botnet_detection

Download Report

Transcript botnet_detection

Botnet Dection system
Introduction
 Botnet problem
 Challenges for botnet detection
What Is a Bot/Botnet?
 Bot
 A malware instance that runs autonomously and
automatically on a compromised computer (zombie)
without owner’s consent
 Profit-driven, professionally written, widely
propagated
 Botnet (Bot Army): network of bots controlled by
criminals
 Definition: “A coordinated group of malware
instances that are controlled by a botmaster via some
C&C channel”
 Architecture: centralized (e.g., IRC,HTTP), distributed
(e.g., P2P)
 “25% of Internet PCs are part of a botnet!” ( - Vint
Cerf)
Botnets are used for …






All DDoS attacks
Spam
Click fraud
Information theft
Phishing attacks
Distributing other malware, e.g.,
spywarePCs are part of a botnet!” ( Vint Cerf)
Challenges for Botnet Detection
 Bots are stealthy on the infected machines
– We focus on a network-based solution
 Bot infection is usually a multi-faceted and
multiphased process
– Only looking at one specific aspect likely to fail
 Bots are dynamically evolving
– Static and signature-based approaches may not be
effective
 Botnets can have very flexible design of C&C
channels
– A solution very specific to a botnet instance is not
desirable
Roadmap to three Detection
Systems
 Bothunter: regardless of the C&C
structure and network protocol, if
they follow pre-defined infection live
cycle
 Botsniffer:works for IRC and http, can
be extended to detect centralized
C&C botnets
 Botminer:independent of the protocol
and structure
BotHunter system-detection on single
infected client
 Detecting Malware Infection Through
IDS-Driven Dialog Correlation
 Monitors two-way communication flows
between internal networks and the Internet
for signs of bot and other malware
 Correlates dialog trail of inbound intrusion
alarms with outbound communication
patterns
Bot infection case study:
Phatbot
Dialog-based Correlation
 BotHunter
employs an
Infection
Lifecycle
Model
to detect host
infection
behavior
Bothunter Architecture
Evaluation
 Example: http://www.cyberta.org/releases/malwareanalysis/public/2009-01-13-public/
BotSniffer-detection on centralized
C&C botnets(IRC,HTTP)
 WHY we will focus on C&C?
 C&C is essential to a botnet
– Without C&C, bots are just discrete,
unorganized infections
 C&C detection is important
– Relatively stable and unlikely to change
within botnets
– Reveal C&C server and local victims
– The weakest link
Botnet C&C Communication
Example
Botnet C&C: Spatial-Temporal
Correlation and Similarity
BotSniffer Architecture
Correlation Engine
 Based on two properties
 Response crowd
– a set of clients that have
(message/activity) response behavior
-A Dense response crowd: the fraction of
clients with message/activity behavior
within the group is larger than a threshold
(e.g., 0.5).
 A homogeneous response crowd
– Many members have very similar
responses
Evaluation
Why Botminer?
 Botnets can change their C&C content
(encryption, etc.), protocols (IRC, HTTP,
etc.),structures (P2P, etc.), C&C
servers, dialog models
 So bothunter, botsniffer systems may
be evaded. We need to consider more
Revisit Botnet Definition
 “A coordinated group of malware
instances that are controlled by a
botmaster via some C&C channel”
 We need to monitor two planes
– C-plane (C&C communication plane):
“who is talking to whom”
– A-plane (malicious activity plane):
“who is doing what”
C-Plane clustering
 What
characterizes a
communication
flow (Cflow)
between a local
host and a
remote service?
– <protocol, srcIP,
dstIP, dstPort>
A-plane clustering
Cross-clustering
 Two hosts in the same A-clusters and
in at least one common C-cluster are
clustered together
Botminer Architecture
Evaluation Data
Evaluation Result(FP)
Evaluation Result(Detection Rate)
Botnet Detection Systems
summary
 Bothunter: Vertical Correlation.
Correlation on the behaviors of single
host.
 Botsniffer: Horizontal Correlation. On
centralized C&C botnets
 Botminer: Extension on Botsniffer, no
limitations on the C&C types.
Thank you!
Questions?