Top Banner
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu.et al July 28-August 01 2008
18

Botnet Research Survey

Jan 02, 2016

Download

Documents

dana-holman

Botnet Research Survey. Zhaosheng Zhu. et al July 28-August 01 2008. Speaker: Hom-Jay Hom Date:2009/10/20. Outline. Introduction Understanding Botnet Detecting and Tracking Botnet Defenses Against Botnet Conclusion and Possible Future Work. Introduction(1/2). - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Botnet Research Survey

Speaker: Hom-Jay Hom

Date:2009/10/20

Botnet Research Survey

Zhaosheng Zhu.et alJuly 28-August 01 2008

Page 2: Botnet Research Survey

OutlineIntroduction

Understanding Botnet

Detecting and Tracking Botnet

Defenses Against Botnet

Conclusion and Possible Future Work

112/04/20 2

Page 3: Botnet Research Survey

Introduction(1/2)Botnet is a term for a collection of software robots, or bots.

They run on groups of zombie computers controlled remotely by attackers.

A typical bot can be created and maintained in four phases.

112/04/20 3

Page 4: Botnet Research Survey

Introduction(2/2)1. Initial Infection:

vulnerability , web pages , email , USB autorun

2. Secondary Injection:infected hosts download and run the bot code, The download can be via be ftp, http and P2P.

3. Malicious Activities:The bot communicates to its controller (spam , DDoS)IRC or HTTP or DNS-based and P2P protocol

4. Maintenance and Upgrade:continuously upgrades

112/04/20 4

Page 5: Botnet Research Survey

Understanding BotnetMost current research focuses on understanding botnets. There are mainly three types area:

1. Bot Anatomy:analysis mainly focuses on its network-level use of binary analysis tools.

2. Wide-area Measurement Study:through tracking botnets to reveal different aspectssuch as botnet size, traffic generated.

3. Botnet Modeling and Future Botnet Prediction:

112/04/20 5

Page 6: Botnet Research Survey

Bot Anatomy

IRC Botit analyzed the source code for four bots.

Agobot,SDBot, SpyBot and GT bot, ( IRC-based bots )

only Agobot is a fully-developed bot.

Agobot has provided the following five features.

112/04/20 6

Page 7: Botnet Research Survey

AgoBot five features1. Exploits:

exploit OS vulnerabilities and back doors.

2. Delivery:Shell on the remote host to download bot binary encoded.

3. Deception:If it detected VMWare it stopped running.

4. Function:steal system information and monitorlocal network traffic.

5. Recruiting:Botmaster Recruits horizontal and vertical scannings.

112/04/20 7

Page 8: Botnet Research Survey

HTTP BotAnalyzed the HTTP-based spam bot module

The command and control (C&C) is http-based.The communication channel is encrypted.IDA Pro Tool is used to analyze the binary and find the encryption key.

112/04/20 8

Page 9: Botnet Research Survey

P2P-basedThe author claims that centralized control of botnets offers a single point of failure for the botnet.

So mare stable architectures, like P2P-based architecture.

112/04/20 9

Page 10: Botnet Research Survey

Fast-flux Networks(1/2)The fast-flux networks are increasingly used as botnets.

phishing websites.

These websites are valuable assets.hide their IP addresses.

let a user first connect to a compromised computer.which serves as a proxy.To forward the user requests to a real server and the response

from the server to the user.

112/04/20 10

Page 11: Botnet Research Survey

Fast-flux Networks(2/2)New type of techniques called Fast-flux service networks.

round-robin IP addresses. very short Time-To-Live.

112/04/20 11

Page 12: Botnet Research Survey

Wide-area Measurement Studya honeynet-based botnet detection system as well as some findings on botnets across the Internet

The systems are composed of three module:

1. malware collection:nepenthes and unpatched WindowsXPin a virtualized

environment.2. Graybox testing:

learn botnet ”dialect”.

3. Botnets tracking:an IRC tracker lurk in IRC channel and record commands.

112/04/20 12

Page 13: Botnet Research Survey

Botnet Modeling and Future Botnet Prediction

It creates a diurnal propagation model based on the fact that computers that are offline are not infectious.

we still have no idea how close these models are to the botnets in the real world.

112/04/20 13

Page 14: Botnet Research Survey

Detecting and Tracking Botnet

honeynet basedfirst, there are several tools available to collect malware, but no tool for tracking the botnet.Secondly,the tracking tool needs to understand the botnet’s ”jargon” in order to be accepted by the botmaster.Moreover, the increasing use of anti-analysis techniques used by the blackhat circle.makes the development of the tool even more challenging.

112/04/20 14

Page 15: Botnet Research Survey

Traffic monitoringIdentify botmasters based on transport layer

The core idea is based on the attack and control chain of the botnet.

The major steps are listed as follows:

1. Identify bots based on their attack activities.

2. Analyze the flows of these bots to find candidate controller connections.

3. Analyze the candidate controller connections to locate the botmaster.

112/04/20 15

Page 16: Botnet Research Survey

Defenses Against BotnetEnterprise Solutions

Trend Micro provided Botnet Identification Serviceprovide the customers the real-time botnet C&C botmaster address list.

112/04/20 16

Page 17: Botnet Research Survey

Conclusion and Possible FutureWorkHTTP/P2P Botnet

The existing works are anatomy of some samples.

Fast-flux NetworkWho do them serve?What’s the structure of its network? Is it the same as a typical IRC botnet or not?Is their botmaster also fast-fluxed?The binary analysis of its code will be extremely helpful.

112/04/20 17

Page 18: Botnet Research Survey

END

112/04/20 18