Johannes Hassmund (2009), Project Report for Information Security Course, Linkoping University, Sweden. Speaker : Hung-Jen Chiang Studying IDS signatures.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

By Hiranmayi Pai Neeraj Jain
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
Threat infrastructure: proxies, botnets, fast-flux
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
2009/9/151 Rishi : Identify Bot Contaminated Hosts By IRC Nickname Evaluation Reporter : Fong-Ruei, Li Machine Learning and Bioinformatics Lab In Proceedings.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman.
China Science & Technology Network Computer Emergency Response Team Botnet Detection and Network Security Alert Tao JING CSTCERT,CNIC.
Botnets An Introduction Into the World of Botnets Tyler Hudak
Introduction to Honeypot, Botnet, and Security Measurement
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Article presentation for: The Dark Cloud: Understanding and Defending against Botnets and Stealthy Malware Based on article by: Jaideep Chandrashekar,
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
BotNet Detection Techniques By Shreyas Sali
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Speaker : Hong-Ren Jiang A Novel Testbed for Detection of Malicious Software Functionality 1.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Honeypot and Intrusion Detection System
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Omar Hemmali CAP 6135 Paul Barford Vinod Yegneswaran Computer Sciences Department University of Wisconsen, Madison.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
Malicious Software.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Measurements and Mitigation of Peer-to-peer Botnets: A Case Study on Storm Worm Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling.
Understand Malware LESSON Security Fundamentals.
A Multifaceted Approach to Understanding the Botnet Phenomenon Aurthors: Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Publication: Internet.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Presented by D Callahan.
Role Of Network IDS in Network Perimeter Defense.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Presented by : Matthew Sulkosky COSC 316 (Host Security) BOTNETS A.K.A ZOMBIE COMPUTING.
Chapter 7: Identifying Advanced Attacks
Instructor Materials Chapter 7 Network Security
Firewalls.
Chapter 4: Protecting the Organization
Test 3 review FTP & Cybersecurity
An overview over Botnets
Presentation transcript:

Johannes Hassmund (2009), Project Report for Information Security Course, Linkoping University, Sweden. Speaker : Hung-Jen Chiang Studying IDS signatures using botnet infected honeypots

Outline Introduction Botnets overview Implementation of the honeypots Analysis of malware and evaluation of IDS signatures Related Work Conclusion and Further Work 2015/10/23 2

Introduction (1/2) Background : Linköping University Incident Response Team handles intrusions, intrusion attempts, spam, malware incidents, complaints regarding copyright infringement and other IT security related matters within Linköping University. Infections of hosts connected to LiU-Net are mainly discovered through the university’s Intrusion Detection System (IDS), due to anomalies in the use of certain ports, among whose port 25 (SMTP) and the Windows RPC ports ( and 445) are the most prominent. Malware are also discovered due to complaints from external parties or notifications from Sunet CERT (Swedish University Network Computer Emergency Response Team) and by the use of antivirus software. 2015/10/23 3

Introduction (2/2) Purpose : By moving from a reactive to proactive approach we aim to minimize time from infection to time of detection. A secondary goal is to gain experience from this type of malware study and to establish a platform on which further studies can be performed in a safe manner. Method : The theoretical part of the project is based on a literature study introducing concepts of control channels of botnets. The actual study of IDS signatures has been performed on a network of honeypots connected to a firewall protecting the Internet from the infected bots. Limitations : Due to time constraints focus will be put exclusively to three malware binaries; FakeAlert.JB, Conficker.B and Conficker.C. 2015/10/23 4

Botnets overview(1/3) Botnet : A botnet is a group of compromised computers. Bots, under control by a malicious individual; a botmaster. What distinguishes botnets from other kinds of malware is the ability to establish a command and control channel with the botmaster. The most prominent threats of botnets are spamming and DDoS (distributed denial of service) attacks. History : The first bot Eggdrop appeared in the IRC (Internet Relay Chat) community and were designed to perform administrative duties like providing logging capabilities and help channel operators to fight abuse. 2015/10/23 5

Botnets overview(2/3) 2015/10/23 6 Protocol : IRC protocol.(e.g. Agobot and SDBot ) HTTP protocol(e.g. BlackEnergy) P2P protocol(e.g. Storm and Conficker)

Botnets overview(3/3) Researchers suggest that botnets is the number one method of choice for spammers and that sending spam is currently the most prominent use of botnets. DDoS attack is another area where Botnets appear to be the perfect tool. The effect of several thousands of bots initiating DoS attacks at a coordinated time has the potential to be devastating. Other threats include hosting phishing web sites and privacy theft. The latter has gained increased attention during 2009 with the reveal GhostNet; a botnet claimed to target Tibetan officials.( /10/23 7

Implementation of honeypots (1/5) 2015/10/23 8 Logical setup : The compromised computers are physical machines installed with Windows XP SP2 (no further patches) acting as full interaction honeypots. One of the reference machines is configured with Windows XP SP3, fully patched. The other one carries the same configuration as the infected computer.

Implementation of honeypots (2/5) Generic firewall configuration : First we have a major risk of our botnet disturbing and attacking other computers on the Internet, both internal and external to LiU-net. To manage this risk we configured the firewall to block all outgoing traffic to LiU-net. To protect external organizations and Internet users, the firewall was configured to block all traffic on the notorious TCP ports 135, and /10/23 9

Implementation of honeypots (3/5) 2015/10/23 10 Simulating successful spam bots

Implementation of honeypots (4/5) Risk of provoking the botnet to DDoS us : Apart from the risk of the infected bots launching attacks towards external machines of the Internet there is also a risk of provoking the botnet to launch a DDoS attack against ourselves. The ideal situation would be to have a separated research network for the purpose of this project. Initial IDS configuration : The purpose of this IDS was to increase the probability to detect attacks towards innocent hosts on the Internet, originating from our honeypots. Activity recording : Network traffic between the honeypots and the Internet was recorded using tcpdump on the firewall server. 2015/10/23 11

Implementation of honeypots (5/5) Client infection : The first malware chosen was a botnet binary identified by the AVG antivirus software as “Trojan Horse FakeAlert.JB”. As a second malware we choose to study the Conficker botnet which we have seen some infections of on the university network. 2015/10/23 12

Analysis of malware and evaluation of IDS signatures(1/5) FakeAlert.JB 2015/10/23 13

Analysis of malware and evaluation of IDS signatures(2/5) FakeAlert.JB 2015/10/23 14

Analysis of malware and evaluation of IDS signatures(3/5) FakeAlert.JB : The request made to the malicious server on our infected host is a HTTP POST request on the form “POST /coxbgxe.png HTTP/1.1”, the content specification says “Content-Type: application/x-wwwform- urlencoded”. Has so far given zero false positives, still detecting all known instances of the malware studied. Conficker.B and Conficker.C : The original Conficker binary exploits a vulnerability in the Windows RPC (Remote Procedure Call) protocol announced by Microsoft on October 23rd, 2008 The worm rather than the traditional Command and Control structure updates itself with new versions of the binary using a peer to peer approach. 2015/10/23 15

Analysis of malware and evaluation of IDS signatures(4/5) Observations of honeypot infected with Conficker.B : Upon infection of a host with Conficker.B, it shortly starts TCP-scanning the Internet, looking for hosts which have port 445 open. Before starting the SYN-scan the hosts infected with Conficker.B checks their external IP addresses by contacting the web sites. Conficker.B spreads aggressively on USB memories, but was not able to spread to vulnerable computers within the isolated network during an eight hour period. Conficker C : It tries to synchronize to the botnet using a UDP based peer to peer protocol. This signature successfully detects Conficker.C but causes a significant amount of false positives. We suspect the Internet phone application Skype as one of the sources of these. 2015/10/23 16

Analysis of malware and evaluation of IDS signatures(5/5) 2015/10/23 17

Related Work Gu et al. have studied methods to recognize botnet command and control channels using network anomaly detection. The P2P botnet Storm has been studied by Holz et al.. They have conducted their research by gathering botnet binaries using spam traps ( addresses set up solely for the purpose of receiving spam) and installing these on honeypots. 2015/10/23 18

Conclusion and Futher Work We conclude that a protected network of honeypots has proven to be a great tool for the security department or a security analyst who wishes to get hands- on experience of malware. In retrospect we can conclude that this mechanism was never needed since the malware studied did not initiate any spam sending sessions. In addition to passive study of network traffic in isolation we believe that a more in-depth understanding requires analysis of the malware binaries themselves. We believe that reverse engineering and disassembly of malware binaries will keep proving to bear an important role in further research of specific botnets. 2015/10/23 19