Top Banner

of 28

D1T3 - Jose Nazario - Tracking Large Scale Botnets

Jun 03, 2018

Download

Documents

Nije Mohd
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    1/28

    Measuring Botnet Populations

    Jose Nazario, Ph.D.

    [email protected]

    October 2012

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    2/28

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    3/28

    Overview

    Background

    Implications Why count?

    Measurement Methodologies

    Limitations and Complications

    Recommendations

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    4/28

    Jose Nazario, Ph.D.

    Invincea Labs, 2012-present Prior: Arbor Networks, 2002-2012

    My fourth HITB

    2004, 2007, 2010, 2012 Interests

    Botnets/malware, large scale trends and data, cyberwarfare, etc

    Active with ENISA, FIRST, HoneynetProject

    Ph.D. in Biochemistry

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    5/28

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    6/28

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    7/28

    Why Count?

    Prevalence measurements By geographic region Prioritize efforts

    Scale of resources needed to gather

    Know when to call it a victory (counts = 0)

    Size of possible impact Financial, attack, etc

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    8/28

    Counting Methodologies

    Sinkholes Traffic logs and telltale signs Botnet panels Darknet monitors Direct observation

    Network

    Host P2P enumeration

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    9/28

    Sinkholes

    Redirect botnet command and control(CnC) server to your own host DNS injection

    P2P injection Route redirection

    Often called "hijacking" Count unique IPs per day connecting

    Very common

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    10/28

    Khelios Sinkhole from Kaspersky

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    11/28

    1 Year of Conficker Sinkhole Data

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    12/28

    Traffic Logs

    Assume some feature to count on Unique identifier per client IP Hostname, MAC address

    Infection count (e.g. q=N in Conficker)

    Can help give some better numbers

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    13/28

    Conficker Counts

    Used q value per client IP q was used to report victim counts

    Summed values per day

    Source: Arbor Networks

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    14/28

    Darknet Monitoring

    Monitor large, unused IPv4 address spaceblocks Contiguous or disparate

    Fingerprint bot specific signs TCP/IP service Exploit attempts

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    15/28

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    16/28

    URL Shorteners

    Use case: malicious links spammed using a linkshortener

    Services used to map long URLs to shorter one Great for space-limited uses Great for obfuscating malware/intent

    Several provide statistics we can openly view

    Limitations Some click out of research but not to get infected Unknown infection/block rates

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    17/28

    Example from adrive bydownload using

    goo.gl link

    Showscountries,

    referrers,platforms, etc

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    18/28

    Direct: Network Flows

    Count traffic to designated CnCs Upstream Aggregate of multiple views

    Pretty rare, people just take down CnCinstead

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    19/28

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    20/28

    Direct: P2P Enumeration

    Crawl the P2P network (for P2P bots) Record list of IPs seen over time Receive updated peer lists

    Requires that you know the protocol Easily thwarted with strong crypto

    Storm worm, Miner botnet, etc

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    21/28

    Miner P2P Botnet

    Source: Kaspersky Labs

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    22/28

    Limitations

    Network visibility Redirection by ISP DNS blacklists Offline hosts Inaccurate reporting by the bot

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    23/28

    Complications

    DHCP Overcounting: 1 IP does not equal 1 host We estimated 10% volatile DHCP (

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    24/28

    2008 Fast Flux Study: 1% visibility via DNS

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    25/28

    Paper from HotBots 2007

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    26/28

    Other Uses of Botnet Infection Data

    Notifications Very big in the operational security community

    DCWG, CWG, FBWG, etc Cleanup, etc

    Global efforts US IBG, AU iCode, NL, DE, JP, etc

    Visualizations - pretty art Great for demos, education Also see http://www.vizsec.org/#program

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    27/28

    Source: http://www.f-secure.com/weblog/archives/00002430.html

  • 8/12/2019 D1T3 - Jose Nazario - Tracking Large Scale Botnets

    28/28

    Thank [email protected]

    @jnazario