BotNet Detection Techniques
Download
Report
Transcript BotNet Detection Techniques
BotNet Detection Techniques
By
Shreyas Sali
Course: Network Security (CSCI – 5235)
Instructor: Dr. T Andrew Yang
Outline
Introduction to Botnet
Botnet Life-cycle
Botnet in Network Security
Botnet Uses
Botnet Detection
Preventing Botnet Infection
Botnet Research
Conclusion
References
Page 2
Introduction to Botnet
A Botnet is a network of compromised
computers under the control of a remote attacker.
Botnet Terminology
Bot Herder (Bot Master)
Bot
Bot Client
IRC Server
Command and Control Channel (C&C)
Page 3
Introduction to Botnet (Terminology)
IRC Server
IRC Channel
Code Server
Bot Master
IRC Channel
C&C Traffic
Updates
Attack
Victim
Bots
Page 4
Botnet Life-cycle
Page 5
Botnet Life-cycle
Page 6
Botnet Life-cycle
Page 7
Botnet Life-cycle
Page 8
Botnet In Network Security
Internet users are getting infected by bots
Many times corporate and end users are trapped in botnet attacks
Today 16-25% of the computers connected to the internet are
members of a botnet
In this network bots are located in various locations
It will become difficult to track illegal activities
This behavior makes botnet an attractive tool for intruders and
increase threat against network security
Page 9
Botnet is Used For
Page 10
Bot Master
How Botnet is Used?
Distributed Denial of Service (DDoS) attacks
Sending Spams
Phishing (fake websites)
Addware (Trojan horse)
Spyware (keylogging, information harvesting)
Click Fraud
So It is really Important to Detect this attack
Page 11
Botnet Detection
Two approaches for botnet detection based on
Setting up honeynets
Passive traffic monitoring
Signature based
Anomaly based
DNS based
Mining based
Page 12
Botnet Detection: Setting up Honeynets
Windows Honeypot
Honeywall Responsibilities:
DNS/IP-address of IRC server and port number
(optional) password to connect to IRC-server
Nickname of bot
Channel to join and (optional) channel-password
Page 13
Botnet Detection: Setting up Honeynets
Bot
Sensor
1. Malicious Traffic
3. Authorize
Page 14
2. Inform bot’s IP
Bot Master
Botnet Detection: Traffic Monitoring
Signature based: Detection of known botnets
Anomaly based: Detect botnet using following
anomalies
• High network latency
• High volume of traffic
• Traffic on unusual port
• Unusual system behaviour
DNS based: Analysis of DNS traffic generated by
botnets
Page 15
Botnet Detection: Traffic Monitoring
Mining based:
• Botnet C&C traffic is difficult to detect
• Anomaly based techniques are not useful
• Data Mining techniques – Classification, Clustering
Page 16
Botnet Detection
Determining the source of a botnet-based attack is challenging:
Traditional approach:
Every zombie host is an attacker
Botnets can exist in a benign state for an arbitrary amount of
time before they are used for a specific attack
New trend:
P2P networks
Page 17
Preventing Botnet Infections
Use a Firewall
Patch regularly and promptly
Use Antivirus (AV) software
Deploy an Intrusion Prevention System (IPS)
Implement application-level content filtering
Define a Security Policy and
Share Policies with your users systematically
Page 18
Botnet Research
Logging onto herder IRC server to get info
Passive monitoring
Either listening between infected machine and
herder or spoofing infected PC
Active monitoring: Poking around in the IRC server
Sniffing traffic between bot & control channel
Page 19
Botnet Research: Monitoring Attacker
Infected
IRC
Researcher
Page 20
Herder
Conclusion
Botnets pose a significant and growing threat against cyber
security
It provides key platform for many cyber crimes (DDOS)
As network security has become integral part of our life and
botnets have become the most serious threat to it
It is very important to detect botnet attack and find the solution
for it
Page 21
References
B. Saha and A, Gairola, “Botnet: An overview,” CERT-In White PaperCIWP-2005-05, 2005
Peer to Peer Botnet detection for cyber-security: A data mining approach - ACM Portal
Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham
A Survey of Botnet and Botnet Detection Feily, M.; Shahrestani, A.; Ramadass, S.;
Emerging Security Information, Systems and Technologies, 2009. SECURWARE '09. Third
International Conference on Digital Object Publication Year: 2009 , Page(s): 268 – 273
IEEE CONFERENCES
Honeynet-based Botnet Scan Traffic Analysis Zhichun Li, Anup Goyal, and Yan Chen
Northwestern University, Evanston, IL 60208
Detecting Botnets Using Command and Control Traffic AsSadhan, B.; Moura, J.M.F.;
Lapsley, D.; Jones, C.; Strayer, W.T.; Network Computing and Applications, 2009. NCA
2009. Eighth IEEE International Symposium. Publication Year: 2009 , Page(s): 156 – 162
IEEE CONFERENCES
Spamming botnets: signatures and characteristics Yinglian Xie, Fang Yu
Page 22
Page 23
Page 24