Top Banner
TorBot: Protecting the Tor Network against Malicious Traffic Advisor: Paulo Lício de Geus Marcelo Invert Palma Salas (PhD Candidate @UNICAMP) Esdras Rodrigues Do Carmo (Scientific Initiation Fellow) Vitor Falcão da Rocha (Scientific Initiation Fellow) University of Campinas With support from Frida Lacnic Finance Agency
16

Presentacao LACNIC 27 - 2017 v1.ppt [Modo de compatibilidad]

Mar 19, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Presentacao LACNIC 27 - 2017 v1.ppt [Modo de compatibilidad]

TorBot: Protecting the Tor Network against Malicious Traffic

Advisor: Paulo Lício de GeusMarcelo Invert Palma Salas (PhD Candidate @UNICAMP)Esdras Rodrigues Do Carmo (Scientific Initiation Fellow)

Vitor Falcão da Rocha (Scientific Initiation Fellow)

University of CampinasWith support from Frida Lacnic Finance Agency

Page 2: Presentacao LACNIC 27 - 2017 v1.ppt [Modo de compatibilidad]

The Tor Network

… is an overlay network that enables anonymous communication betweenapplications that communicate over TCP [1]. protecting your privacy andidentity on the Internet.

Tor also protects our data against corporate or government targeted masssurveillance.

Despite being used mainly by activists, journalists and bloggers, it supportsillicit services and is prone to carry 30X more malicious traffic comparedwith others networks [2].

2

Page 3: Presentacao LACNIC 27 - 2017 v1.ppt [Modo de compatibilidad]

How does Tor Work?

3

• Tor is a group of volunteer–operated servers.

• Composed by 3 relays (guard, middle and exit), it applies distributed security tothe network.

• Each router knows only the sender and

receiver.

Page 4: Presentacao LACNIC 27 - 2017 v1.ppt [Modo de compatibilidad]

Deep problems in the deep web

• Governmental Vigilance (In particular Exit Relay and spoofing Hidden Services (HS))

• Connection speed (New competition: Rifle - MIT, I2P, Freenet)

• Malicious Traffic:

• P2P (BitTorrent)

• Hackers

• Malware (botnets, rasomware (WannaCry))

• Illegal Markets (drugs, counterfeit products, cigars, medicines) <=> gray market {Aliexpress, DHgate, iOffer}

• HS (are 2% of Tor traffic, 1.5% are malicious traffic).

• Kidnappers and blackmailers (rescue -> Bitcoins, Ripple, Ethereum, NEM, Litecoin, & among others)

4

Page 5: Presentacao LACNIC 27 - 2017 v1.ppt [Modo de compatibilidad]

5

Page 6: Presentacao LACNIC 27 - 2017 v1.ppt [Modo de compatibilidad]

State of the Art of the Hidden Services in TorIn [3], the authors analyzed more than 80.000 hidden services, finding:

85% of HS are up for less than 5 days,

+100 new HS come online,

There is increased usage by malware (botnets, ransomware, etc.) in relation to the surface web.

6

0

2

4

6

8

10

12

14

16 15,4

9 9

6,2 5,7 5,2 5,2 5,2 4,75 4,5 4,25 4,25 3,52,75 2,7 2,5 2,5 2 2 2

10,4

Page 7: Presentacao LACNIC 27 - 2017 v1.ppt [Modo de compatibilidad]

How Malicious Traffic Works in Tor?

• Malware (botnets, rasomware, …)

• Illegal market (drugs, guns, …)

• Bitcoin (anonymous transactions)

7

Page 8: Presentacao LACNIC 27 - 2017 v1.ppt [Modo de compatibilidad]

Architecture for Discovering and Blocking Malicious Traffic

8

Page 9: Presentacao LACNIC 27 - 2017 v1.ppt [Modo de compatibilidad]

Protecting the Tor Network against Malicious TrafficOur proposal is divided into three phases:

i) Collect; ii) analysis and classification; iii) tracing and blocking malicioustraffic.

This include:

Setting up a network capture and re-routing of the benign traffic;

System development for analyzing, back tracing, and blocking malicioustraffic like botnets and others malware;

An application to recognize and block malicious hidden services.

To achieve this goal, we propose using tools such as:

Traffic analyzers;

IDS and VirusTotal;

Machine learning techniques and metadata analyzing.

9

Page 10: Presentacao LACNIC 27 - 2017 v1.ppt [Modo de compatibilidad]

Protecting the Tor Network against Malicious TrafficOur proposal is divided into three phases:

i) Collect ii) Analysis and Classification iii) Tracing and Blocking

---------------------------malicious traffic---------------------------

10

Page 11: Presentacao LACNIC 27 - 2017 v1.ppt [Modo de compatibilidad]

Collect Malicious Traffic

More than 1200 samples:

• http://cerberussssc7cat.onion/

• https://zeltser.com/malware-sample-sources/

• https://github.com/ytisf/theZoo

• https://github.com/aboutsecurity/malware-samples

• https://github.com/ashishb/android-malware

• https://github.com/fdiskyou/malware

• https://gist.github.com/rain-1/989428fa5504f378b993ee6efbc0b168 (WannaCry)

11

Page 12: Presentacao LACNIC 27 - 2017 v1.ppt [Modo de compatibilidad]

Analysis and Classification Malicious Traffic

Some Results for Windows 8.1:

• Decision Tree: 96.15%

• Gaussian Naive Bayes: 96.44%

• Multinomial Naive Bayes: 94.49%

• Neural Network MLP: 97,7%

• SVM: 98,22%

• WannaCry was detected by 4/5 algoritms.

12

Page 13: Presentacao LACNIC 27 - 2017 v1.ppt [Modo de compatibilidad]

How does a botnet work?

13

Page 14: Presentacao LACNIC 27 - 2017 v1.ppt [Modo de compatibilidad]

How does a botnet work with Tor?

14

Page 15: Presentacao LACNIC 27 - 2017 v1.ppt [Modo de compatibilidad]

References

1. Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, and Xinwen Fu. Torward:Discovery, blocking, and traceback of malicious traffic over tor. InformationForensics and Security, IEEE Transactions on, 10(12):2515-2530, Dec2015.

2. Tor metrics. https://metrics.torproject.org/, 2015.

3. Owen, Gareth, and Nick Savage. "Empirical analysis of Tor HiddenServices."IET Information Security (2015).

4. Gandeva B. Satrya, Niken D.W. Cahyani, and Ritchie F. Andreta. Thedetection of 8 type malware botnet using hybrid malware analysis inexecutable file windows operating systems. In Proceedings of the 17thInternational Conference on Electronic Commerce 2015, ICEC '15, pages5:1 5:4, New York, NY, USA, 2015. ACM.

5. A. Sanatinia and G. Noubir. Onionbots: Subverting privacy infrastructure forcyber attacks. pages 69-80, June 2015.

15

Page 16: Presentacao LACNIC 27 - 2017 v1.ppt [Modo de compatibilidad]

Obrigado!

16