PowerPoint - ShareCourse
Download
Report
Transcript PowerPoint - ShareCourse
Paper Reading:
Reporter: Shao-Yu Peng(彭少瑜)
Date: 2013/10/28
Outline
•
•
•
•
•
•
•
•
Purpose
Introduction
Fluxing features of botnets
Features detection techniques
Comparison and evaluation
Fluxing mitigation
Future work
Conclusion
2
/33
Purpose
• Summarized and classified the latest botnet fluxing features
and detection techniques.
• Compared and Evaluated the surveyed techniques against
multiple criteria.
3
/33
Introduction
• Botnet: A group of computers(bots/zombies) which controlled
by the botmaster.
• In recent years, fluxing techniques have been applied to evade
detection.
4
/33
Fluxing Features of botnet
5
/33
Fluxing features of botnets
• Fluxing methods are used to evade detected by hiding the
domain-IP mappings.
• In our survey, we focus on two advanced mechanisms:
1. Fast flux(FF):
a set of IP addresses->
a unique domain name
2. Domain flux(DF):
a set of domain names->
a unique IP address
6
/33
Fast Fluxing, RRDNS and CDNs
• Ways to distribute loads of online services:
1. RRDNS(Round-robin DNS):
Round-robin to response DNS requests.
2. CDNs(Content Distribution Networks):
Computes the nearest servers to response.
3. Fast fluxing:
Same idea but change entries more rapidly.
7
/33
Measuring and Detecting Fast-Flux Service Network
Thorsten Holz
Fast Fluxing Network
• Characters:
Short TTLs, share one large IP pools…etc.
• Categories:
1. Single flux
2. Double flux
8
/33
Fast Fluxing Network
9
/33
http://www.honeynet.org/files/images/web-diagram.gif
https://job.honeynet.org/files/images/dns-diagram.gif
Domain Fluxing Network
• Server and bots generates domain names through same
algorithm(consistently).
• Example:
Torpig
10
/33
Torpig:Bot
Domain generation
algorithm
Current week, year
Domain name 1
success
Domain generation
algorithm
master
failed
Domain name 2
Current day
success
failed
Configuration file
Hard-coded
domain names
11
/33
Features detection techniques
Fast fluxing
12
/33
Detection techniques
Measuring and Detecting Fast-Flux Service Networks
FF detection 1:
• Holz et al.:
• Distinguish btw normal network and fast fluxing network, and
• score a networks by:
1. #of IP-domain mappings in all DNS lookups,
(more->higher prob. to be botnet)
2. #of nameserver records in one domain lookup,
(more->higher prob. to be botnet)
3. #of autonomous system in all IP-domain pairs
(more->higher prob. to be botnet)
• Limitation on detecting FFSN(benign) & FFAN(malicious)
13
/33
Detection techniques
Collaborative Detection of Fast-Flux Phishing Domains
FF detection 2:
• Zhou et al.:
1. To speed up Holz method
2. Improvement speed by combining results:
(1) From different DNS servers;
Build and share one suspicious IP address list.
(2) From different suspect FF domains.
Compare responses from domains to speed up confirmation.
14
/33
(1)
Switch Address blacklist
Server 1
Server 3
Switch Address blacklist
Switch Address blacklist
Server 2
Each server: List’ = List 1 ∪ List2 ∪List3
(2)
Response 1
Unknown
domain
Response 4
Server
FF domain 1
Response 2
FF domain 2
Response 3
FF domain 3
List’= Response 1∪ Response 2 ∪ Response 3
15
/33
Detection techniques
Real-time detection of as flux service networks
FF detection 3:
• Caglayan et al.:
1. Monitor the DNS of a website by minutes.
2. Sensors, FF monitor/database, FFM classifier
3. Sensors monitor parameters including TTL…etc.
and store into database.
4. Classifier evaluate a website with the analytic
data in database.
16
/33
FF domain
FF domain
FF monitors
FFM database
Sensor
Classifier
Unknown domain
Unknown Website
with rapidly changed IP
17
/33
Detection techniques
Detecting malicious flux service networks through
passive analysis of recursive DNS traces
FF detection 4:
• Perdisci et al.:
• Detect malicious ones from FFSN.
1. Monitoring FFSN traffic with a pre-filter by four features:
(1) Short TTL,
(2) The change rate of the set of resolved IPs returned ,
(3) A large number of resolved IPs,
(4) Resolved IPs scattered across different networks.
2. Clustered domains with high relations
3. Classified domains according to the resolved IP address
4. Build a network classifier based on above data.
FFSN=Fast-flux service network
FFAN=Fast-flux attack network
18
/33
Detection techniques
Fast-flux attack network identification based on agent lifespan
FF detection 5:
• Yu et al.
• Distinguish FFSN and FFAN by agent lifespan.
1. Send request once per hour during 24 hours.
2. FFSN: 24/7 available; FFAN: unpredictable.
3. AOR(average online rate/24 hours)
4. MAR(minimum available rate/history record)
5. Detector judges btw FFAN and FFSN by AOR
and MAR record by monitors.
19
/33
Features detection techniques
Domain fluxing
20
/33
Detection techniques
Your botnet is my botnet: analysis of a botnet takeover
DF detection 1:
• Stone-Gross et al.:
1. To determine the size of a botnet
2. Research on real world botnet –Torpig
3. Register the .com and .net domain which would
be used by the botnet.
4. Log requests and record network traffic.
5. Determine the size by counting unique nodes.
21
/33
Detection techniques
Beyond blacklists: learning to detect malicious web sites from suspicious URLs
DF detection 2:
• Ma et al.:
• Distinguish domain fluxing network and normal network.
1. URL analysis based.
2. Lexical features and host-based features
(1) Lexical:
URL length, #of dots in URL, bag-of-words…etc.
(2) Host-based:
IP, domain name, location, connection speed…
3. Independent of content and structure.
4. Combination of all features -> highest accuracy.
22
/33
Detection techniques
Identifying suspicious activities through DNS failure graph analysis
DF detection 3:
• Jiang et al.:
• Distinguish domain fluxing network and normal network, and
classified.
1. Failed DNS queries come mainly from malicious activities.
2. DNS failure graph
(bots with same DGA will create dense failure graph)
4. Analyze the graph structure and refer to domain name
blacklists.
23
/33
Detection techniques
Phishnet: Predictive blacklisting to detect phishing attacks
DF detection 4:
• Prakash et al.:
• Evaluation based on blacklists.
• Since Black listing method needed to exactly match URL, it is easy to evade.
• Model: Score new URL against an existing blacklist with 5 heuristics:
1. Replace the top-level domains
(4)
(3) ex:
2. IP address equivalence
www.abc.com/online/singin/ebay?XYZ
www.abc.com/online/singin/ebay.htm
(Same IP->change dir/path)
www.xyz.com/online/singin/paypal?ABC
www.xyz.com/online/singin/paypal.htm
Change query->
filename->
3. Directory structure similarity
www.abc.com/online/singin/ebay?ABC
www.abc.com/online/singin/paypal.htm
(different IP, similar path-> change filename)
www.xyz.com/online/singin/paypal?XYZ
www.xyz.com/online/singin/ebay.htm
4. Query string substitution
(5) ex:
(Same structure->change query)
www.abc.com/online/singin/ebay .htm
5. brand name equivalence
Change brand name->
www.abc.com/online/singng/yahoo.htm
24
/33
Detection techniques
Detecting algorithmically generated malicious domain names
DF detection 5:
• Yadav et al.
• Distinguish DF domain names from normal domain names.
1. Identify domain names generated by
algorithm by spelling or pronounceable features.
2. Group DNS queries by TLD/IP-address
3. For each group, use Jaccard index to
characterize alphanumeric distribution.
25
/33
Suspicious URL, ex:
ickoxjsov.botnet.com
Break into bigrams
Database of
non-malicious bigrams
Ic,ck,ko,ox,xj,js,so,ov
Subset with 75% of bigrams
ex:
the quick brown fox jump sover the lazy dog
Average JI
Calculate
JI = (A∩B)/(A∪B)
ex:
6/(8+35-6) = 0.16
26
/33
Comparison between techniques
27
/33
Comparison between techniques
• DF:
• FF:
• 4 criteria:
• 5 criteria:
1. Accuracy
1. Real-time
2. Speed
2. Accuracy
3. Distinguish FFSN VS. FFAN 3. Passive or active
4. Mining based
4. Speed
5. Mining based
Above these criteria,
Is this meaningful to compare the algorithms with different goals?
28
/33
A Survey on Latest Botnet Attack and Defend
dash line: not discussed or unclear in a paper
29
/33
Fluxing Mitigation
• Need collaboration of both registers and ISPs.
• Blacklisting-related method is almost the only
way.
30
/33
Future directions
• Data mining can be used widely to extract features.
• Graph spectra can be employed to study botnets.
• How to get the trust of remote owners which has
compromised computers.
• Predict botnet writers new developed strategies.
31
/33
Conclusion
• Advantages:
Survey on latest fluxing detection techniques of botnet.
• Drawbacks:
The meaning of comparison btw algorithms with different
purposes is vague.
32
/33
Thank you for listening