Download presentation
Presentation is loading. Please wait.
Published byYuliana Sharper Modified over 9 years ago
1
RB-Seeker: Auto-detection of Redirection Botnet Presenter: Yi-Ren Yeh Authors: Xin Hu, Matthew Knysz, Kang G. Shin NDSS 2009 The slides is modified from the author's slides https://ftp.isoc.org/isoc/conferences/ndss/09/slides/10.pdf
2
Outline Motivation of RB ‐ Seeker System Architecture Overview of subsystems Evaluation of results Conclusion
3
Redirection/Proxy Botnet Redirect users to malicious servers o Additional layer of misdirection o Protect mothership servers o Evade URL based detection or IP based black list
4
Motivation of RB ‐ Seeker Botnet is an ideal source for redirection/proxy servers Botnets used for multiple purposes/scams Previous research: detection of C&C channel
5
Overview of RB ‐ Seeker Automatic detection of redirection/proxy botnets Utilizes 3 cooperating subsystems Behavior ‐ based detection Quick identification of aggressivebotnets (FP < 0.01%) o Advertise manyIPs per query o Change IPs very often (short TTL) Accurate identification of stealthybotnets o Advertise fewIPs per query o Change IPs more slowly (very small TTL, closely monitored
6
System Architecture
8
SSS: Spam Source Subsystem Redirection/proxy botnet are commonly used by spam/phishing campaigns SSS exploits this close relatrionship o Real time collection of spam emails: > 50,000 monthly
9
SSS: Spam Source Subsystem Extract embedded URLs from message bodies Probe extracted URLs to identify redirection URL links Domains added to redirection domain database
10
System Architecture
11
NAS: NetFlow Analysis Subsystem Use NetFlow because: o Inspecting packet contents incurs too much overhead o Privacy concerns Spammers send image ‐ or PDF ‐ based emails o Evade content ‐ based filtering User redirected to RBnet by clicking on malicious webpage Inspecting each email not always possible o Privacy concerns/laws
12
NAS: NetFlow Analysis Subsystem NetFlow: core router on campus Looks for suspicious redirection attempts o Without analyzing packet contents
13
NAS: NetFlow Analysis Subsystem Sequential Hypothesis testing on: o Flow size, inter ‐ flow duration, and flow duration
14
NAS: NetFlow Analysis Subsystem Identifies IPs participating in redirection o Correlation engine uses DNS logs to add domains participating in redirection to redirection domain db
15
NAS: NetFlow Analysis Subsystem Redirection: obtained from SSS, servers identified as redirection Normal: normal web browsing over 2 days (removing redirection)
16
System Architecture
17
a ‐ DADS: active DNS Anomaly Detection Subsystem Actively performs DNS queries on domains in redirection domain db Uses CDN Filter to remove Content Delivery Networks o CDNs behave similarly to redirection/proxy botnets o Recursively removes
18
a ‐ DADS: active DNS Anomaly Detection Subsystem IP Usage: o RBnets will accrue more unique IPs over time o RBnets will have more unique IPs per valid query Reverse DNS names with “bad words” o e.g., broadband, cable, comcast, charter, etc… AS count o Number of different ASes the IPs belong to o RBnets consist of home computers scattered geographically
19
a ‐ DADS: active DNS Anomaly Detection Subsystem Applies 2 ‐ tier linear SVM on remaining domains o Trained: 124 valid, 18 aggressive, 10 stealth o 10 ‐ fold cross validation on multiple classifiers knn, decision tree, naïve Bayesian, various SVMs and kernel functions
20
a ‐ DADS: active DNS Anomaly Detection Subsystem SVM-1: o detects Aggressive RBnets based on 2 valid queries o unique IPs, num ASes, DNS “bad words”
21
a ‐ DADS: active DNS Anomaly Detection Subsystem
22
SVM-2 o detects Stealth RBnets using a week of DNS queries o unique IPs, num ASes
23
a ‐ DADS: active DNS Anomaly Detection Subsystem
24
Evaluation of Results SSS and NAS identified 91,600+ suspicious domains over 2 month period a ‐ DADS CDN Filter o Removed 5,005 CDN domains o Recursion 16.8% increase in identified CDN domains (13.1% in IPs) o Similar technique for valid domains reduced this to 35,000+ domains to be monitored
25
Evaluation of Results
26
Aggressive RBnets: Redirection vs. Proxy Botnets
27
Stealth RBnets
28
Evaluation of Results FFSN detector: o Detected 124 of the 125 Aggressive RBnets o 1 FP: same as ours (mozilla.org) o Missed all the Stealth RBnets
29
Conclusion Designed and implemented system for detecting redirection/proxy botnets Uses network detection techniques o multiple data sources readily available to enterprise network environments Behavior ‐ based detection works despite use of C&C protocol or structure Capable of detecting Aggressive and Stealthy RBnets Automatic detection with low false positives (< 0.01%)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.