Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.

Slides:



Advertisements
Similar presentations
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
Advertisements

Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee ACSAC.
An Introduction of Botnet Detection – Part 2 Guofei Gu, Wenke Lee (Georiga Tech)
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
A Taxonomy of Botnet Behavior, Detection, and Defense Speaker:Bo-Rong Sue Source:IEEE 1.
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Detecting Botnets Using Hidden Markov Models on Network Traces Wade Gobel Bio-Grid, Summer 2008.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
Threat infrastructure: proxies, botnets, fast-flux
On the Feasibility of Large-Scale Infections of iOS Devices
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Bayesian Bot Detection Based on DNS Traffic Similarity Ricardo Villamarín-Salomón, José Carlos Brustoloni Department of Computer Science University of.
2009/9/151 Rishi : Identify Bot Contaminated Hosts By IRC Nickname Evaluation Reporter : Fong-Ruei, Li Machine Learning and Bioinformatics Lab In Proceedings.
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray,
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology USENIX Security '08 Presented by Lei Wu.
Sravanthi Vattikuti Sri Harsha Devabhaktuni
Botnets An Introduction Into the World of Botnets Tyler Hudak
Introduction to Honeypot, Botnet, and Security Measurement
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
An Evaluation model of botnet based on peer to peer Gao Jian KangFeng ZHENG,YiXian Yang,XinXin Niu 2012 Fourth International Conference on Computational.
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
BotNet Detection Techniques By Shreyas Sali
A Framework for Hybrid Structure P2P Botnet Speakers:MA2G0207 bo rong,sue Source:IEEE.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang, and.
Jeong, Hyun-Cheol. 2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
1 Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Speaker: Jun-Yi Zheng 2010/03/29.
Understanding the Network-Level Behavior of Spammers Best Student Paper, ACM Sigcomm 2006 Anirudh Ramachandran and Nick Feamster Ye Wang (sando)
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Detecting Botnets 1 Detecting Botnets With Anomalous DNS Traffic Wenke Lee and David Dagon Georgia Institute of Technology College of Computing {wenke,
Appear in IEEE TDSC 2008 Presented by Wei-Cheng Xiao.
Nullcon Goa 2010http://nullcon.net Botnet Mitigation, Monitoring and Management - Harshad Patil.
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
Automated Classification and Analysis of Internet Malware M. Bailey J. Oberheide J. Andersen Z. M. Mao F. Jahanian J. Nazario RAID 2007 Presented by Mike.
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets,
Speaker:Chiang Hong-Ren Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
Host and Application Security Lesson 17: Botnets.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Published: Internet Measurement Conference (IMC) 2006 Presented by Wei-Cheng Xiao 2015/11/221.
Omar Hemmali CAP 6135 Paul Barford Vinod Yegneswaran Computer Sciences Department University of Wisconsen, Madison.
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
Chien-Chung Shen Bot and Botnet Chien-Chung Shen
Cryptography and Network Security Sixth Edition by William Stallings.
Speaker:Chiang Hong-Ren An Investigation and Implementation of Botnet Detection Schemes.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Presented by D Callahan.
1 Modeling and Measuring Botnets David Dagon, Wenke Lee Georgia Institute of Technology Cliff C. Zou Univ. of Central Florida Funded by NSF CyberTrust.
Role Of Network IDS in Network Perimeter Defense.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
PEER TO PEER BOTNET DETECTION FOR CYBER- SECURITY (DEFENSIVE OPERATION): A DATA MINING APPROACH Masud, M. M. 1, Gao, J. 2, Khan, L. 1, Han, J. 2, Thuraisingham,
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
A lustrum of malware network communication: Evolution & insights
Speaker : YUN–KUAN,CHANG Date : 2009/11/17
Future Internet Presenter : Eung Jun Cho
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
De-anonymizing the Internet Using Unreliable IDs By Yinglian Xie, Fang Yu, and Martín Abadi Presented by Peng Cheng 03/22/2017.
Botnet Detection by Monitoring Group Activities in DNS Traffic
An overview over Botnets
Presentation transcript:

Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic

Outline /9/17 Abstract Introduction Related Work Bontet DNS-Based Botnet Detection Mechanism Evaluation Discussion Conclusion

Abstract we propose a botnet detection mechanism by monitoring DNS traffic to detect botnets, which form a group activity in DNS queries simultaneously sent by distributed bots. From the experiments on a campus network, it is shown that the proposed mechanism can detect botnets effectively while bots are connecting to their server or migrating to another server.

Introduction We have developed the botnet detection mechanism with the following four steps. we found several features of botnet DNS traffic that is distinguishable from legitimate DNS traffic. we defined the key feature of DNS traffic called group activity. we developed an algorithm that differentiate botnet DNS query by using group activity feature. we analyzed the algorithm to prove feasibility of our mechanism.

Related Work Barford et al. presented a perspective based on an in-depth analysis of bot software source code and reveals the complexity of botnet software. Bots are sending DNS queries in order to access the C&C channel server. Used DNS redirection to monitor botnets. Dagon also present botnet Detection and response approach with analyzing peculiarity of botnet rallying DNS traffic. Ramachandran developed techniques and heuristics for detecting DNSBL reconnaissance activity.

BotNet - Growth of Botnet(1/4) A botnet is a large pool of compromised hosts that are controlled by a botmaster. Recent botnets use the Internet Relay Chat (IRC) server as their C&C server for controlling the botnet. However the traffic among bots, the C&C sever and the botmaster can be considered as legitimate traffic because it is hard to distinguish from normal traffic.

BotNet - Rally Problem and IRC Server(2/4) The key problem of a botmaster is how to rally the infected hosts. Botmaster want their botnets to be invisible and portable. they uses DNS for rallying. It is possible to use other method for rallying the bots. Most of them cannot provide both mobility and invisibility at the same time. the hard coded IP address is unchangeable, so it cannot provide any mobility.

BotNet - C&C Server Migration(3/4) If a botnet uses only a single C&C server, the botnet could easily be detected and disarmed. A botmaster wants to arrange several C&C servers which can be listed in the bot binary for the stability of the botnet and uses a dynamic DNS (DDNS). root C&C server cannot operate well or link failure occurred, candidate C&C servers can be a feasible substitution for the root C&C server. previous domain name of botnet C&C server is blocked, botmaster can just moves his botnet to another candidate C&C server.

BotNet - Features of Botnet DNS(4/4) Infected hosts automatically access the C&C server with its domain name. At the rallying procedure At the malicious behaviors of a botnet At C&C server link failures At C&C server migration At C&C server IP address changes Source IPs accessed to domain name Activity and Appearance Patterns DNS Type Botnet DNS Fixed size Group (Botnet members) Group activity Intermittently Appered (Specific situation) Usually DDNS Legitimate DNS Anonymous (Legitimate users) Non-group activity Randomly and Continuously appered (Usually) Usually DNS

DNS-Based Botnet Detection Mechanism(1/3) We developed a botnet DNS query detection algorithm by using the different features of botnet DNS and legitimate DNS.

DNS-Based Botnet Detection Mechanism(2/3) Botnet DNS Query Detection Algorithm (BDQDA) Insert-DNS-Query We inserted the domain name and source IP address of queries to A checking it already existed in A. check the IP address already exist in the IP list of the domain name. Delete-DNS-Query removing redundant DNS query. If the size of IP list do not exceed the size threshold the domain name is legitimate which already exist in a whitelist Detect-BotDNS-Query We define and compute numerical value of group activity of botnet DNS, called similarity. We let S denote the similarity such that

DNS-Based Botnet Detection Mechanism(3/3) Migrating Botnet Detection Algorithm (MBDA) The first and second stage( Insert-DNS-Query and Delete-DNS-Query) are same but third step of algorithm is different. bots use two different domain name of C&C server, therefore we compare the IP lists of different domain name which have similar size of IP list. Botnet Detection System The botnet detection system that combines both of botnet query detection and migrating botnet detection, requires DNS traffic data. Moreover, the system is sensitive to the threshold values so, it must be carefully decided.

Evaluation(1/4) We made the scenario script for verifying the algorithms and the scenario includes botnet construction rally to the C&C server command and control for spam mailing, DDoS attack, C&C server migration We also migrates our botnet from root IRC C&C server to candidate IRC server for verifying the migrating botnet detection algorithm. A time unit is 1 hour and a size threshold for the detection algorithm is 5(size of IP List) and similarity threshold is 0.8.

Evaluation(2/4)

Evaluation(3/4)

Evaluation(4/4)

Discussion The botnet can evade our algorithms when the botnet uses DNS only at initializing and never use it again (moreover, do not migrate the botnet). It is possible to paralyze our algorithm with intentionally generated DNS queries that spoof their sources.

Conclusion It is necessary to provide appropriate countermeasure botnet which become a one of the biggest threat of network security and major contributor to unwanted network traffic. we researched a simple mechanism to detect a botnet by using a DNS queries which used by botnet. The two different algorithm for botnet detection are proposed and both can detect the specific activity of botnet nicely.