Top Banner
Containing and Tracking Botnets Angelos D. Keromytis Columbia University
31
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Containing and Tracking Botnets

Angelos D. Keromytis

Columbia University

Page 2: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Prevention and Attribution

• Consent-based networking (i.e., network capabilities)– Explore the expensive-but-expressive end of

the design spectrum– GRA: Mansoor Alicherry

• Identify ultimate source of C&C traffic (botmaster)– Adopt technique we developed in attacking

anonymity networks– GRA: Sambuddho Chakravarty

February 2010 Project Review Meeting 2

Page 3: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Expressive Capabilities

• Network capabilities proposed as a decentralized (management) and distributed (enforcement) containment mechanism

• Typical designs try to minimize space and processing overhead

• We are exploring opposite side of spectrum: expressive but expensive capabilities– What is the limit of capabilities?– Can they be managed?– Can we gain flexibility with minimal overhead?

February 2010 Project Review Meeting 3

Page 4: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Example environment: MANETs

February 2010 Project Review Meeting 4

Page 5: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Our Approach

• Policy enforcement framework– Capability: Access rules and bandwidth constraints

represented using capabilities– Deny-by-default: Every packet in the network needs to

have an associated capability– Distributed Enforcement: All the intermediate nodes

enforce the capability policy

• Unauthorized traffic dropped closer to the source– Protects end-host resources and network bandwidth

February 2010 Project Review Meeting 5

Page 6: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Network Capabilities

• Access control and bandwidth limitation represented using capability– Identity of the principal– Identity of the destination– Type of service and bandwidth– Expiration date– Issuer & Signature

• Policy tokens– Issued by the administrator

• Network capability– Issued by the receiving node– Contains policy authorizing it to issue

February 2010 Project Review Meeting 6

Page 7: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Policy Token Example

serial: 130745owner: unit01.nj.army.mil (public key)destination: *.nj.army.milservice: httpsbandwidth: 50kbpsexpiration: 2010-12-31 23:59:59issuer: captain.nj.army.milsignature: sig-rsa 23455656767543566678

February 2010 Project Review Meeting 7

Page 8: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Network Capability Example

serial: 1567owner: unit01.nj.army.mil (public key)destination: unit02.nj.army.milbandwidth: 150kbpsexpiration: 2009:10:21 13:05:35issuer: unit02.nj.army.milcomment: Policy allowing the receiverto issue this capability.signature: sig-rsa 238769789789898

February 2010 Project Review Meeting 8

Page 9: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Protocol• Capability associated with each communication

session– Transaction identifier and signature

• Capability Establishment– Source node informs the intermediate nodes about

transaction identifier, capability and key for signature• Smaller keys used for per packet signature|

• Sender– Adds transaction id, sequence number and signature to

the packet• Intermediate nodes and Receiver

– Verifies the packet (probabilistically) for signature and bandwidth

February 2010 Project Review Meeting 9

Page 10: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

System Architecture

February 2010 Project Review Meeting 10

Page 11: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Evaluation Methodology

• Simulations using GloMoSim– Extend GloMoSim for new architecture– Add support for packet processing delays

• Input Parameters– Conducting experiments in stand alone settings (Pentium-4

3.20GHz CPU, 1GB RAM)

• Traffic– CBR, FTP

• From simple (line) to complex (grid, random) topology– With mobility

February 2010 Project Review Meeting 11

Page 12: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Parameters of Interest

• Latency of packets– Time taken for a packet to travel from a source

to destination– First packet latency, Average latency

• Throughput• Packet Delivery Ratio (PDR)

February 2010 Project Review Meeting 12

Page 13: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Latency of first packet

• Capability establishment, database lookup, signature verification, larger header (36B)

• Overhead (35.8 mS, 41.6 mS, 60.9 mS) – About 20.5%

• Line topology (node distance =

200 m)

• CBR 512 B

February 2010 Project Review Meeting 13

Page 14: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Future Directions

• Proceeding with implementation and performance evaluation on wireless testbed

• Evaluation of usability aspects– Token issuance– Revocation– Disconnected operation

• Explore multi-party consent– Capabilities can incorporate hierarchy,

thresholds, and other schemes authorizing 3rd parties to control aspects of the communication

February 2010 Project Review Meeting 14

Page 15: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Attribution

• Can we identify the node that originates commands?– botmaster may use proxies– botnet may be inherently decentralized (P2P)– we don’t have presence in all routers and links– C&C traffic may be encrypted

• Insight: remote sensing of a link’s available bandwidth, combined with induced oscillations of specific types of botnet traffic, can allow us to track where such traffic goes

February 2010 Project Review Meeting 15

Page 16: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Emulating a Global Eavesdropper

• Induce traffic fluctuations on botnet traffic that is ultimately intended for the botmaster– e.g., information harvesting– not all botnets may allow this– may require capture or emulation of bots– need large amounts of such traffic

• may be detected

• Trace the effects of those fluctuations by measuring available bandwidth on remote links– need a lot of bandwidth, and a network map

February 2010 Project Review Meeting 16

Page 17: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Bandwidth Estimation

• Send pair of “back-to-back” packets to destination

• Pair “spreads” in time; we call this dispersion

BW = (Packet Length * 8) / (dispersion) (measured in bps)

• Packet train method: send multiple back-to-back packets– fewer errors (equivalent to multiple

independent* trials)

February 2010 Project Review Meeting 17

Page 18: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

LinkWidth

• Tool that emulates TCP Westwood sender to measure available bandwidth and throughput– TCP-Westwood uses bandwidth estimation

every RTT seconds to adjust the TCP slow start threshold whenever congestion is detected

• Generates TCP RST packets “sandwiched” between TCP SYN packets– TCP SYNs go to closed ports, eliciting TCP

RST+ACK responses• If TCP SYNs are filtered, we resort to ICMP

February 2010 Project Review Meeting 18

Page 19: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Remote Bandwidth Sensing

• Use LinkWidth against routers to measure the available bandwidth on the links from probe host to that router– need static topology map

• Induce severe traffic fluctuations on traffic whose ultimate destination we want to identify– traffic volume must be mostly preserved

• Trace back fluctuations on available bandwidth, one link at a time

February 2010 Project Review Meeting 19

Page 20: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Experimental Testbed

February 2010 Project Review Meeting 20

Page 21: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Preliminary Experimental Results

• Test for accuracy: 10Mbps link shared by up to 3 HTTP sessions (each at 500 Kbps)

• Test for convergence: increase traffic from 200Kbps to 1.4Mbps in less than 2 minutes

February 2010 Project Review Meeting 21

Page 22: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Probing Nodes in TOR

February 2010 Project Review Meeting 22

Page 23: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Future Directions

• Automate process; currently, requires human operator

• Improve sensitivity and reduce FPs• Considerably more evaluation

– currently working on DETER topologies– also experimenting on TOR

February 2010 Project Review Meeting 23

Page 24: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Outreach and Education

• Integrated material on bots into COMS W4180 course• 1 invited talk (beyond conference talks)

• Working with Symantec to determine modus operandi of rogue AV sites (and why users trust them)– Preliminary results published in the October 2009

Interim Symantec Threat Report (ISTR)

"Gone Rogue: An Analysis of Rogue Security Software Campaigns" Marc Cova, Corrado Leita, Olivier Thonnard, Marc Dacier, and Angelos D. Keromytis. In Proceedings (electronic) of the 5th European Conference on Computer Network Defense (EC2ND). November 2009, Milan, Italy. (Invited paper)

February 2010 24Project Review Meeting

Page 25: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Backup slides

February 2010 Project Review Meeting 25

Page 26: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Input Parameters

• Radio range = 377m, link bandwidth = 2 Mbps, 802.11 MAC

• Packet processing time = 0.01 mS (equavalent to 100Mbps for 128 B packets)

• Database: insertion = 0.01 mS, lookup = 0.005 mS

• 1024 bit RSA for capability– Signature 3.159 mS, verification 0.140 mS

• 256 bit for packet signature– Signature 0.168 mS, Verification 0.0275 mS

February 2010 Project Review Meeting 26

Page 27: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Average Latency

• Database lookup, signature verification, larger header (36B)• Overhead (0.6 mS, 1.2 mS, 1.6 mS) – About 8%

• Line topology

• CBR 512 B, 100 mS, 1000 pkts

February 2010 Project Review Meeting 27

Page 28: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Throughput (CBR)

• Throughput overhead: 2% lower for our scheme

• Line topology

• CBR 1400 B, 1 mS

February 2010 Project Review Meeting 28

Page 29: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Throughput (FTP)

• Throughput overhead: 5.3% lower for our scheme

• Line topology

• 10 FTP files

February 2010 Project Review Meeting 29

Page 30: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Route Change

• Original Drops: 108mS worth of traffic• Our scheme: 155mS

• Line topology

• CBR 512 B, 1000 pkts

• Path length: 3

• Route change at 0.5 S

February 2010 Project Review Meeting 30

Page 31: Containing and Tracking Botnets Angelos D. Keromytis Columbia University.

Mobility on Grid

• PDR overhead: 1.6% (50mS), 9.14(25mS) lower for our scheme

• Random topology: 50 nodes,

1200x1200m grid

• CBR 256 B

• 5 pairs of traffic

• Random way point mobility

February 2010 Project Review Meeting 31