ONR MURI Project Kick-Off

Slides:



Advertisements
Similar presentations
INDIANAUNIVERSITYINDIANAUNIVERSITY GENI Global Environment for Network Innovation James Williams Director – International Networking Director – Operational.
Advertisements

Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Dynamics of Online Scam Hosting Infrastructure
Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
11/20/09 ONR MURI Project Kick-Off 1 Network-Level Monitoring for Tracking Botnets Nick Feamster School of Computer Science Georgia Institute of Technology.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Internet War Room Wenke Lee, Nick Feamster, David Dagon, Mustaque Ahamad.
Networking Research Nick Feamster CS Nick Feamster Ph.D. from MIT, Post-doc at Princeton this fall Arriving January 2006 –Here off-and-on until.
My Experience Writing an NSF NeTS FIND Proposal Nick Feamster Georgia Tech.
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Nick Feamster Research: Network security and operations Teaching CS 7260 in Spring 2007 CS 7001 Mini-projects: –
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Network Security Highlights Nick Feamster Georgia Tech.
1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
1 Network-Level Spam Detection Nick Feamster Georgia Tech.
Network Operations Research Nick Feamster
Network Security Highlights Nick Feamster Georgia Tech.
Deploying IPv6: The time is now Are you ready? SFTA 24 May 2012 John Curran President and CEO, ARIN.
Texas Digital Library Services Preservation Network.
All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Update on OCIs Cybersecurity Activities for CASC September 2011 Kevin Thompson.
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
RB-Seeker: Auto-detection of Redirection Botnet Presenter: Yi-Ren Yeh Authors: Xin Hu, Matthew Knysz, Kang G. Shin NDSS 2009 The slides is modified from.
Secure and Trustworthy Cyberspace (SaTC) Program Sam Weber Program Director March 2012.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
Threat infrastructure: proxies, botnets, fast-flux
Internet Basics مهندس / محمد العنزي
Norman SecureSurf Protect your users when surfing the Internet.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang, and.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
SURF:SURF: Detecting and Measuring Search Poisoning Long Lu, Roberto Perdisci, and Wenke Lee Georgia Tech and University of Georgia.
Behavior-based Spyware Detection By Engin Kirda and Christopher Kruegel Secure Systems Lab Technical University Vienna Greg Banks, Giovanni Vigna, and.
Jeong, Hyun-Cheol. 2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
MySQL and PHP Internet and WWW. Computer Basics A Single Computer.
A Multifaceted Approach to Understanding the Botnet Phenomenon Authors : Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Computer Science.
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Internet2 Abilene & REN-ISAC Arbor Networks Peakflow SP Identification and Response to DoS Joint Techs Winter 2006 Albuquerque Doug Pearson.
1 Modeling and Measuring Botnets David Dagon, Wenke Lee Georgia Institute of Technology Cliff C. Zou Univ. of Central Florida Funded by NSF CyberTrust.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
THE INTERNET AND THE WORLD WIDE WEB. INTERNET INTERNET - short term for interconnected networks, is a global network of computers tied together to share.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
BUILDING AND IMPLEMENT A EMBEDDED WEB SERVER BASE ON TCP/IP STACK WITH A SoC PLATFORM Professor : CHI-JO WANG Name : Bui Quang Hoa (M982b211)
CompTIA Security+ Study Guide (SY0-401)
Evolution of Internet.
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
CompTIA Security+ Study Guide (SY0-401)
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
Modeling and Measuring Botnets
الفصل الثالث عشر الانترنت والاتصالات
Cyber Security Challenges
Data Mining & Machine Learning Lab
Internet Resilience: Global Network, Global Risks
Presentation transcript:

Botnet Attribution and Removal: From Axioms to Theory to Practice Wenke Lee (PI) College of Computing Georgia Institute of Technology ONR MURI N000140911042 Project Kick-off Meeting November 20, 2009

ONR MURI Project Kick-Off Project Team Wenke, David Nick Jon Kang Giovanni Farnam Michael John Chris 11/20/09 ONR MURI Project Kick-Off

ONR MURI Project Kick-Off Project Team (cont’d) Georgia Tech Wenke Lee (Ph.D. 1999, Columbia) Nick Feamster (Ph.D. 2005, MIT) Jon Giffin (Ph.D. 2006, Wisconsin) David Dagon (Ph.D. 2009/10?, Georgia Tech) Michigan Kang Shin (Ph.D. 1978, Cornell) Farnam Jahanian (Ph.D. 1989, Texas) Michael Bailey (Ph.D. 2006, Michigan) Stanford John Mitchell (Ph.D. 1984, MIT) UC Santa Barbara Giovanni Vigna (Ph.D. 1998, Politecnico di Milano) Christopher Kruegel (Ph.D. 2002, Technical University of Vienna) 11/20/09 ONR MURI Project Kick-Off

ONR MURI Project Kick-Off Project Overview A botnet is a network of compromised computers (bots) under the control of an attacker Platform for most of the cyber attacks and fraudulent activities IA problems addressed What are the intrinsic properties of botnets? What are fundamental approaches to detect and remove all current and future botnets? And how to develop them? 11/20/09 ONR MURI Project Kick-Off

ONR MURI Project Kick-Off Project Overview An overarching framework that covers all aspects of botnet lifecycle and the entire network stack/scale, rather than a collection of point solutions. A systematic and scientific approach to design robust botnet detection and analysis algorithms, rather than ad-hoc and brittle techniques. 11/20/09 ONR MURI Project Kick-Off

Project Overview (cont’d) Approaches Analyze the intrinsic/invariant properties of botnets Derive the axioms, or the necessary and possible host-, network- and Internet- level botnet behaviors that are due to these properties From the axioms develop the principles or theories for detecting and stopping these botnet behaviors Put the theories into practice by developing pactical algorithms and systems 11/20/09 ONR MURI Project Kick-Off

Project Overview (cont’d) Approach example Analyze essential properties of botnet lifecycle E.g., botnets are valuable, long-term resources Derive axioms that directly follow from the properties E.g., botnets need to have agility to evade detection and removal Derive theories from the axioms E.g., by detecting and neutralizing the sources of network agility, we can limit botnets’ evasion capabilities and thus make botnets easier to detect and remove Apply the theories to practice E.g., an on-line detection of naming (DNS) based agility. 11/20/09 ONR MURI Project Kick-Off

Project Overview (cont’d) Capabilities to offer Innovative and foundational solutions to enable End-hosts to identify bot activities on the host and block bot related traffic Enterprise networks to identify hosts that participate in botnet activities on the Internet and accordingly block such traffic Internet core to detect anomalies in Internet basic protocols to identify the servers used to support botnet operations and accordingly disrupt or even remove the botnets Technology transfer and commercialization PIs connected to Damballa and Arbor Networks 11/20/09 ONR MURI Project Kick-Off

ONR MURI Project Kick-Off Research Areas Theory and taxonomy Essential properties, axioms and theories Lee, Mitchell, Dagon, Bailey Taxonomy Bailey Dagon, Mitchell, Lee Metrics, network and game theory models Mitchell, Dagon, Feamster, Jahanian Epidemiology Models Population estimates and threat assessment Jahanian, Dagon, Feamster, Shin 11/20/09 ONR MURI Project Kick-Off

Research Areas (cont’d) Essential properties of botnets call for multifaceted detection and analysis approaches Bots are compromised computers Malware Bot traffic is not sent/authorized by users Host/user activities C&C required to form/maintain botnet Bot programs, network/Internet traffic Bots used for attacks and frauds Bots are long-term resources Reuse models, and mechanisms/protocols to support agility Man behind the bots reaping the profit “Management” servers or “mothership” 11/20/09 ONR MURI Project Kick-Off

Research Areas (cont’d) Detection and analysis Malware and malicious web pages/scripts Kruegel, Bailey, Giffin, Lee Host activities and network/Internet traffic Giffin, Feamster, Mitchell, Jahanian, Lee Agile C&C and activity infrastructures Shin, Feamster, Jahanian, Dagon Long-lived and reused bots Feamster, Bailey, Vigna, Dagon Motherships Vigna, Shin, Dagon, Feamster 11/20/09 ONR MURI Project Kick-Off

Research Areas (cont’d) Theoretical work validates intuitions and directs development and evaluation of detection and analysis algorithms for current and future botnets For example Botnet has long-term utility, which depends of its network model ✖ ✖ 11/20/09 ONR MURI Project Kick-Off

Research Areas (cont’d) Agility thus helps preserve botnet utility Realization in Internet: DDNS, fast-flux, new domain daily (hourly?) Scale and layers of agile control ✖ Metrics, network and game theory models provide a theoretical understanding of the possibilities and trade-offs of botnet agilities Basis to fight future botnets 11/20/09 ONR MURI Project Kick-Off

ONR MURI Project Kick-Off Plan and Milestones 11/20/09 ONR MURI Project Kick-Off

Evaluation and Technology Insertion PIs have a long history of dataset collection and network measurement and thus have access to a wide variety of production datasets including: DNS, spam, malware, and alert data via SIE BGP and netflow data from ISPs Malware collections and exchanges Deployment and evaluation in operational environments in departments, universities, and upstream services providers PIs have strong ties to industry (e.g., Arbor and Damballa), and have participated in DHS-led efforts to deploy technologies in government agencies 11/20/09 ONR MURI Project Kick-Off

Project Management and Student Education Project web site at Georgia Tech Public pages showcasing the project http://onrbotnet.gtisc.gatech.edu/ Private/wiki for project team and PM to share data, software, and reports http://onrbotnet.gtisc.gatech.edu/wiki Bi-yearly project meeting One co-located with a major security conference, and the other on a campus Education 15 Ph.D. students, 1-3 Post Docs Exchange summer interns, post docs 11/20/09 ONR MURI Project Kick-Off

Related Projects and Support NSF “CLEANSE”, total $1.2M Georgia Tech and Michigan (and UNC, SRI, ISC) Large-scale monitoring of core Internet services such as DNS and BGP DHS botnet projects Michigan and Georgia Tech, separate Tech transfer and deployment NSF, AFRL, ARO, and ONR IA projects All PIs; Focused/specific areas such as malware on cell phones 11/20/09 ONR MURI Project Kick-Off