Presentation is loading. Please wait.

Presentation is loading. Please wait.

BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang, and.

Similar presentations


Presentation on theme: "BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang, and."— Presentation transcript:

1 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology Presented by Joshua Cox

2 Botnet Group of compromised computers Controlled by remote commands
Malicious activities DDoS attacks – spam phishing – identity theft Protocols IRC, HTTP, P2P

3 Centralized Botnets Botmaster sends command to designated C&C server
Bots request commands from server

4 P2P Botnets No C&C server Botmaster sends command to any bot
Bots share commands with neighbors

5 Rishi Detects IRC based botnets Monitors traffic Suspicious nicknames
Suspicious servers Uncommon server ports

6 BotSniffer Network based anomaly detection
All bots within a botnet will share similar traffic patterns Works with IRC and HTTP botnets Does not detect P2P botnets

7 BotHunter Works with Relies on “Infection Lifecycle Model”
IRC and HTTP P2P botnets Relies on “Infection Lifecycle Model” What if we change the lifecycle?

8 BotMiner Objective Detect groups of compromised machines that are part of a botnet Independent of C&C communication structure and content Minimal false positives Resource efficient detection

9 BotMiner Architecture

10 BotMiner Architecture

11 C-plane Monitor Who is talking to whom? TCP and UDP traffic flows
time, duration source, destination packet count, bytes transferred Manageable log size less than 1GB per day for 300 Mbps network

12 A-plane Monitor Who is doing what? Detects malicious activities
scanning – binary downloading spamming – exploit attempts Snort with custom plugins expandable

13 C-plane Clustering Which machines have similar communication patterns?
C-plane monitor logs → cluster reports

14 C-plane Clustering Basic Filtering Remove internal flows
Remove one way flows

15 C-plane Clustering White Listing Remove flows to popular destination
Google, Yahoo, etc.

16 C-plane Clustering Aggregation
C-flow: all traffic flows over a period of time that share the same source, destination, and protocol

17 C-plane Clustering Feature Extraction
flows per hour – bytes per packet packets per flow – bytes per second

18 C-plane Clustering Two-step Clustering
Coarse-grain and Refined clustering X-means clustering algorithm

19 A-plane Clustering Which machines have similar activity patterns?
A-plane monitor logs → cluster reports

20 A-plane Clustering Activity Type Clustering scan – spam
binary download – exploit

21 A-plane Clustering Activity Feature Clustering
target subnet – similar binary spam content – exploit type

22 Cross-plane Correlation
Which machines are in a botnet? Botnet score Number of clusters Score of other hosts in cluster Activity weighting Which bots are in the same botnet?

23 Test Case Georgia Tech campus network Ran monitors for 10 days
up to 300 Mbps Ran monitors for 10 days wide variety of protocols Obtained traces for 8 botnets IRC, HTTP, and P2P

24 Botnets Used Overlaid malicious traffic on normal traffic
Mapped IPs from random hosts to bots

25 Filtering Results Internal/External filter reduces data by 90%
10 billion packets reduced to 50k C-flows

26 Detection Results All botnets detected 99.6% bot detection
0.3% false positive rate

27 Limitations Traffic randomization and mimicry
C-plane cluster evasion Individual or group commands A-plane cluster evasion Delay bot tasks Cross-plane analysis evasion

28 References Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. 17th USENIX Security Symposium (Security'08), San Jose, CA, 2008. D. Pelleg and A. W. Moore. X-means: Extending k-means with efficient estimation of the number of clusters. In Proceedings of the Seventeenth International Conference on Machine Learning (ICML’00), pages 727–734, San Francisco, CA, USA, Morgan Kaufmann Publishers Inc. J. Goebel and T. Holz Rishi: Identify bot contaminated hosts by irc nickname evaluation. In Proceedings of USENIX HotBots’07, 2007. G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. BotHunter: Detecting malware infection through ids-driven dialog correlation. In Proceedings of the 16th USENIX Security Symposium (Security’07), 2007. G. Gu, J. Zhang, and W. Lee. BotSniffer: Detecting botnet command and control channels in network traffic. In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS’08), 2008.


Download ppt "BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang, and."

Similar presentations


Ads by Google