1 Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Speaker: Jun-Yi Zheng 2010/03/29.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Dynamics of Online Scam Hosting Infrastructure
11/20/09 ONR MURI Project Kick-Off 1 Network-Level Monitoring for Tracking Botnets Nick Feamster School of Computer Science Georgia Institute of Technology.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Spamming with BGP Spectrum Agility Anirudh Ramachandran Nick Feamster Georgia Tech.
Spamming with BGP Spectrum Agility Anirudh Ramachandran Nick Feamster Georgia Tech.
1 Network-Level Spam Detection Nick Feamster Georgia Tech.
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
Reporter: Jing Chiu Advisor: Yuh-Jye Lee /7/181Data Mining & Machine Learning Lab.
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee ACSAC.
Paper Reading: Reporter: Shao-Yu Peng( 彭少瑜 ) Date: 2013/10/28.
RB-Seeker: Auto-detection of Redirection Botnet Presenter: Yi-Ren Yeh Authors: Xin Hu, Matthew Knysz, Kang G. Shin NDSS 2009 The slides is modified from.
Kindred Domains: Detecting and Clustering Botnet Domains Using DNS Traffic Matt Thomas Data Architect, Verisign Labs.
Service Discrimination and Audit File Reduction for Effective Intrusion Detection by Fernando Godínez (ITESM) In collaboration with Dieter Hutter (DFKI)
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
Understanding the Network-Level Behavior of Spammers Anirudh Ramachandran Nick Feamster.
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
Two stage packet classification using most specific filter matching and transport level sharing Authors: M.E. Kounavis *,A. Kumar,R. Yavatkar,H. Vin Presenter:
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Threat infrastructure: proxies, botnets, fast-flux
BotGraph: Large Scale Spamming Botnet Detection Yao Zhao Yinglian Xie *, Fang Yu *, Qifa Ke *, Yuan Yu *, Yan Chen and Eliot Gillum ‡ EECS Department,
1 Authors: Anirudh Ramachandran, Nick Feamster, and Santosh Vempala Publication: ACM Conference on Computer and Communications Security 2007 Presenter:
Can DNS Blacklists Keep Up With Bots? Anirudh Ramachandran, David Dagon, and Nick Feamster College of Computing, Georgia Tech.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray,
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology USENIX Security '08 Presented by Lei Wu.
PhishNet: Predictive Blacklisting to Detect Phishing Attacks Pawan Prakash Manish Kumar Ramana Rao Kompella Minaxi Gupta Purdue University, Indiana University.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Chapter 9: Cooperation in Intrusion Detection Networks Authors: Carol Fung and Raouf Boutaba Editors: M. S. Obaidat and S. Misra Jon Wiley & Sons publishing.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang, and.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
SURF:SURF: Detecting and Measuring Search Poisoning Long Lu, Roberto Perdisci, and Wenke Lee Georgia Tech and University of Georgia.
Paper Presentation – CAP Page 2 Outline Review - DNS Proposed Solution Simulation Results / Evaluation Discussion.
Understanding the Network-Level Behavior of Spammers Best Student Paper, ACM Sigcomm 2006 Anirudh Ramachandran and Nick Feamster Ye Wang (sando)
FluXOR: Detecting and Monitoring Fast-Flux Service Networks Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni, and Danilo Bruschi 5th international.
1 Characterizing Botnet from Spam Records Presenter: Yi-Ren Yeh ( 葉倚任 ) Authors: L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, I. Osipkov, G. Hulten,
DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor Craig Shue
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
Not So Fast Flux Networks for Concealing Scam Servers Theodore O. Cochran; James Cannady, Ph.D. Risks and Security of Internet and Systems (CRiSIS), 2010.
TEL500-Voice Communications SIP-based VoIP Traffic Behavior Profiling and Its Application Devesh Mendiratta & Sameer Deshmukh MS-Telecommunication State.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets,
Spamscatter: Characterizing Internet Scam Hosting Infrastructure By D. Anderson, C. Fleizach, S. Savage, and G. Voelker Presented by Mishari Almishari.
Speaker:Chiang Hong-Ren Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
Cross-Analysis of Botnet Victims: New Insights and Implication Seungwon Shin, Raymond Lin, Guofei Gu Presented by Bert Huang.
Speaker: Hom-Jay Hom Date:2009/11/17 Botnet, and the CyberCriminal Underground IEEE 2008 Hsin chun Chen Clinton J. Mielke II.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, and Ivan Osipkov. SIGCOMM, Presented.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Cryptography and Network Security Sixth Edition by William Stallings.
KAIST TS & IS Lab. CS710 Know your Neighbors: Web Spam Detection using the Web Topology SIGIR 2007, Carlos Castillo et al., Yahoo! 이 승 민.
1 Modeling and Measuring Botnets David Dagon, Wenke Lee Georgia Institute of Technology Cliff C. Zou Univ. of Central Florida Funded by NSF CyberTrust.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Microsoft Research, Silicon Valley Geoff Hulten,
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
1 Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Speaker: Jun-Yi Zheng 2010/01/18.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
How dynamic are IP addresses? Yinglian Xie, Fang Yu, Kannan Achan, Eliot Gillum, Moises Goldszmidt, Ted Wobber SIGCOMM ‘07 Chulhyun Park
Learning to Detect and Classify Malicious Executables in the Wild by J
Domain Reputation Hussien Othman.
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
De-anonymizing the Internet Using Unreliable IDs
De-anonymizing the Internet Using Unreliable IDs By Yinglian Xie, Fang Yu, and Martín Abadi Presented by Peng Cheng 03/22/2017.
Modeling Botnet Propagation Using Time Zones
Botnet Detection by Monitoring Group Activities in DNS Traffic
Presentation transcript:

1 Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Speaker: Jun-Yi Zheng 2010/03/29

2 Reference  Roberto Perdisci, Igino Corona, David Dagon, and Wenke Lee. " Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces."ACSAC'09

3 Outline  Introduction  System Architecture  Experiments  Conclusions

4 Introduction  Fast-flux service networks(FFSNs) a new ( ~2007) technique to maximize botnets availability simple idea: add an additional indirection layer (i.e., proxy) between victims and controlling elements a large number of proxy hosts (flux agent) are used to relay requests to the back-end server (mother- ship) a decentralized botnet with constantly changing public DNS records

5 Fast-flux botnets Architecture

6 Characteristics of Flux Domain Names  Short time-to-live (TTL)  The set of resolved IPs returned at each query changes rapidly  The overall set of resolved IPs obtained by querying the same domain name over time is often very large  The resolved IPs are scattered across many different networks

7 Approach Passive analysis of recursive DNS  Not only spam and precompiled domain blacklists  Active probing may be detected by the attacker Classify domains  previous works, single domain names are considered independently from each other

8 System Overview

9 Notation  q (d) : a DNS query performed by a user at time t i to resolve the set of IP addresses owned by domain name d  Q (d) i : the total number of DNS queries related to d ever seen until t i  T (d) : the TTL of the DNS response  Ť (d) i : the maximum TTL ever observed for d  P (d) : the set of resolved Ips returned by the RDNS server  prefix(P (d), 16) : the set of distinct /16 network prefixes extracted from P (d)  R (d) i : the cumulative set of all the resolved IPs ever seen for d until time t i  G (d) i : a sequence of pairs {(t j, r (d) j )} j=1..i where r (d) j = |R (d) j | − | R (d) j −1|

10 Traffic Volume Reduction (F1)  q (d) = (t i, T (d), P (d) )  F1-a) T (d) <= seconds (i.e., 3 hours) Because such domain names ( TTL >= 10800) are unlikely to be “fluxing”  F1-b) |P (d) | >= 3 OR T (d) <= 30 Because the uptime of each flux agent is not easily predictable  A large set of resolved IPs, or  A very low TTL ( equal or close to zero )  F1-c) p = |prefix(P (d),16)| / |P (d) | >= 1/3 Flux agents are often across many different networks and organizations

11 Periodic List Pruning (F2)  d = (t i, Q (d) i, Ť (d) i, R (d) i, G (d) i )  F2-a) Q i > 100 AND |G (d) i | < 3 AND ( |R (d) i | <= 5 OR p <= 0.5 ), remove from a list of candidate flux domains domain names that do not pass F2 are very unlikely to be related to flux services

12 Domain Clustering  IP-based Domain Clustering a number of fast-flux domain names all point to the same flux service  single-linkage hierarchical clustering algorithm Input: a similarity matrix; Output: a dendrogram The length of the edges represent the distance between clusters

13 Service Classifier  “Passive” feature -- collected by passively monitoring the DNS queries Ψ1-Number of resolved IPs Ψ2-Number of domains Ψ3-Avg. TTL per domain Ψ4-Network prefix diversity  the ratio between the number of distinct /16 network prefixes and the total number of IPs Ψ5-Number of domains per network  how many domains can be associated to the IPs in a cluster, throughout different epochs Ψ6-IP Growth Ratio 

14 Service Classifier  “Active” feature -- need some additional external information to be computed Ψ7-Autonomous System (AS) diversity Ψ8-BGP prefix diversity Ψ9-Organization diversity Ψ10-Country Code diversity Ψ11-Dynamic IP ratio  a reverse (type PTR) DNS lookup for each IP,“dhcp”, “dsl”, “dial-up”, etc., Ψ12-Average Uptime Index  actively probing each IP in a cluster about six times a day for a predefined number of days  C4.5 decision-tree classifier

15 Collecting RDNS Traffic  2009/3/1 ~2009/4/14  two traffic sensors in front of two different RDNS servers of ISP  more than 4 million users  about 1.3 billion DNS queries of type A and CNAME per sensor  over 2.5 billion DNS queries per day related to hundreds of millions of distinct domain names

16 Evaluation of the Service Classifier  we manually inspected and labeled a fairly large number of clusters of domains AUCDRFP All Features0.992 (0.003)99.7% (0.36)0.3% (0.36) Passive Features0.993 (0.005)99.4% (0.53)0.6% (0.53) Ψ6, Ψ3, Ψ (0.006)99.3% (0.49)0.7% (0.49) Table I: Classification performance computed using 5-fold cross-validation. AUC=Area Under the ROC Curve; DR=Detection Rate; FP=False Positive Rate. The numbers between parenthesis represent the standard deviation of each measure.

17 Can this Contribute to Spam Filtering?  Intuition if the domain name of the website points to one or more previously detected flux agents, it is very likely that the website is malicious

18  Detection rate: 90% to 95%  that several of the domain names detected as malicious did not appear to have a “fluxing” behavior themselves, but resolved to a flxed set of IP that partially intersected with the IP of flux agents

19 Conclusions  passive approach for detecting malicious flux service networks in-the-wild Not limited to the analysis of suspicious domain names extracted from spam s or precompiled domain blacklists  Our passive detection and tracking of malicious flux service networks may benefit spam filtering applications