Dr. Steven Gianvecchio.  Internet of Things botnet  Includes TV and refrigerator  Flashback hits Mac OS X  800K Macs infected  Explosion of Android.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs Steven Gianvecchio, Zhenyu Wu, Mengjun Xie, and Haining Wang.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
ECrime Research Richard Clayton Luxembourg 11 th May 2010.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
Threats To A Computer Network
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Detecting Botnets Using Hidden Markov Models on Network Traces Wade Gobel Bio-Grid, Summer 2008.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
Battle of Botcraft: Fighting Bots in Online Games withHuman Observational Proofs Steven Gianvecchio, Zhenyu Wu, Mengjun Xie, and Haining Wang The College.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Threats to I.T Internet security By Cameron Mundy.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Botnets An Introduction Into the World of Botnets Tyler Hudak
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Cyber Crimes.
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
BotNet Detection Techniques By Shreyas Sali
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
1 Measurement and Classification of Humans and Bots in Internet Chat By Steven Gianvecchio, Mengjun Xie, Zhenyu Wu, and Haining Wang College of William.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Jeong, Hyun-Cheol. 2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Nullcon Goa 2010http://nullcon.net Botnet Mitigation, Monitoring and Management - Harshad Patil.
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
Jhih-sin Jheng 2009/09/01 Machine Learning and Bioinformatics Laboratory.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or computers. However we do not realize how fast internet is getting bigger.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
Big Bad Botnet Day! Xeno Kovah In association with the Corporation for Public Botcasting, and Viewers Like You! Xeno Kovah In association with the Corporation.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
Lecture 14 Page 1 CS 236 Online Worms Programs that seek to move from system to system –Making use of various vulnerabilities Other performs other malicious.
Information Security: Current Threats Marc Scarborough Information Security Officer
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Information Systems Design and Development Security Risks Computing Science.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Botnets A collection of compromised machines
Social Media Attacks.
Botnets A collection of compromised machines
Internet Worm propagation
Presentation transcript:

Dr. Steven Gianvecchio

 Internet of Things botnet  Includes TV and refrigerator  Flashback hits Mac OS X  800K Macs infected  Explosion of Android threats  6x growth  LinkedIn, Dropbox, and other leaks  6.5 million LinkedIn passwords hashes leaked  Java 0-days  30% of computers vulnerable  Brazil DSL hacks  4.5 million modems hacked

 99 billion spam s/day  68% of all traffic  US banks flooded with >150Gbps of traffic  37 million phishing attempts  Password theft up 3x  What connects all of these problems?

 What is a bot?  Short for “robot”  An automated program that operates an application normally used by humans ▪ e.g., Web bot, Twitter bot  Bots are not always bad ▪ e.g., Google uses bots to build its search results (these bots are also called spiders)

 What are zombies?  Computers infected with malicious bot software allowing them to be remotely controlled ▪ Zombie (n) 2.a.3. “in West Indian voodoo, a supernatural power through which a corpse supposedly is brought to a state of trancelike animation and made to obey the commands of the person exercising the power” [Merriam-Webster]  Typically someone’s home or office computer (unknown to them)

 What are botnets?  Botnets are networks of zombie- or bot-infected computers ▪ Thousands or even millions of bots ▪ 1-5% of Internet-connected computers [Arbor10] ▪ Controlled by independent hackers or criminal organizations (or military)

ZeroAccess botnet - Europe infections [Fsecure12] ZeroAccess botnet: ~2-3 million infections ~$100K/day in profits through Click Fraud

 1. Propagation – computer is infected with malicious bot software  2. Communication - bot “phones home”, i.e., contacts its controller and awaits orders  3. Attack - bot responds to commands

 The first step is “recruiting” bots  Infect computers and install bot software ▪ Many infection methods  Infect as many computers as possible ▪ Bigger is usually better ▪ More bots = faster propagation (rate can be exponential)

From Security Intelligence Report ‘12 [Microsoft12] Infection Methods

 How bots receive commands  What if a node is lost? Centralized Peer-to-Peer

 Spam (about 80% is from botnets)  Distributed Denial of Service, aka DDoS (floods host with traffic)  Click Fraud (fake traffic or “clicks”)  Phishing (steal passwords using fake sites)  Identity or Data Theft  Keylogging  Spying

 The Turing Test  A human judge chats with two unknown participants: a human and computer  Judge guesses which is human

 Human Interactive Proofs  Ideal Proof: hard for computers, easy for humans  e.g., CAPTCHA ▪ Like Turing Test, but judge also a computer  CAPTCHAs are hard for humans and computers  (or maybe I’m a computer?)  Are they still effective?

 Behavioral Detection  Humans ▪ Biological ▪ Highly complex (many systems within systems)  Bots ▪ Automated (good at repeating things) ▪ Limited complexity (does whatever is in the code)  Can we tell them apart?

 Types  Web   Social Network  Online Game  And Others  Bots use these applications for propagation or communication, or target them for attack  Bots are modular  Could propagate via and communicate via Web

 Bots are on Twitter and Facebook  Friend or follow you  Send spam or phishing links (via Tweet or direct message)  Send links to malicious code (also via Tweet or direct message)

 Live Twitter bots       …

 Live Twitter bots  - created  created  created  created  created  Likely created by the same person?

 Bots play games  Gambling ▪ Online Poker  Gold farming ▪ World of Warcraft ▪ Guild Wars 2 ▪ Rift Online ▪ Star Wars: The Old Republic ▪ …

 Bot plays endlessly  Gathers gold 24 hours a day  Sells on virtual black market for real currency  Bot plays like a human  “Presses” keys (changes key state)  “Moves” mouse (changes mouse x, y coordinates)  “Views” screen (reads color values of pixels)  Can we tell them apart from how they play?

 Setup  World of Warcraft  Collect user-input recordings ▪ Log mouse and keyboard events ▪ Compute statistics ▪ 10 bots for 40 hours ▪ 30 humans for 55 hours

 Bot vs Human  82% of bot mouse movements are 1.0 move efficiency ▪ i.e., a straight line  14% of human movements are 1.0 move efficiency bot move efficiency human move efficiency

 Bot vs Human  Bot moves mouse at random speeds in different directions  Human moves faster on diagonals bot mouse speed human mouse speed

 Advertisers often are paid per click  Bots can click things!  Advertiser pays botmaster for clicks  Thousands of bots click on the ads  Client pays advertiser (and gets ripped off)  ZeroAccess (mentioned earlier) makes about $100,000/day on Click Fraud  Click Fraud Study  Setup web page and collect clicks and mouse movements for bots and human users [Spider.io13]

 Bot vs Human  Bot clicks and mouse movements are randomly distributed  Human clicks and movements are focused on key areas

 Focus on the Botnet Lifecycle  1. Propagation / 2. Communication / 3. Attack  Detecting Botnet Propagation  Look for attempts to infect other machines  Exploits change regularly  Very hard ▪ If we could reliably detect exploits, we wouldn’t have the botnet problem

 Detecting Botnet Communication  Look for communication with command and control server ▪ Bots often contact their controller at regular intervals, e.g., every 5 minutes  Clustering works well ▪ Lots of computers doing the same thing  Identify the bots and command and control servers

 Detecting Botnet Attacks  Look for bots attacking or targeting systems  Only identifies the bots involved in the attack  Lots of different techniques needed to detect attacks ▪ Spam, DDoS, Click Fraud, Phishing, etc.

 Setup a network of unpatched computers  Must be isolated from primary network  Get infected  Monitor the network  Collect logs  Learn about the bots

 Can monitor individual bots to discover their controller  Target the controller, not the bots  Take down or take over the botnet  Symantec recently disabled 500,000 bots from ZeroAccess using this approach

 Bots are a major security problem  Botnets are the source of most cyber attacks  Can detect them in various ways  Bot vs human behavior  Also, propagation / communication / attack  Can disrupt them by taking down or taking over parts of the botnet

 Interested students (or faculty) that want to get involved in bot, online game, or social network research can contact Dr. Gianvecchio,

 [Arbor10] “Analyzing and understanding botnets.” Jose Nazario.  [AFJ08] “Carpet bombing in cyberspace: Why America needs a military botnet.” Charles Williamson.  [Kaspersky13] “The evolution of phishing attacks: ” Kaspersky Labs.  [Pingdom13] “Internet 2012 in numbers.” Pingdom.  [ZDnet12] “10 Security stories that shaped 2012.” Ryan Naraine.

 [Symantec13] “Grappling with the ZeroAccess botnet.” Ross Gibb and Vikram Thakur.  [Gianvecchio09] “Battle of Botcraft: Fighting Bots in Online Games using Human Observational Proofs.” Steven Gianvecchio, Zhenyu Wu, Mengjun Xie, and Haining Wang.