Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin...

18
Report: 鄭鄭鄭 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni Vigna, in Proceedings of the ACM CCS, Chicago, IL, November 2009. 111/06/20 1 Machine Learning and Bioinformatics Lab

Transcript of Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin...

Page 1: Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.

Report:鄭志欣

Conference:Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni Vigna, in Proceedings of the ACM CCS, Chicago, IL, November 2009.

112/04/19 1Machine Learning and Bioinformatics Lab

Page 2: Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.

Date Collect : 2009/1/25 ~ 2009/2/5

180’000 infections

70GB data

USD$ 83,000 ~ 8,300,000 (bank account and credit card)

112/04/19 2Machine Learning and Bioinformatics Lab

Page 3: Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.

Introduction Botnet Analysis Threats and data analysis Conclusion

112/04/19Machine Learning and Bioinformatics Lab 3

Page 4: Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.

The main purpose of this paper is to analyze the Torpig botnet’s operations.• Botnet size.• The personal information is stolen by

botnets.

112/04/19Machine Learning and Bioinformatics Lab 4

Page 5: Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.

Torpig solves fast-flux by using a different technique for locating its C&C servers, which we refer to as domain flux.

112/04/19Machine Learning and Bioinformatics Lab 5

Page 6: Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.

Data Collection and Format

Submission Header

Botnet Size vs. IP Count

112/04/19Machine Learning and Bioinformatics Lab 6

Page 7: Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.

Date : 70GB (10 day)

Protocol : HTTP POST requests

Submission Header VS. Request body

112/04/19Machine Learning and Bioinformatics Lab 7

Page 8: Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.

112/04/19Machine Learning and Bioinformatics Lab 8

Ts = time stamp IP Sport = SOCKS proxies port Hport = HTTP port OS = operation system version Cn = locale Nid = bot identifier Bld and ver = build and version number of Torpig

gh5

Page 9: Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.

112/04/19Machine Learning and Bioinformatics Lab 9

Page 10: Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.

Counting Bots by Submission Header Fields

(nid , os , cn , bld , ver) decide to unique bot

Delete Probers and Researcher

18200 hosts

112/04/19Machine Learning and Bioinformatics Lab 10

Page 11: Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.

112/04/19Machine Learning and Bioinformatics Lab 11

4690 Bots / hour

705 Bots / hour

Page 12: Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.

112/04/19Machine Learning and Bioinformatics Lab 12

Page 13: Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.

DHCP (ISPs recycles IPs)

112/04/19Machine Learning and Bioinformatics Lab 13

Page 14: Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.

Financial Data Stealing

Password Analysis

112/04/19Machine Learning and Bioinformatics Lab 14

Page 15: Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.

In ten days, Torpig obtained the credentials of 8,310 accounts at 410 different institutions. The top targeted institutions were PayPal (1,770 accounts), Poste Italiane (765), Capital One (314), E*Trade (304), and Chase (217).

112/04/19Machine Learning and Bioinformatics Lab 15

Page 16: Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.

112/04/19Machine Learning and Bioinformatics Lab 16

Page 17: Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.

we found that a naïve evaluation of botnet size based on the count of distinct IPs yields grossly overestimated results.

112/04/19Machine Learning and Bioinformatics Lab 17

Page 18: Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.

112/04/19Machine Learning and Bioinformatics Lab 18