Protecting Web 2.0 Services from Botnet Exploitations

Download Report

Transcript Protecting Web 2.0 Services from Botnet Exploitations

Protecting Web 2.0 Services from
Botnet Exploitations
Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second
Nguyen H Vo, Josef Pieprzyk
Department of Computing, Macquarie University, Australia
Reporter: 游明軒
Outline
 Introduction
 API Verifier
 Security analysis
 Conclusion & discussion
Introduction
 Web 2.0
 Blog, RSS, Social networking sites, etc.
 Web based bots
 Use web 2.0 service as a C&C channel
 Instead of traditional bots sitting on IRC channel, the connections between web based
bots are not permanent
 The authors implement a tool, API Verifier, to detect web based bots
Web based botnet
Botnet detection methods
 Analysis of network traffic flows
 Network traceback
 Honeypots
 These techniques do not cover web based botnet because the bot activities
are indistinguishable and legitimate users and websites
API Verifier
 Motivation
 Because a web based bot must use Web 2.0 service APIs, API Verifier is
implemented to verify whether a user is a person or a bot
 Approach
 Completely Automated Public Turing test to tell Computers and Humans Apart
(CAPTCHA)
 MAC address as identifier
API Verifier - architecture
 Components
 API Verifier Client
 API Verifier Server
API Verifier - functionality
 Authentication
 User profile
 Session key
 Encrypt MAC address
 Be generated independently each time when an API call is made
 Permanent MAC address
 CAPTCHA verification
API Verifier – work flow
Security analysis
 Spoofing MAC address
 API Verifier Client fraud
 DDoS attack
 By-passing CAPTCHA
verification
Spoofing MAC address
 Change MAC address (1a)
 Hijacking OS kernel and modifying the OS communication with NIC is expensive
 Cause the high risk of being detection
 Change the encrypted MAC address (1b)
 session key is generated each API call and is a combination
of the secret key and a time token
API Verifier Client fraud
 It is hard to recover the secret key of the API Verifier Client
 AES 128-bit
 it is hard to disassemble the API Verifier Client
 Obfuscation technique
DDoS attack
 Set limit on the number of verification attempts
 Finite times to solve CAPTCHA
 A time interval for next MAC address verification
By-passing CAPTCHA verification
 Analyze the picture and extract characters on the image
 send the image to attacker to solve it
System short coming
 API Verifier cannot get permanent MAC address on virtual machine
Conclusion & discussion
 Propose a novel approach against web based botnet. The main concept is
to identify whether a user is a person or a bot
 Implement a system, API Verifier, to detect the bots before they access to
web service API
 For security, the authors consider all possible attacks and defend
 DDoS attack issue still exists
 Lack for a convincing proof of statistics in real world
Thanks