Roadrunners_Botnet
Download
Report
Transcript Roadrunners_Botnet
BOTNET
Kumar Mukherjee
Mike Ladd
Nazia Raoof
Rajesh Radhakrishnan
Bret Walker
Botnet Background
• network of infected hosts, under
control of a human operator
(botmaster)
•
tens of thousands of nodes
• victims claimed by remote exploits
Defining Characteristic
• use of Command & Control
(C&C) channels
• used to disseminate
botmaster's commands
Uses of Botnets
Spam
ID Theft
Piracy
DDOS
•
•
•
•
•
•
Ex. 1000 bots w/ 128KBit/s connection >
many corporate systems
IP distribution makes filtering difficult
Lifecycle of Botnet Infection
Why IRC?
• IRC designed for both point-to-point
and point-to-multipoint
communication
•
one-to-one, or one-to-group chat
• flexible, open-source protocol
Bot-to-IRC Communication
• authenticate to IRC server
via PASS message
• C&C channel authentication
• Botmaster authenticates to
bot population to issue
commands
Bot-News: Kraken
•
•
•
•
400,000+ nodes
50+ Forture 500 companies
2x the size of ‘Storm’
Used for spam (bots sending
500,000+ messages daily)
Bot-News: Kraken
• Designed as image file
• Regular updates to binary
• C&C communication via
customized UDP/TCP
• Able to generate new domain
names if C&C is disabled
Further Background
•
http://www.honeynet.org/papers/bots/
•
http://www.wired.com/wired/archive/14.11
/botnet_pr.html
•
http://en.wikipedia.org/wiki/Storm_botnet
Methodology: Malware Collection Phase
•Collection of as many bot binaries as possible
•Distributed darknet used
•14 nodes access the darknet
•Modified version of Nepenthes (a Malware collection framework) platform:
-- Mimics the replies generated by vulnerable services in order to collect
the first stage exploit or shellcodes
-- Generate URL that are to retrieve binaries
•Honeynet is used to compliment Nepenthes in order to catch exploits
missed.
-- Honeypots are unpatched Windows XP VM’s
-- Honeypots become infected and compared later to a clean Windows
XP image.
-- Infected Honey pots are also allowed to sustain IRC connections until
VM gets reimaged
Methodology: Data Collection Architecture
Methodology: Gateway
Darknet routing to various parts of the internal network
Cross-infection prevention among honeypots
configuring honeypots in separate VLANSs
Termination of traffic across VLANs and gateways
Monitor and Analyze the malware traffic for infections
Dynamic rule insertion
block further inbound attack traffic towards honeypot that is infected
single malware instance honeypots due to lack of resources
Other funcitons
Triggering re-imaging with clean Windows images
pre-filtering and control during downloads
local DNS to resolve queries
Methodology: Defense Points
With the methodology we now have the
ability to model other types of bots.
Although methodology utilized Windows
OS, we can model it for other platforms
The methodology analyzes all aspects
of bots and botnets.
A multifaceted approach to
understanding the Botnet
Phenomenon
Results - I
Overall traffic
27% of total traffic are from
known botnet spreaders
73% of traffic includes traffic
from unknown botnet spreaders
60% of malicious binaries
were IRC bots
Only handful were HTTP
based
Authors concerns about botnets
spread are justifiable.
Traffic directed to vulnerable ports
76% of traffic targeted to
vulnerable ports are from
botnet spreaders
Malicious traffic to
vulnerable ports cannot be
differentiated between
botnet and non-botnet
traffic
How much of total traffic was directed
to vulnerable ports is desired.
Peak traffics
90% of total traffic during
the peak time targets ports
used by botnet spreaders
70% of traffic during the
peak time sent shell exploits
similar to those sent by
botnet spreaders.
Probed servers
Probed Servers
At least one botnet activity
No botnet activity
11% of probed servers had
at least one botnet activity
29% of probed .com
servers had at least one
cache hit
95% of probed .cn servers
had at least one cache hit.
Botnet Types
Total botnets captured 192
34 of 192 botnets captured
were type I botnets (worm-like)
158 of them were type II
Botnets and Network types
When channel was set to topic
80% of targeted scanning was aimed at
CLASS A networks
89% of localized scanning was aimed at
CLASS B networks
When channel was set to botmaster commands
88% of targeted scanning was aimed at
CLASS A networks
82% of localized scanning was aimed at
CLASS B networks
DNS & IRC tracker views
Both DNS & IRC tracker views demonstrated three
type of growth pattern:
semi exponential growth
Staircase type growth
Linear growth
Semi-exponential growth exhibited random
scanning activity
Staircase type growth exhibited intermittent activity
Linear growth pattern exhibit time scoped activity
Key Points based on results
Botnets pose serious threats to the internet
Major contributor of unwanted traffic on the internet
IRC is the dominant protocol used in the Botnet
communications
Botnets have achieved a high degree of sophistication
in terms of self-protection mechanisms and modular
package structures
Effective Botnet Sizes
Footprint Size vs. Effective Size
• Significantly smaller
• At most 3,000 bots online w/ networks of
up to 10k bots
Smaller effective sizes limit certain activities:
• Timely commands
• DDoS attacks
Effective botnet sizes fluctuate with timezone
changes
Lifetime
Botnets have relatively long lifetimes
• Even after they’re shut down, live on average for 47
days
• 84% of servers up longer than the 3 month survey
• 55% of those botnets still scanning the Internet
• If taken offline, able to be brought back online quickly
Bots do not stay long on IRC channels
• Average time ~ 25 minutes
• 90% stayed less than 50 minutes
• High churn rate
Botmasters spend great lengths of time managing and
monitoring their botnets
Botnet Software Dissection
49% disable firewall and anti-virus software
Many run inetd, which is used to identify the user of a
computer. Used to verify bots joining an IRC channel
40% execute a System Security Monitor command,
securing client machines from further exploitation
Average of 15 exploits per botnet binary -- bots can
infect machines in a variety of ways
Windows XP constitutes 82.6% of observed exploited
hosts, with 99% of those hosts running SP1 or less
Insight from an “Insider’s View”
Botmasters range in skill level
Botmasters:
1. Share information about networks
2. Tweak their bots to use the network efficiently
3. Prune misbehaving bots and exploit “super-bots”
Botmasters are probably leasing their bots or attacking
each other
Most commands (75%) are for control, scanning and
cloning. 7% are for attacking.
Related Work
Honeynet group was the first to do an informal study
Freiling et al. on countering certain classes of DDoS attacks
Cooke et al. on prevalence of botnets by measuring elapsed
time before an un-patched system was infected by a botnet
Barford et al. on an in-depth anaylsis on bot software
sourcecode
Vrable et al. presented Potemkin, a scalable virtual honeynet
system
Cui et al. presented RolePlayer—a protocol independent
lightweight responder that tries to overcome some of these
limitations by reverting to a real server when the responder fails
to produce the proper response
Dagon et al. provide an initial analytical model for capturing the
spreading behavior of botnets.
Conclusion
Long presence and few formal studies
One of the most severe threats to the Internet.
Our knowledge of botnet behavior is incomplete
To improve our understanding, we present a composite view
Results show that botnets are a major contributor to the overall
unwanted traffic on the Internet
Botnet scanning behavior is markedly different from that seen by
autonomous malware (e.g., worms) because of its manual
orchestration
IRC is still the dominant protocol used for C&C communications
Use is adapted to satisfy different botmasters’ needs
Botnet footprints are usually much larger
Graybox testing technique enabled us to understand the level of
sophistication reached by bot software today