Networking, Sensing and Control (ICNSC), 2013 10th IEEE International Conference on 102064535 黃川洁 1/25.

Slides:



Advertisements
Similar presentations
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Advertisements

Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
An Introduction of Botnet Detection – Part 2 Guofei Gu, Wenke Lee (Georiga Tech)
Botnets. Botnet Threat Botnets are a major threat to the Internet because: Consist of a large pool of compromised computers that are organized by a master.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
A Hierarchical Hybrid Structure for Botnet Control and Command A Hierarchical Hybrid Structure for Botnet Control and Command Zhiqi Zhang, Baochen Lu,
Taxonomy of Botnets Team Mag Five Valerie Buitron Jaime Calahorrano Derek Chow Julia Marsh Mark Zogbaum.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Botnet Dection system. Introduction  Botnet problem  Challenges for botnet detection.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
Threat infrastructure: proxies, botnets, fast-flux
Host Intrusion Prevention Systems & Beyond
2009/9/151 Rishi : Identify Bot Contaminated Hosts By IRC Nickname Evaluation Reporter : Fong-Ruei, Li Machine Learning and Bioinformatics Lab In Proceedings.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology USENIX Security '08 Presented by Lei Wu.
G53SEC 1 Network Security Hijacking, flooding, spoofing and some honey.
Introduction to Honeypot, Botnet, and Security Measurement
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
An Evaluation model of botnet based on peer to peer Gao Jian KangFeng ZHENG,YiXian Yang,XinXin Niu 2012 Fourth International Conference on Computational.
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
BotNet Detection Techniques By Shreyas Sali
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang, and.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
11 Automatic Discovery of Botnet Communities on Large-Scale Communication Networks Wei Lu, Mahbod Tavallaee and Ali A. Ghorbani - in ACM Symposium on InformAtion,
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Jeong, Hyun-Cheol. 2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
A Multifaceted Approach to Understanding the Botnet Phenomenon Authors : Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Computer Science.
1 An Advanced Hybrid Peer-to-Peer Botnet Ping Wang, Sherri Sparks, Cliff C. Zou School of Electrical Engineering & Computer Science University of Central.
Appear in IEEE TDSC 2008 Presented by Wei-Cheng Xiao.
Nullcon Goa 2010http://nullcon.net Botnet Mitigation, Monitoring and Management - Harshad Patil.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets,
Exploiting Temporal Persistence to Detect Covert Botnet Channels Authors: Frederic Giroire, Jaideep Chandrashekar, Nina Taft… RAID 2009 Reporter: Jing.
Botnets Usman Jafarey Including slides from The Zombie Roundup by Cooke, Jahanian, McPherson of the University of Michigan.
BotCop: An Online Botnet Traffic Classifier 鍾錫山 Jan. 4, 2010.
A Multifaceted Approach to Understanding the Botnet Phenomenon Aurthors: Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Publication: Internet.
Speaker:Chiang Hong-Ren An Investigation and Implementation of Botnet Detection Schemes.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Presented by D Callahan.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
PEER TO PEER BOTNET DETECTION FOR CYBER- SECURITY (DEFENSIVE OPERATION): A DATA MINING APPROACH Masud, M. M. 1, Gao, J. 2, Khan, L. 1, Han, J. 2, Thuraisingham,
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Some Great Open Source Intrusion Detection Systems (IDSs)
CompTIA Security+ Study Guide (SY0-401)
A lustrum of malware network communication: Evolution & insights
Speaker : YUN–KUAN,CHANG Date : 2009/11/17
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
CompTIA Security+ Study Guide (SY0-401)
Intrusion Prevention Systems
Chapter 4: Protecting the Organization
Presentation transcript:

Networking, Sensing and Control (ICNSC), th IEEE International Conference on 黃川洁 1/25

Outline INTRODUCTION BOTNET LIFE CYCLE BOTNET ARCHITECTURES DETECTION OF BOTNET ATTACK PREVENTION & MITIGATION OF BOTNET FUTURE PROSPECTS CONCLUSION 2/25

BOTNET is a large network of compromised computers used to attack other computer systems for malicious intent. NetBus and BackOrifice2000 several techniques for BOTNET attack detection data mining, fuzzy logic based on some statistical data, anomaly based, structure based INTRODUCTION-1 3/25

INTRODUCTION-2 Testbed environment should focus on following requirements: The ability to test with a variability of bot types (both known and unknown) deploy on variety of standard operating system. To be capable of conducting experiments in a secure mode such as one that poses no threat to the greater internet To be able to form a flexible and realistic botnet technologies and configuration. To perform and conduct experiments at scale and under realistic conditions. 4/25

BOTNET LIFE CYCLE-1 In start it primarily infects other computer. Then injects small code File Transfer Protocol (FTP), Hypertext Transfer Protocol (HTTP), Peer to Peer (P2P), and combination of HTTP and P2P (HTTP2P) etc. When user connects to internet code is executed automatically to establish a connection in which it connects to Command & Control (C&C) server. 5/25

BOTNET LIFE CYCLE-2 Command and control the zombie computers through C & C server. To remain transparent and active by using Dynamic Domain Name Server (DNS) and keeping zombie updated and in existence to maintain and use them accordingly. 6/25

BOTNET ARCHITECTURES Centralized Botnet Architecture Peer to Peer (P2P) Botnet Architecture Hybrid Botnet Architecture Hypertext Transfer Protocol Peer to Peer (HTTP2P) Botnet Architecture 7/25

Centralized Botnet Architecture 8/25

Peer to Peer (P2P) Botnet Architecture 9/25

Hybrid Botnet Architecture 10/25

Hypertext Transfer Protocol Peer to Peer (HTTP2P) Botnet Architecture P2P has threat of Sybil attacks Sybil Attack: 是一種攻擊者透過大量匿名實體增加不成比例的巨大影響, 來破壞 P2P 網路的信譽系統。 (TWCERT/CC) Combined HTTP and P2P Become harder to be detected by to bypass firewall and client server architecture Cipher the message While the Soldier-Bot does not contact dynamically to Supervisor-Bot or other soldier-bots rather it waits for a call from its supervisor. 11/25

Centralized Botnet Architecture Peer to Peer (P2P) Botnet Architectur e Hybrid Botnet Architecture Hypertext Transfer Protocol Peer to Peer (HTTP2P) Botnet Architecture 隱密性低高高高 加密無有有有 管理容易困難 偵測容易較困難 困難 阻絕容易較困難 困難 monitoring and healing (for Supervisor- bot ) 容易困難較容易 12/25

DETECTION OF BOTNET ATTACK Structured Based Detection Signature Based Detection DNS Based Detection Behavior Based Detection Anomaly Based Detection Communication Pattern of Botnet 13/25

Signature Based Detection The first and most widely Only successful for already known Botnets Two way list of IRC nicknames and applied n-gram analysis IP addresses Other system Honeynet, Honeypots, and Snort good cost and without false positives 14/25

DNS Based Detection-1 DNS queries In ideas were given to detect domain names by unusually high or temporary intense DDNS queries. In following year, abnormally recurring NXDOMAIN reply rates approach was proposed. 15/25

DNS Based Detection-2 Passive analysis of DNS based Black-hole list (DNSBL) lookup traffic Two problems high false positive cannot detect distributed inspection Hyunsang Choi et al 16/25

Anomaly Based Detection-1 high network latency, high volumes of traffic, traffic on unusual ports, and unusual system behavior cannot detect a BOTNET in sleeping mode Binkley and Singh solved by combining TCP based anomaly with IRC tokenization and IRC message statistics to create a system 17/25

Anomaly Based Detection-2 Gu et al. have proposed Botsniffer Botnet C&C channels local area network low false positive Basheer Al-Duwairi and Lina Al-Ebbini proposed BotDigger fuzzy logic not work on a specific pattern the most reliable and flexible 18/25

Communication Pattern of Botnet -1 Cyber security defenders checks the communication characteristics between a Supervisor-Bot and a Soldier- Bot on transport layer such as for TCP or UDP. Defenders check its source and destination IP, Port and Protocol Identifier. Static characteristics header dynamic characteristics arrival, departure, throughput, and burst time of payload information 19/25

Communication Pattern of Botnet-2 selecting precise set of characteristic and defining unique flow as object comparing with other objects provide more information encrypted with the evolution of Botnet data mining techniques are applied on that limited data to overcome the problem 20/25

PREVENTION & MITIGATION OF BOTNET In 2007 Collins et al. work to detect future botnet address by the help of unclean network spatial (compromised hosts to cluster) temporal (tendency to contain compromised hosts for extended period) Alex Brodsky et al. proposed a distributed content independent spam classification system to defend from Botnet generated Spam’s. Trend Micro provided Botnet Identification services real- time Botnet C&C bot-master address list 21/25

FUTURE PROSPECTS-1 Some of the steps to be taken to study the mind of supervisor- bot are as follow: Make data warehouse of known bots for future use in data mining, and to make an algorithm to use that data as mitigation for attacks. Honeypots based defense is so popular and used mostly; it is predicted and possible that one day supervisor- bots will have a defense mechanism for detection of honeypots in their bots. 22/25

FUTURE PROSPECTS-2 To make anti-bot application software which can work against Botnet attack as antivirus does against viruses etc. New Testbeds are required to be developed which allow testing in large-scale network either open or closed environments. Getting of Botnet sample code is required for analyzing but criminals don’t want to examine their malware as well as cyber defender also feels hesitation with un-trusted ones. 23/25

CONCLUSION In this survey we analyzed the protocols being used by the Supervisor-bots and how they evolved with the passage of time. How cyber defenders proposed and work for the detection of a cyber-attack from known and unknown BOTNETs and given ideas and techniques for its prevention and mitigation. But unfortunately for prevention and mitigation till now no sufficient work has been done. 24/25

25/25