Studying Spamming Botnets Using Botlab

Slides:



Advertisements
Similar presentations
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Advertisements

Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Spam Sinkholing Nick Feamster. Introduction Goal: Identify bots (and botnets) by observing second-order effects –Observe application behavior thats likely.
By Hiranmayi Pai Neeraj Jain
Design and Evaluation of a Real- Time URL Spam Filtering Service Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song University of California,
Taxonomy of Botnets Team Mag Five Valerie Buitron Jaime Calahorrano Derek Chow Julia Marsh Mark Zogbaum.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
OFFENSE BY KALYAN MANDAGAUTAM BHASWAR.  4 years of study, covers only 6 Botnets reponsible for 79% of spam messages arriving at the University of Washington.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
1. Introduction The underground Internet economy Web-based malware The system analyzing the post-infection network behavior of web-based malware How do.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray,
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
1 Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling - Proceedings.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
Computer Concepts 2014 Chapter 7 The Web and .
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
Niels Provos and Panayiotis Mavrommatis Google Google Inc. Moheeb Abu Rajab and Fabian Monrose Johns Hopkins University 17 th USENIX Security Symposium.
Discovery of Emergent Malicious Campaigns in Cellular Networks Nathaniel Boggs, Wei Wang, Suhas Mathur, Baris Coskun, Carol Pincock © 2013 AT&T Intellectual.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Internet Security facilities for secure communication.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Economics of Malware: Spam Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See the last.
Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 9/19/2015Slide 1 (of 32)
A Crawler-based Study of Spyware on the Web Authors: Alexander Moshchuk, Tanya Bragin, Steven D.Gribble, and Henry M. Levy University of Washington 13.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
BOTNET JUDO Fighting Spam with Itself By: Pitsillidis, Levchenko, Kreibich, Kanich, Voelker, Paxson, Weaver, and Savage Presentation by: Heath Carroll.
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets,
Spamscatter: Characterizing Internet Scam Hosting Infrastructure By D. Anderson, C. Fleizach, S. Savage, and G. Voelker Presented by Mishari Almishari.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
Cross-Analysis of Botnet Victims: New Insights and Implication Seungwon Shin, Raymond Lin, Guofei Gu Presented by Bert Huang.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Unconstrained Endpoint Profiling Googling the Internet Ionut Trestian, Supranamaya Ranjan, Alekandar Kuzmanovic, Antonio Nucci Reviewed by Lee Young Soo.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
The Koobface Botnet and the Rise of Social Malware Kurt Thomas David M. Nicol
Botnets Usman Jafarey Including slides from The Zombie Roundup by Cooke, Jahanian, McPherson of the University of Michigan.
What is Web Information retrieval from web Search Engine Web Crawler Web crawler policies Conclusion How does a web crawler work Synchronization Algorithms.
Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and Nagendra Modadugu – Google First Workshop on Hot Topics in Understanding Botnets (HotBots.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Microsoft Research, Silicon Valley Geoff Hulten,
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
Presented by : Matthew Sulkosky COSC 316 (Host Security) BOTNETS A.K.A ZOMBIE COMPUTING.
Exchange Online Advanced Threat Protection
TMG Client Protection 6NPS – Session 7.
A lustrum of malware network communication: Evolution & insights
Practical Censorship Evasion Leveraging Content Delivery Networks
Chapter 2. Malware Analysis in VMs
Internet Worm propagation
Presented by Aaron Ballew
Presentation transcript:

Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk, Steven D. Gribble, and Arvind Krishnamurthy. "Studying Spamming Botnets Using Botlab." In NSDI, vol. 9, pp. 291-306. 2009. Presented by Sharan Dhanala

Background on the Botnet Threat A botnet is a large-scale, coordinated network of computers, each of which executes specific bot software. Botnet operators recruit new nodes by taking control of the victim hosts and secretly installing bot code onto them. The resulting army of “zombie” computers is typically controlled by one or more command-and-control (C&C) servers. Botnets have become more sophisticated and complex in how they recruit new victims and mask their presence from detection systems 1. Propagation 2. Customized C&C protocols 3. Rapid evolution Propagation-> Reply on social engineering to find and compromise victims. Customized C&C protocols -> Older botnets used IRC to communicate with C&C but the newer ones use encrypted and customized protocol (HTTP request) to send commands to the bots. Rapid evolution -> Most malware binaries are packed with polymorphic packers which means that the binaries look different but the underlying code base is the same. Botnet operators are using fast flux DNS rather than a single web server to host their scam.

Botlab architecture Image source: [https://www.usenix.org/legacy/event/nsdi09/tech/full_papers/john/john_html/figs/architecture.png] This is the botlab architecture. We will go through each entities in details in the following slides.

The Botlab Monitoring platform Botlab’s design was motivated by four requirements: Attribution Adaptation Immediacy Safety Incoming Spam On an average, UW receives 2.5 million e-mail messages each day, over 90% of which is classified as spam. Malware Collection Botlab crawls URLs found in its incoming spam feed. Botlab periodically crawls binaries or URLs contained in public malware repositories or collected by MWCollect Alliance honeypots. Attribution-> Botlab must identify spam botnets and their hosts that are responsible for campaigns. Adaptation-> Botlab must track changes with the botnet’s behaviour from time to time. Immediacy-> Botlab must provide information about botnet asap as that information might degrade quickly. Safety-> Botlab must not cause harm. Monitor Incoming feed->of about 200,000 UOW email address. MalwareCollection Running captive bots nodes requires upto date bot binaries. Crawl URL-> 100,000 unique URLs per day in their spam feed. 1% malicious executables or drive-by downloads.

The Botlab Monitoring platform Identifying spamming bots Botlab executes spamming bots within sandboxes to monitor botnet behavior. Network fingerprinting Each flow record  <protocol, IP address, DNS address, port> Similarity coefficient of two binaries B1 and B2 If similarity coefficient of two binaries is high then the binaries are to be behavioural duplicates. - Prune the binaries obtained by Botlab to identify those that correspond to the botnet and discard any duplicate binaries which are already being monitored by Botlab. Simple hashing is not sufficient as the binaries are polymorphic packed and this circumvents the signature based security tools. For more reliable behavioural signature, Botlab produces network fingerprint of each binary. 𝑆 𝐵1,𝐵2 = |𝑁1∩𝑁2| |𝑁1∪𝑁2|

The Botlab Monitoring platform Identifying spamming bots Safely generating fingerprints Tight rope between safety & effectiveness. Human operator with tools that act as safety net. Redirect traffic to spamhole. Experience classifying bots Bots that detect VM & bare-metal. Bots checking domain name- required modifying spamhole. Bots perform comprehensive SMTP verification. Tension between safety and effectiveness in evident when constructing signatures of newly gathered binaries. Safe approach-> drop network packets instead of transmitting them but this is ineffective as most of the binaries first communicate with the C&C server before fully activating. Effective approach would be to give the binaries unconditional access to internet but this is not safe as they might start spreading spam across. In order to walk this tight rope, Botlab has a human intervention where there is a human operator with tools acting as a safety net- traffic destines to privileged ports are automatically dropped, there is a limit enforced on connection rates, data transmission, total window of time allowed for binaries to execute. Bots detect when they are being run in VM and disable themselves. Execute the created binaries in VM and bare-metal and then compare the results to check whether the binary performs any VM detection. SMTP verification- MegaD example of checking MessageID and verifying with C&C before sending out instructions.

The Botlab Monitoring platform Execution Engine Seven spamming bots: Grum, Kraken, MegaD, Pushdo, Rustock, Srizbi, and Storm. Avoiding blacklisting anonymizing “Tor” (The Onion router) network Multiple C&C servers C&C redundancy mechanism Image source: http://www.hotforsecurity.com /images/zombie_network.jpg There is a chance of blacklisting IP address belonging to UOW if the botlab’s existence is learnt by the botnet owners. To manage this, Botlab routes any bot traffic through anonymised TOR network. TOR is a just a temporary solution but on a long term basis the idea of monitoring agents at secret locations with the hosting provided by organisations that desire to combat botnet threat.

The Botlab Monitoring platform Correlation analyzer Correlate incoming spam with outgoing spam and perform attribution; identify IPs for a given botnet. For spam that cannot be directly attributed, cluster based on source IPs and merge with an attributed set if there is overlap.

Analysis Examine the actions of the bots being run in Botlab – Outgoing Spam. Analyse the incoming spam feed. Analysis obtained out of studying both the outgoing and incoming spam feeds.

Analysis Behavioural characteristics Image source: [https://www.usenix.org/legacy/event/nsdi09/tech/full_papers/john/john_html/figs/six_botnets_summary.png] The authors have monitored over the past 6 months and have deduced these characteristics. Amount of outgoing spam is vastly different. Big variability in send rates suggest these rates might be useful in fingerprinting and distinguishing various botnets. Most the spam botnets have the C&C’s IP address statically configured and Botlab can efficiently pinpoint the IP address of all these servers. If these servers can be found efficiently and shut down then the percentage of world’s spam will reduce considerably. Most of the spam do not change their C&C for a very long time which signifies that they stick with one C&C rather than hopping around. Ideally you would expect them to change their C&C from time to time to avoid detection or re-establish a compromised server.

Analysis Analysis of outgoing spam Outgoing spam feeds Size of mailing lists Using the outgoing spam feeds to estimate the size of the botnets’ recipient lists. A bot periodically obtains a new chunk of recipients from the master and sends spam to this recipient list. On each such request, the chunk of recipients is selected uniformly at random from the spam list. The chunk of recipients received by a bot is much smaller than the spam list size.

Analysis Analysis of outgoing spam Outgoing spam feeds Overlap in mailing lists They also examined whether botnets systematically share parts of their spam lists. Image source: [https://www.usenix.org/legacy/event/nsdi09/tech/full_pahn/john_html/figs/spamlist_overlap.png] Different botnets cover different partitions of the global email list and this give the spammers the benefit of using multiple botnets to get a wider reach.

Analysis Analysis of outgoing spam Outgoing spam feeds Spam subjects Between any two spam botnets, there is no overlap in subjects sent within a given day, and an average overlap of 0.3% during the length of their study. Subject-based classification. Botnets carefully design and hand-tune custom spam subjects to defeat spam filters and attract attention.

Analysis Analysis of Incoming Spam Analysed 46 million spam messages obtained from a 50 day trace. University of Washington’s filtering systems : 89.2% of incoming mail as spam 0.5% of spam contain viruses as attachments. 95% of the spam messages contain HTTP links. 1% contain links to executables.

Analysis Analysis of Incoming Spam Spam campaigns and Web hosting They cluster spam based on the following attributes The domain names appearing in the URLs found in spam. The content of Web pages linked to by the URLs. The resolved IP addresses of the machines hosting this content. Imagesource:[https://www.usenix.org/legacy/event/nsdi09/tech/full_papers/john/john_html/figs/num_distinct_hosts.png] 95% of the spam in their feed contains links. Content of webpage linked to by the URLs is the most useful attribute for characterising campaigns. Domain name clustering -> Graph shows that the number of distinct hostnames is large and increases steadily as spammers typically use newly registered domains. Too fine grained to reveal the true extent of botnet infections. Content clustering-> 80% of spam pointed to just 11 distinct web pages and content of these pages do not change. Conclude that though the content of message that is sent out by spammer is obfuscated, the web pages being advertised is static. Can identify distinct campaigns but cannot attribute them to specific botnets. IP based clustering-> they resolved all the spam URLs and grouped the IP address… they then grouped the spam messages based on the IP clusters. Found that 80% of spam corresponds to 15 IP clusters (57 IPs). Too coarse grained to determine individual botnets. Imagesource:https://www.usenix.org/legacy/event/nsdi09/tech/full_papers/john/john_html/figs/num_messages_per_cluster.png]

Analysis Correlation analysis Spam classification Image source: [https://www.usenix.org/legacy/event/nsdi09/tech/full_papers/john/john_html/figs/spam_classification.png] Image source: [https://www.usenix.org/legacy/event/nsdi09/tech/full_papers/john/john_html/figs/spam_breakdown_per_botnet_over_time.png] To classify each spam message received by UOW- subject based signature is used. Each signature is dyamic- it changes when botnets change their outgoing spam. 6 botnets are responsible for 79% of UOW incoming spam. 35% from Srizbi which is quite a lot.

Analysis Correlation analysis Spam campaigns Image source: [https://www.usenix.org/legacy/event/nsdi09/tech/full_papers/john/john_html/figs/classification_by_campaign_nobold.png] Image source: [https://www.usenix.org/legacy/event/nsdi09/tech/full_papers/john/john_html/figs/hosting_infrastructure_overlap.png] They classified the incoming spam according to spam campaigns. “Other” less common campaigns. Every pair of botnets share some hosting infrastructure which says that the scam hosting is sort of 3rd party service which is used by multiple botnets. (IP based clustering)

Analysis Correlation analysis Recruiting campaigns Image source: [https://www.usenix.org/legacy/event/nsdi09/tech/full_papers/john/john_html/figs/propagation_campaigns.png] They were able to identify incoming spam messages contains links to executables infecting victims with the storm, pushdo and srizbi. Peaks- campaigns launched by the botnets to recruit new victims. They expected spikes to be translate to an increase in number of messages sent by these three but apparently it was not the case. Botnet operator will try to limit the overall spam volume sent out by the whole botnet rather than assigning all available bots to send spam at max rate.

Applications enabled by Botlab Safer web browsing They have found 40K malicious URLs propagated by Srizbi None of them were in malware DBs (Google, etc.) Further Gmail’s spam filtering rate was only 21% for Srizbi. BotLab can generate malware list in real-time; they have developed a Firefox plugin to check against this Spam filtering Developed a Thunderbird extension that compares an incoming email with the list of spam subjects and list of URLs being propagated by captive bots Preliminary results are promising Availability of Botlab Data- http://botlab.org/ Botlab protects users from messages contains dangerous links and social engineering traps by using its real time database which contains malicious links seen in outgoing botnet-generated spam. They have create firefox plugin which checks the links a user visits against the database before navigating.

Critics about the paper "Relying on anti-virus software is also impractical, as these tools do not detect many new malware variants." was mentioned in the paper yet they used anti-virus tools to validate their duplicate binaries elimination procedure. Botnets are continuous evolving and it is going to be quite hard to conduct safe experiments. More ways of monitoring can be done on the application layer. In addition to monitoring attachments and message headers, monitoring the text content of email can also be facilitated for spam monitoring. There are some entities in Botlab that needs human operators. This doesn't completely eradicate the human interference. Would be exciting to see a fully automated tool. Paper can be considered as a basis for building a more powerful tool for spam filtering.

Conclusion Described Botlab, a real-time botnet monitoring system. Behaviour and classification of botnets. My critics on the paper.

Thank you