Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.

Slides:



Advertisements
Similar presentations
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Advertisements

Spam Sinkholing Nick Feamster. Introduction Goal: Identify bots (and botnets) by observing second-order effects –Observe application behavior thats likely.
Web Content Control Application Providing Secure & Reliable Internet Access December 2010.
® Microsoft Office 2010 Browser and Basics.
A look into Bullet Proof Hosting November DefCamp 5 Silviu Sofronie – Head of Forensics
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
The Internet Useful Definitions and Concepts About the Internet.
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
1. Introduction The underground Internet economy Web-based malware The system analyzing the post-infection network behavior of web-based malware How do.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
MIRAGE CPSC 620 Project By Neeraj Jain Hiranmayi Pai.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
1 Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling - Proceedings.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
Introduction to Honeypot, Botnet, and Security Measurement
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
BotNet Detection Techniques By Shreyas Sali
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 9/19/2015Slide 1 (of 32)
Network Installation. Internet & Intranets Topics to be discussed Internet. Intranet. .
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
2010/6/7 Spamalytics An Empirical Analysis of Spam Marketing Conversion Author: Chris Kanich Christian Kreibich Kirill Levchenko Brandon Enright Geoffrey.
1 Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Speaker: Jun-Yi Zheng 2010/03/29.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
1 Characterizing Botnet from Spam Records Presenter: Yi-Ren Yeh ( 葉倚任 ) Authors: L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, I. Osipkov, G. Hulten,
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
Jhih-sin Jheng 2009/09/01 Machine Learning and Bioinformatics Laboratory.
BOTNET JUDO Fighting Spam with Itself By: Pitsillidis, Levchenko, Kreibich, Kanich, Voelker, Paxson, Weaver, and Savage Presentation by: Heath Carroll.
Not So Fast Flux Networks for Concealing Scam Servers Theodore O. Cochran; James Cannady, Ph.D. Risks and Security of Internet and Systems (CRiSIS), 2010.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
Spamscatter: Characterizing Internet Scam Hosting Infrastructure By D. Anderson, C. Fleizach, S. Savage, and G. Voelker Presented by Mishari Almishari.
Cross-Analysis of Botnet Victims: New Insights and Implication Seungwon Shin, Raymond Lin, Guofei Gu Presented by Bert Huang.
Speaker: Hom-Jay Hom Date:2009/11/17 Botnet, and the CyberCriminal Underground IEEE 2008 Hsin chun Chen Clinton J. Mielke II.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
What is Network and Security Research? Network and Security Research, or Information Communication Technology (ICT) Research involves: the collection,
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
Studying Spamming Botnets Using Botlab
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
What is Web Information retrieval from web Search Engine Web Crawler Web crawler policies Conclusion How does a web crawler work Synchronization Algorithms.
Speaker:Chiang Hong-Ren An Investigation and Implementation of Botnet Detection Schemes.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Microsoft Research, Silicon Valley Geoff Hulten,
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
Dec 14, 2014, Harvard University
TMG Client Protection 6NPS – Session 7.
A lustrum of malware network communication: Evolution & insights
Virus Attack Final Presentation
Internet Worm propagation
Presented by Aaron Ballew
Presentation transcript:

Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory

Abstract Botlab, a platform that continually monitors and analyzes the behavior of spam-oriented botnets. Our prototype system integrates information about spam arriving at the University of Washington, outgoing spam generated by captive botnet nodes, and information gleaned from DNS about URLs found within these spam messages. We present defensive tools that take advantage of the Botlab platform to improve spam filtering and protect users from harmful web sites advertised within botnet-generated spam. 2009/10/20 Machine Learning And Bioinformatics Laboratory 2

Outline Introduction Background on the Botnet Threat The Botlab Monitoring Platform Analysis Applications enabled by Botlab Conclusion 2009/10/20 Machine Learning And Bioinformatics Laboratory 3

Botlab Architecture 2009/10/20 Machine Learning And Bioinformatics Laboratory 4

Introduction The analysis of “incoming” spam feeds. Considering characteristics of the “outgoing” spam these botnets generate. Passive honeynets are becoming less applicable to this problem over time. We have designed network sandboxing mechanisms that prevent captive bot nodes from causing harm. The bots we analyze use simple methods for locating their command and control (C&C) servers. Preventing Botlab hosts from being blacklisted by botnet operators. 2009/10/20 Machine Learning And Bioinformatics Laboratory 5

Background on the Botnet Threat A botnet is a large-scale, coordinated network of computers, each of which executes specific bot software. Botnet operators recruit new nodes by commandeering victim hosts and surreptitiously installing bot code onto them. The resulting army of “zombie” computers is typically controlled by one or more command-and-control (C&C) servers. Botnets have become more sophisticated and complex in how they recruit new victims and mask their presence from detection systems: 1. Propagation 2. Customizes C&C protocols 3. Rapid evolution 2009/10/20 Machine Learning And Bioinformatics Laboratory 6

The Botlab Monitoring Platform Botlab’s design was motivated by four requirements: Attribution / Adaptation / Immediacy / safety Incoming Spam : On average, UW receives 2.5 million messages each day, over 90% of which is classified as spam. Malware Collection : Botlab crawls URLs found in its incoming spam feed. Botlab periodically crawls binaries or URLs (eg.MWCollect Alliance honeypots) 2009/10/20 Machine Learning And Bioinformatics Laboratory 7

The Botlab Monitoring Platform Identifying Spamming Bots : Botlab executes spamming bots within sandboxes to monitor botnet behavior.  Prune the binaries Network fingerprint : We define the similarity coefficient of the binaries, S(B1, B2)  Safely generating fingerprints (safety & effectiveness)  Experience classifying bots (VM & bare-metal) 2009/10/20 Machine Learning And Bioinformatics Laboratory 8

The Botlab Monitoring Platform Execution Engine : Seven spamming bots: Grum, Kraken, MegaD, Pushdo, Rustock, Srizbi, and Storm.  Avoiding blacklisting anonymizing “Tor “ network  Multiple C&C servers C&C redundancy mechanism Correlating incoming and outgoing spam We use clustering analysis to identify sets of relays used in the same spam campaign. 2009/10/20 Machine Learning And Bioinformatics Laboratory 9

Analysis 2009/10/20 Machine Learning And Bioinformatics Laboratory 10 1.We examine the actions of the bots being run in Botlab – Outgoing Spam. 2.We analyze our incoming spam feed. The Spam Botnets :  Behavioral Characteristics (p.11)  Outgoing Spam Feeds Size of mailing lists: (p.12) Overlap in mailing lists: (P.13) Spam subjects: (P.14)

Analysis 2009/10/20 Machine Learning And Bioinformatics Laboratory 11

Analysis Size of mailing lists: Using the outgoing spam feeds to estimate the size of the botnets’ recipient lists. A bot periodically obtains a new chunk of recipients from the master and sends spam to this recipient list. Let c be the chunk size. On each such request, the chunk of recipients is selected uniformly at random from the spam list. The chunk of recipients received by a bot is much smaller than the spam list size N. m[1 − (1 − c/N )^k ]. 2009/9/14 Machine Learning And Bioinformatics Laboratory 12

Analysis Overlap in mailing lists : We also examined whether botnets systematically share parts of their spam lists. 2009/10/20 Machine Learning And Bioinformatics Laboratory 13

Analysis Spam subjects: We have found that between any two spam botnets, there is no overlap in subjects sent within a given day, and an average overlap of 0.3% during the length of our study.  subject-based classification. 2009/10/20 Machine Learning And Bioinformatics Laboratory 14

Analysis Analysis of Incoming Spam For all the incoming mail at UW : By UW’s filtering systems : 89.2% 0.5% of spam contain viruses as attachments. 95% of the spam messages contain HTTP links. 1% contain links to executables. 2009/10/20 Machine Learning And Bioinformatics Laboratory 15

Analysis Spam sources  A constant balance between the influx of newly-infected bots and the disappearance of disinfected hosts.  The use of dynamic IP (DHCP) leases for end hosts. 2009/10/20 Machine Learning And Bioinformatics Laboratory 16

Analysis 2009/10/20 Machine Learning And Bioinformatics Laboratory 17 We cluster spam based on the following attributes: 1) The domain names appearing in the URLs found in spam. 2) The content of Web pages linked to by the URLs. 3) the resolved IP addresses of the machines hosting this content.

Analysis 2009/10/20 Machine Learning And Bioinformatics Laboratory 18

Spam campaigns 2009/10/20 Machine Learning And Bioinformatics Laboratory 19

Spam campaigns 2009/10/20 Machine Learning And Bioinformatics Laboratory 20

Recruiting campaigns 2009/10/20 Machine Learning And Bioinformatics Laboratory 21

Botnet membership lists and sizes How Botlab can be used to obtain information on both botnet size and membership? [1 − (1 − p)^n]. (the probability that at least one of the messages generated by the bot is received by our spam monitors is) For large values of n, such as when n ∼ 1/p  [1 − e^(−np)] 2009/10/20 Machine Learning And Bioinformatics Laboratory 22

Botnet membership lists and sizes For example (Rustock spam botnet) : spam monitor : 2.4 million daily messages. the global number : billion messages.  p = /110 billion = 2.2 · 10^−5 Rustock sends spam messages at a constant rate of 47.5K messages per day  2009/10/20 Machine Learning And Bioinformatics Laboratory 23

Botnet membership lists and sizes the total number of active Rustock bots on that day was about 83, 836/0.65 = 128, /10/20 Machine Learning And Bioinformatics Laboratory 24

Applications enabled by Botlab Safer web browsing Spam Filtering Availability of Botlab Data  /10/20 Machine Learning And Bioinformatics Laboratory 25

Conclusion We have described Botlab, a real-time botnet monitoring system. Botlab’s key aspect is a multiperspective design that combines a feed of incoming spam from the University of Washington with a feed of outgoing spam collected by running live bot binaries. By correlating these feeds, Botlab can perform a more comprehensive, accurate, and timely analysis of spam botnets. A spam botnet typically engages in multiple spam campaigns simultaneously, and the same campaign is often purveyed by multiple botnets. We have also prototyped tools that use Botlab’s real-time information to enable safer browsing and better spam filtering. 2009/10/20 Machine Learning And Bioinformatics Laboratory 26

Thanks for your attention 2009/10/20 Machine Learning And Bioinformatics Laboratory 27