1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex...

25
1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev
  • date post

    20-Dec-2015
  • Category

    Documents

  • view

    218
  • download

    2

Transcript of 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex...

Page 1: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

1

Understanding Botnet Phenomenon

MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev

Page 2: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

2

What is Botnet ?

Botnets is used to define networks of infectedend-hosts, called bots, that are under the control of a human operator commonly known as a bot master.

Command and control channels are used to disseminate the commands to the bots

IRC (Internet Relay Chat Protocols) is the main vehicle

Page 3: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

3

IRC Concept – RFC 1459

IRC is an open protocol that uses TCP

green – normal clients

blue - bots

orange - bouncers

Page 4: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

4

IRC Concept – RFC 1459

Example 1: A message between clients 1 and 2 is only seen by server A, which sends it straight to client 2.

Example 2: A message between clients 1 and 3 is seen by servers A & B, and client 3. No other clients or servers are allowed see the message.

Example 3: A message between clients 2 and 4 is seen by servers A, B, C & D and client 4 only. 1----\ A D---4 2--/ \ / B----C / \ 3 E

Servers: A, B, C, and D, E Clients: 1, 2, 3, 4

Page 5: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

5

How to Analyze Botnets?

Develop a scalable and robust infrastructure to capture and concurrently track multiple Botnets

Must be benign – not used to infect others outside the testing environment

Analysis of measurements, structural and behavioral aspect of Botnets

IRC tracking, DNS Cache probing (minimal)

Page 6: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

6

Birth of a Bot

Bots are born from program binaries that infect your PC

Self-replicating worms

E-mail viruses Shellcode (scripts)

Page 7: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

7

Data collection methodology

Phase 1: Malware collection– Collect as many different binaries (bots)

Phase 2: Binary analysis via gray-box testing– Analyze the sophistication of each bot

Phase 3: Longitudinal tracking of IRC botnets through IRC and DNS trackers– Monitor the pervasiveness of each bot

Page 8: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

8

Overview data collection

Malware collections (planet lab testbad) -darknet IP space /8

Capture missed from planetlab- parse

shellcode,binaries cllected is sent to botware anaylsis

engine

Page 9: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

9

Malware Collection

Unpatched Windows XP are run which is base copy Nepenthes mimics the replies generated by

vulnerable services in order to collect the first stage exploit

Honeynets used to catches exploits missed by nepenthes

Infected honeypot compared with base to identify Botnet binary

Page 10: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

10

Binary Analysis via graybox testing

Network fingerprint (DNS, IPs, Ports, scan) IRC (PASS, NICK, USER, MODE, JOIN) Learn the Botnet Dialect

Page 11: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

11

Longitudinal Tracking of Botnets

The IRC tracker (also called a drone) filters traffic and acts as a Bot to trick the IRC room to iteratively probe to find the footprint of particular Botnets

– Uses DNS Probing– Acts as a spy

DNS Tracking– 800,000 Name Servers

Page 12: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

12

Botnet Scanning

Worm-like – Immediately start scanning the IP space looking

for new victims after infection : 34 / 192

Variable scanning Botnets– Scan when issued some command by botmaster

Page 13: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

13

Botnet Scanning

Page 14: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

14

Botnet Growth

Page 15: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

15

Botnet Growth

Page 16: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

16

Botnet Phenomenon

Page 17: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

17

Botnet Phenomenon

Traffic Problem– 70% of the sources during peak periods sent shell exploits similar

to those sent by the botnet spreaders.– 90% of all the traffic during a particular peak targeted ports used

by botnet spreaders– the amount of botnet-related traffic is certainly greater than 27%.

Page 18: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

18

Botnet Statistics

60% were IRC bots– 70% of all the bots connect to a single IRC server

57,000 Active Bots per day for the first 6 months of 2006 ( Symantec )

4.7 million distinct computers being actively used in Botnets

Most Botnets are managed by a single server ( up to 15,000 bots )

Mocbot seized control of more than 7,700 machines within 24 hours

Page 19: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

19

Botnet Characteristics

Diverse set of operating systems. Anti-virus programs can detect and fix most

bots

Page 20: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

20

What is it that You say… You Do Here?

Log keystrokes for identity theft Installing Advertisement Addons Distributed Denial-of-Service Attacks Spamming Sniffing Traffic Keylogging Spreading new malware Google AdSense abuse Attacking IRC Chat Networks Manipulating online polls/games Mass identity theft

Page 21: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

21

Bot Capabilities

DDoS: Flooding attack and DDoS extortion Scanning Exploitation Download and Installation Click Fraud Server Services- Bot Hosting e.g. phishing Gateway and Proxy Functions:-HTTP proxy Spyware,Keylogging, data theft and packet

capture

Page 22: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

22

Conclusion

“the fight against botnets is a "war" that can only be won if all parties - regulators, governments, telecoms firms, computer users and hardware and software makers - work together. “

Botnets pose one of the most SEVERE threats to the Internet

– Are responsible for most of the unwanted traffic– Generators of SPAM

Ref http://news.bbc.co.uk/2/hi/business/6298641.stm

Page 23: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

23

Conclusion

Business Implications– DDOS – bring e-commerce to a halt– Wasting of money on SPAM filtering– Wasting of corporate time and $$

Page 24: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

24

Strengths of the paper

All aspects of a botnet analyzed No prior analysis of bots Ability to model various types of bots Ability to learn bot dialect and communicate with

them.

Page 25: 1 Understanding Botnet Phenomenon MITP 458 - Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.

25

Botnet

Questions ?