/FW killer – a utility that disables anti-virus and firewall processes  43% run identd server which performs user identification Ensures only intended bots join a given IRC channel  40% run system security monitor which tightens bot security E.g. disables DCOM service and file sharing  38% run a registry monitor which alerts the bot of any attempts to disable it

Results | Botnet Software Taxonomy  Number of exploits within bot binaries varied from 3 to 29  Average of 15 exploits per binary  Most popular exploits (appeared in over 75% of binaries) DCOM135 LSASS445 NTPASS

Results | Botnet Software Taxonomy  Authors evaluated effectiveness of ClamAV and Norton anti-virus on 192 malicious binaries  ClamAV classified 137 binaries as malicious  Norton anti-virus classified 179 binaries as malicious  Windows XP service pack 2 still not immune

Results | “Insider’s view”  Traces show that:  Botmasters share information concerning what prefixes should not be scanned  Bots are tweaked to minimize chatter on C2 channel  Bots are probed to detect and isolate “misbehavers” Also look for “super-bots” with high bandwidth network links and large storage capacities

Results | “Insider’s view”  Bots migrate from one IRC channel to another, instructed by:  Command from botmaster  Download of replacement software that points to a different C2 server

Results | “Insider’s view”  Control commands include channel joins and leaves  Mining category includes commands that collect machine specifications  Attack category includes commands from botmasters to attack other network computers

Results | “Insider’s view”  Small botnets receive larger portion of control and mining commands  Hands-on botmasters that devote large amounts of time to manually control their botnet  Medium and large botnets have a larger percentage of cloning and download commands  Cloning could include the use of one botnet to attack another botnet by overloading its IRC server with join requests

Conclusion  Botnets are a major contributor to overall unwanted internet traffic  Most botnet traffic can be attributed to scans used to recruit new bots  IRC is still the dominant protocol used for C2 communications  Effective sizes of botnets can range from a few hundred to a few thousand  Botnet footprints are usually much larger than effective size This is due to high churn rate within a botnet Bot’s average channel occupancy is less than half an hour  Graybox testing revealed sophistication of modern bot software E.g. Self-protection measures

Contributions  Established empirical measurements for botnet prevalence  Particularly in considering DNS cache hits by IRC botnets that were tracked  Classified typicality's of bot binaries  Registry monitoring tactics  Locking down host vulnerabilities  Classified most prevalent botnet activities as a function of botnet size  Delineated between botnet footprint and “effective size.”  Large experiment samples further solidified results

Critique  Focused mainly on Windows-based systems  It would be interesting to see the effectiveness of noted infection strategies on Unix systems  Only evaluated two anti-virus applications  Perhaps include other popular anti-virus applications McAfee, Symantec Corporate, AVG, etc.  Authors noted 60% of binaries collected were IRC bots  Did the other 40% use a different communication mechanism? If so, it would be interesting to know how they were structured and if the authors evaluated them in any way

References [1] Rajab, M.A., Zarfoss, J., Monrose, F., & Terzis A. (2006). A multifaceted approach to understanding the botnet phenomenon. Proceedings of the 6 th ACM SIGCOMM conference on Internet measurement, Rio de Janeriro, Brazil