A Taxonomy of Botnet Behavior, Detection, and Defense Speaker:Bo-Rong Sue Source:IEEE 1.

Slides:



Advertisements
Similar presentations
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Advertisements

A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
SOCELLBOT: A New Botnet Design to Infect Smartphones via Online Social Networking th IEEE Canadian Conference on Electrical and Computer Engineering(CCECE)
Automated Remote Repair for Mobile Malware Yacin Nadji, Jonathon Giffin, Patrick Traynor Georgia Institute of Technology ACSAC’ 11.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Novel Information Attacks From “Carpet Bombings” to “Smart Bombs”
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Security Awareness: Applying Practical Security in Your World
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
Threat infrastructure: proxies, botnets, fast-flux
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Virtual Machine approach to Security Gautam Prasad and Sudeep Pradhan 10/05/2010 CS 239 UCLA.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
SMS Mobile Botnet Detection Using A Multi-Agent System Abdullah Alzahrani, Natalia Stakhanova, and Ali A. Ghorbani Faculty of Computer Science, University.
Network security policy: best practices
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Sravanthi Vattikuti Sri Harsha Devabhaktuni
Introduction to Honeypot, Botnet, and Security Measurement
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
A Taxonomy of Network and Computer Attacks Simon Hansman & Ray Hunt Computers & Security (2005) Present by Mike Hsiao, S. Hansman and R. Hunt,
BotNet Detection Techniques By Shreyas Sali
A Framework for Hybrid Structure P2P Botnet Speakers:MA2G0207 bo rong,sue Source:IEEE.
Speaker : Hong-Ren Jiang A Novel Testbed for Detection of Malicious Software Functionality 1.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Jeong, Hyun-Cheol. 2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
A Multifaceted Approach to Understanding the Botnet Phenomenon Authors : Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Computer Science.
Appear in IEEE TDSC 2008 Presented by Wei-Cheng Xiao.
Nullcon Goa 2010http://nullcon.net Botnet Mitigation, Monitoring and Management - Harshad Patil.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Chapter 5: Implementing Intrusion Prevention
EVALUATING SECURITY OF SMART PHONE MESSAGING APPLICATIONS PRESENTED BY SUDHEER AKURATHI.
A Novel Multicast Routing Protocol for Mobile Ad Hoc Networks Zeyad M. Alfawaer, GuiWei Hua, and Noraziah Ahmed American Journal of Applied Sciences 4:
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Host and Application Security Lesson 17: Botnets.
Published: Internet Measurement Conference (IMC) 2006 Presented by Wei-Cheng Xiao 2015/11/221.
S. A. Shonola & M. S. Joy Security Framework for Mobile Learning Environments.
Routing Around Decoys Max Schuchard, John Geddes, Christopher Thompson, Nicholas Hopper Proposed in FOCI'11, USINIX Security'11 and CCS'11 Presented by:
Engaging the Adversary as a Viable Response to Network Intrusion Sylvain P. Leblanc & G. Scott Knight Royal Military College of Canada PST 05 Workshop.
A Multifaceted Approach to Understanding the Botnet Phenomenon Aurthors: Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Publication: Internet.
Speaker:Chiang Hong-Ren An Investigation and Implementation of Botnet Detection Schemes.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Presented by D Callahan.
1 Modeling and Measuring Botnets David Dagon, Wenke Lee Georgia Institute of Technology Cliff C. Zou Univ. of Central Florida Funded by NSF CyberTrust.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Spike DDoS Toolkit A Multiplatform Botnet Threat.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Despite of spending high on digital information security, organizations still remain exposed to external threats. However, data center providers are helping.
Published: USENIX HotBots, 2007 Presented: Wei-Cheng Xiao 2016/10/11.
A lustrum of malware network communication: Evolution & insights
Speaker : YUN–KUAN,CHANG Date : 2009/11/17
Privacy Through Anonymous Connection and Browsing
Internet Worm propagation
Home Internet Vulnerabilities
Chapter 4: Protecting the Organization
Data Mining & Machine Learning Lab
Presentation transcript:

A Taxonomy of Botnet Behavior, Detection, and Defense Speaker:Bo-Rong Sue Source:IEEE 1

Outline 1. INTRODUCTION 2. TAXONOMY OF BOTNET BEHAVIOR 3. TAXONOMY OF BOTNET DETECTION MECHANISMS 4. TAXONOMY OF BOTNET DEFENSE MECHANISMS 5. RELATED WORK 6. FUTURE TRENDS 2

INTRODUCTION  BOTNETS pose an alarming–and arguably the most potent–threat to the security of Internet-connected users and systems.  the first systematic analysis of the botnet threat from three aspects: 1. botnet behaviors/architectures, 2. detection mechanisms 3. defensestrategies.  Devising new detection and defense mechanisms.  Taxonomies will aid in visualizing the diversity in botnet research. 3

TAXONOMY OF BOTNET BEHAVIOR  A botnet is a collection of compromised machines (bots) receiving and responding to commands from a server (the C&C server) 4

TAXONOMY OF BOTNET BEHAVIOR  To fully understand the botnet phenomenon, it is important to systematically explain different features related to botnet behavior.  From the point of view of a bot, the infection starts with execution of the bot binary on the victim machine.  Bot binary is transported to the victim machine using a Propagation mechanism.  The next step is to contact the C&C server and announce its presence.  Rallying marks the establishment of a C&C channel through which the bot receives updates and commands.  Based on how C&C communication takes place, the botnet forms an overlay Topology. 5

TAXONOMY OF BOTNET BEHAVIOR  The newly recruited bot then waits for commands to serve the actual Purpose of the botnet and optionally spread the infection to other hosts using Propagation mechanisms.  An important consideration through all the botnet operations is Evasion.  Different mechanisms are employed to ensure that the bot binary, C&C communication, C&C server(s) and botmaster may not be trivially detected. 6

TAXONOMY OF BOTNET BEHAVIOR  In this taxonomy, we broadly categorize botnet behavioral features as those concerning: 1. Propagation 2. Rallying 3. C&C 4. Purpose and Evasion 7

TAXONOMY OF BOTNET BEHAVIOR 8

9

10

TAXONOMY OF BOTNET DETECTION MECHANISMS Definition 1. Botnet Detection: Detection of all components of a botnet, comprising the botmaster, C&C server(s), means of C&C, and (all or a subset of) bots. Definition 2. Bot Detection: Detection of botnet infected machines, with or without regard to bot families. Definition 3. Bot Family Detection: A class of Bot Detection focused on bot family detection. 11

TAXONOMY OF BOTNET DETECTION MECHANISMS 12

TAXONOMY OF BOTNET DETECTION MECHANISMS 13

TAXONOMY OF BOTNET DETECTION MECHANISMS 14

TAXONOMY OF BOTNET DEFENSE MECHANISMS 15

TAXONOMY OF BOTNET DEFENSE MECHANISMS 16

RELATED WORK  A great deal of previous work has focused on different aspects of botnets, their detection and defense.  Cooke et al. [47] in their pioneer work explained C&C structures and proposed a novel structure which they called ‘random’.  Nazario [4] highlighted the multifaceted nature of botnets and maintained that this should be reflected in related taxonomies.  His taxonomy was based on factors such as network structure, language of bot binary, features (attacks,server, proxy) and propagation strategies.  This relates to Purpose,Topology and Propagation in our taxonomy of botnet features. 17

RELATED WORK  Their work does not take into account C&C characteristics, botnet evasion techniques and rallying mechanisms.  Researcher emphasized that the aim of taxonomy should be identification of detection opportunities.  The taxonomy classified C&C on the basis of nature of C&C resources (public/private), RFC compliance, and activity level (how often the bots contact the botmaster).  The taxonomy only highlights C&C channels and the remaining work provides a general discussion of rallying, detection and response strategies. 18

RELATED WORK  A subset of botnet research revolves around botnet detection.  The survey examined botnet detection methods on the basis of an interesting dimension, data sources.  The data sources included DNS, Netflow, packet tap, address allocation, honeypot and host data.  Honeypots have been shown as a class of botnet detection.  Honeypots are functional to understanding the botnet operation and assessing vulnerability of a network to the botnet threat, yet it is important to understand that they do not identify bots or bot families per se. 19

RELATED WORK  The other class, Intrusion Detection System (IDS), is along the lines of established taxonomy for IDS with the additional notion of activity in the context of network monitoring.  The taxonomy provides a good overview of the existing detection methods but falls short in distinguishing between the different targets of botnet detection methods.  A number of papers give useful insights into botnet defense but do not span the entire gamut of possible botnet countermeasures. 20

FUTURE TRENDS  Botnets are turning to cloud computing to expand their potentials.  Botnets can utilize cloud platforms in two ways; (i) host the C&C server(s) on the cloud or (ii) create bots on the cloud (botcloud) instead of infecting user machines.  A botnet can be created almost instantly in contrast to traditional botnets where a substantial time is wasted in recruiting bots.  The bot population is always online unlike traditional botnets where bots disappear because of users shutting down their computers. 21

FUTURE TRENDS  Cloud security is still in a transient stage and most existing detection approaches do not scale to clouds.  Thus clouds provide a nice cover to botnets for carrying out their malicious activities.  We expect to see a surge in botnets based on smartphones.  The ubiquitous use of mobile devices make them an important frontier for botnets.  Moreover, mobile phones can utilize a number of communication technologies (3G, 4G, WiFi, SMS), which multiplies the possibilities for C&C and malware propagation. 22

CONCLUSION  The number of users connected to the Internet almost doubled in the last five years.  However, the remarkable growth in Internet usage is disproportionate to security knowledge of common users.  Botnets take cyber attacks to the next level by abusing the aforementioned discrepancy.  In this paper, we have presented three comprehensive taxonomies related to botnet behavioral features, detection and defense.  Our first taxonomy aims to demystify the adversary by exploring the botnet phenomenon from different angles, such as propagation, rallying, C&C and purpose. 23

CONCLUSION  The second taxonomy classifies botnet detection approaches.  Our third taxonomy provides a systematic analysis of botnet defense mechanisms.  We conclude by identifying current trends in botnet detection and defense, followed by future work.  The area of botnet detection and defense has evolved over the last few years. In particular, legal countermeasures have succeeded in disbanding a number of botnets. 24

CONCLUSION  However, the long-term efficacy of these methods is debatable.  Reactive defense approaches like removal of C&C servers yields promising results in the short-term.  Botnets find a way to resurrect and resume their malicious activities.  Moreover, preventive detection and defense approaches at home computers and routers would go a long way in curtailing the botnet phenomenon.  Currently, there are very few bot detection tools.  Majority of the existing detection approaches do not incorporate defense. 25

Q&A 26

感謝觀看 27