Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets,

Slides:



Advertisements
Similar presentations
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Advertisements

Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee ACSAC.
An Introduction of Botnet Detection – Part 2 Guofei Gu, Wenke Lee (Georiga Tech)
Intermediate TCP/IP TCP Operation.
1 MA Rajab, J Zarfoss, F Monrose, A Terzis - Proceedings of the First USENIX Workshop on Hot Topics in Understanding Botnets My Botnet is Bigger than Yours.
 Firewalls and Application Level Gateways (ALGs)  Usually configured to protect from at least two types of attack ▪ Control sites which local users.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
1 Internet Networking Spring 2004 Tutorial 13 LSNAT - Load Sharing NAT (RFC 2391)
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Detecting Botnets Using Hidden Markov Models on Network Traces Wade Gobel Bio-Grid, Summer 2008.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #12 LSNAT - Load Sharing NAT (RFC 2391)
Internet Traffic Analysis for Threat Detection Joshua Thomas, CISSP Thomas Conley, CISSP Ohio University Communication Network Services Joshua Thomas,
I NTRODUCTION OF S OCKET P ROGRAMMING L.Aseel AlTurki King Saud University.
Design and Implementation of SIP-aware DDoS Attack Detection System.
IP/ICMP Translation Algorithm (IIT) Xing Li, Congxiao Bao, Fred Baker
BotFinder: Finding Bots in Network Traffic Without Deep Packet Inspection F. Tegeler, X. Fu (U Goe), G. Vigna, C. Kruegel (UCSB)
Bayesian Bot Detection Based on DNS Traffic Similarity Ricardo Villamarín-Salomón, José Carlos Brustoloni Department of Computer Science University of.
2009/9/151 Rishi : Identify Bot Contaminated Hosts By IRC Nickname Evaluation Reporter : Fong-Ruei, Li Machine Learning and Bioinformatics Lab In Proceedings.
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray,
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology USENIX Security '08 Presented by Lei Wu.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
Chapter 6: Packet Filtering
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Amir Houmansadr CS660: Advanced Information Assurance Spring 2015
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang, and.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
11 Automatic Discovery of Botnet Communities on Large-Scale Communication Networks Wei Lu, Mahbod Tavallaee and Ali A. Ghorbani - in ACM Symposium on InformAtion,
1 Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Speaker: Jun-Yi Zheng 2010/03/29.
I. Basic Network Concepts. I.1 Networks Network Node Address Packet Protocol.
1 Characterizing Botnet from Spam Records Presenter: Yi-Ren Yeh ( 葉倚任 ) Authors: L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, I. Osipkov, G. Hulten,
TCP/IP Transport and Application (Topic 6)
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Identification of Bot Commands By Run-time Execution Monitoring Younghee Park, Douglas S. Reeves North Carolina State University ACSAC
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Not So Fast Flux Networks for Concealing Scam Servers Theodore O. Cochran; James Cannady, Ph.D. Risks and Security of Internet and Systems (CRiSIS), 2010.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Presented by Rebecca Meinhold But How Does the Internet Work?
Studying Spamming Botnets Using Botlab
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
BotCop: An Online Botnet Traffic Classifier 鍾錫山 Jan. 4, 2010.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Presented by D Callahan.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
© 2002, Cisco Systems, Inc. All rights reserved..
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee
Botnet Detection by Monitoring Group Activities in DNS Traffic
Transport Layer Identification of P2P Traffic
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Presentation transcript:

Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets, Speaker: 鍾錫山

Outlines Ⅰ. Introduction Ⅱ. Data collection and format Ⅲ. Detection of botnet controllers Ⅳ. Characterization of botnets Ⅴ. Quantitative results Ⅵ. Conclusions

Ⅰ. Introduction It is an anomaly-based passive network data analysis algorithm that has been able to detect IRC botnet controllers. It is scalable to very large networks, which actually provide larger data sets for correlation of activity. It is able to show the dynamics of botnet activity by detecting activities that have been most effective in targeting our specific customer sets.

Ⅱ. Data Collection and Format The input was provided from AT&T Security and AT&T Labs. Flow records contain: Source address/port (sip/sport). Destination address/port (dip/dport). The number of packets, bytes. The start and end time of the session. The transport layer protocol used.

Ⅲ. Detection of Botnet Controllers

A. Aggregation of trigger events, identification of hosts with suspicious behavior, and selection of flows. These reports are generated by internal upstream systems and identify the hosts that were involved in scanning, ing of spam and viruses, or DDoS activities, the type and duration of the activity, and the links where such activity was detected.

A. Aggregation of Trigger Events, Identification of Hosts With Suspicious Behavior, And Selection of Flows

B. Identificaion of Candidate Controller Conversations(1) Typical IRC server ports: the ports typically associated with IRC (e.g., 6667, 6668, 7000/tcp) are checked first. Hub servers/ports: hosts which have multiple connections from many suspected bots to one or more of their local ports. Servers with similarity to IRC model: the traffic between remote servers and suspected bots are similar to the flow model of IRC traffic.

B. Identificaion of Candidate Controller Conversations(2) Communications between suspected bots and other remote hosts are recorded individually, including the remote port, type of detection, link where the activity took place, the number of flow, packets and bytes transferred. Long-term analysis help to identify controllers and/or generate higher levels of confidence.

C. Analysis of Candidate Controller Conversation records

C. Analysis of Candidate Controller Conversation records(1) (a) Calculation of the number of unique suspected bots for a given remote server address/port. We sort the remote server by the number of suspected bots and find the ”knee of the curve” where a second derivative is maximized. The second derivative is estimated by second order differences. This approach in general allows us to automatically focus on the larger botnets.

C. Analysis of Candidate Controller Conversation records(2) (b) Calculation of the distances between the traffic to remote server ports and the IRC model traffic. We use 4 statistics( ) –0%, 25%, 50%, and 75% of the 3 metrics( ) flows-per-address (fpa), packets-per-flow (ppf) and bytes-per-packet (bpp) calculated from the flow records on a particular port. and are the observed and model traffic values of statistic j of metric i. If is below a threshold, it is considered a candidate control port.

C. Analysis of Candidate Controller Conversation records(3) (c) Calculation of a heuristics score for server address/port pairs that remain candidates from (a) and (b). We developed a modified K-means algorithm to detect quasi-periodic flow records. The heuristics score is proportional to the fraction of quasi-periodic clients. Other considerations are made based on if the server uses both TCP and UDP on the suspect port and if the server appears to be serving significant peer-to-peer traffic.

D. Validation of Controllers Correlation with other available data sources (e.g., honey-pot based detection). Coordination with a customer for validation and mitigation. Validation of domain names associated with services (i.e.,valid services generally have appropriately registered domain names with verifiable contact information).

Ⅳ. Characterization of Botnets Port-rank vectors: the traffic profile of a host is a vector of application-bound ports ranked by the number of flows observed. A destination port is considered application- bound if it is in the range of the IANA assigned ports (1-1023), or there are at least two flows from the examined host to distinct remote addresses on a high-numbered port ( ).

Similarity Function(1) Similarity function: M is the length of the shortest vector. N is the length of the longest vector. is the indicator function that the port with index k exists in both vectors and. and are the orders in which the port with index k appears in vectors and, respectively.

Similarity Function(2) Similarity increases if a port number exists in both vectors. Similarity is a strictly decreasing function of the port rank. Similarity function is symmetric: S(i, j) = S(j, i).

Example of Similarity Function Assume two vectors = [445, 25, 53, 18067] = [25, 53, 135, 139, 445] Then the similarity value is calculated based on (1), where M = 4, N = 5 and: S(i, j) = = 0.491

The Classification Algorithm(1) (1)Given an initial set of hosts, calculate the similarity for each pair of hosts and rank the similarities with descending order. The similarity larger than a threshold (e.g., 0.9) go to the next step. (2)Check if any hosts of the same pair is already grouped (i.e., classified). If none of the hosts in the pair is grouped, start a new group (for this pair of hosts). Calculate the vector of ranked application-bound ports of the group. If one of the hosts is already grouped, add the other host to the group.

The Classification Algorithm(2) (3) As new hosts are identified (in subsequent time intervals, e.g., 1 hour), calculate their similarity to all of the existing groups and allocate them to the group with the highest similarity above the threshold. (4) If there is no group in which they can be allocated, allocate them to a common pool. Calculate similarities between all pairs of hosts in the pool and repeat the initial group formation process.

Ⅴ. Quantitative Results The input was provided from AT&T Security and AT&T Labs. Between and , we have detected 376 unique controller IP addresses. Correlating these addresses with other sources (e.g., DNS data) has lead to the identification of several hundred additional controller addresses. 5 addresses were false positives since they were deemed non-malicious based on their DNS registration information. Between to , we discovered 6 million unique IP addresses participating in malicious botnets and since then we have been discovering, on average, 1 million new bots per month.

Ⅵ. Conclusions This is an algorithm for the detection and characterization of IRC botnets using passive analysis based on flow data. Based on long-term monitoring of validated malicious botnets, we estimate that the average bot stays about 2-3 days on the same botnet controller. Future work: Accommodating P2P and Http botnet controllers. Automating DNS analysis. Analysis of characterize structure and evolution of botnets.