Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind...

22
Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk, Steven D. Gribble, and Arvind Krishnamurthy. "Studying Spamming Botnets Using Botlab." In NSDI, vol. 9, pp. 291-306. 2009. Presented by Sharan Dhanala

Transcript of Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind...

Page 1: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

Studying Spamming Botnets Using Botlab

John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy

[John 2009] John, John P., Alexander Moshchuk, Steven D. Gribble, and Arvind Krishnamurthy. "Studying Spamming Botnets Using Botlab." In NSDI,

vol. 9, pp. 291-306. 2009.

Presented by Sharan Dhanala

Page 2: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

2

Background on the Botnet Threat

• A botnet is a large-scale, coordinated network of computers, each of which executes specific bot software.

• Botnet operators recruit new nodes by taking control of the victim hosts and secretly installing bot code onto them.

• The resulting army of “zombie” computers is typically controlled by one or more command-and-control (C&C) servers.

• Botnets have become more sophisticated and complex in how they recruit new victims and mask their presence from detection systems 1. Propagation

2. Customized C&C protocols 3. Rapid evolution

Page 3: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

3

Botlab architecture

Image source: [https://www.usenix.org/legacy/event/nsdi09/tech/full_papers/john/john_html/figs/architecture.png]

Page 4: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

4

The Botlab Monitoring platform

• Botlab’s design was motivated by four requirements:o Attributiono Adaptationo Immediacyo Safety

• Incoming Spam o On an average, UW receives 2.5 million e-mail messages each day, over 90% of

which is classified as spam.

• Malware Collectiono Botlab crawls URLs found in its incoming spam feed.o Botlab periodically crawls binaries or URLs contained in public malware repositories

or collected by MWCollect Alliance honeypots.

Page 5: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

5

• Botlab executes spamming bots within sandboxes to monitor botnet behavior.

• Network fingerprintingo Each flow record <protocol, IP address, DNS address, port>

o Similarity coefficient of two binaries B1 and B2

o If similarity coefficient of two binaries is high then the binaries are to be behavioural duplicates.

The Botlab Monitoring platform

Identifying spamming bots

Page 6: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

6

The Botlab Monitoring platformIdentifying spamming bots

• Safely generating fingerprints o Tight rope between safety & effectiveness.

o Human operator with tools that act as safety net.

o Redirect traffic to spamhole.

• Experience classifying bots o Bots that detect VM & bare-metal.

o Bots checking domain name- required modifying spamhole.

o Bots perform comprehensive SMTP verification.

Page 7: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

7

The Botlab Monitoring platformExecution Engine

• Seven spamming bots:o Grum, Kraken, MegaD, Pushdo, Rustock, Srizbi, and Storm.

• Avoiding blacklisting o anonymizing “Tor” (The Onion router) network

• Multiple C&C serverso C&C redundancy mechanism

Image source: http://www.hotforsecurity.com

/images/zombie_network.jpg

Page 8: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

8

The Botlab Monitoring platformCorrelation analyzer

• Correlate incoming spam with outgoing spam and perform attribution; identify IPs for a given botnet.

• For spam that cannot be directly attributed, cluster based on source IPs and merge with an attributed set if there is overlap.

Page 9: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

9

Analysis• Examine the actions of the bots being run in Botlab – Outgoing

Spam.

• Analyse the incoming spam feed.

• Analysis obtained out of studying both the outgoing and incoming spam feeds.

Page 10: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

10

Behavioural characteristics

Image source: [https://www.usenix.org/legacy/event/nsdi09/tech/full_papers/john/john_html/figs/six_botnets_summary.png]

Analysis

Page 11: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

11

AnalysisAnalysis of outgoing spam

• Outgoing spam feeds

o Size of mailing lists

• Using the outgoing spam feeds to estimate the size of the botnets’ recipient lists.o A bot periodically obtains a new chunk of recipients from the master and

sends spam to this recipient list.

oOn each such request, the chunk of recipients is selected uniformly at random from the spam list.

o The chunk of recipients received by a bot is much smaller than the spam list size.

Page 12: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

12

AnalysisAnalysis of outgoing spam

• Outgoing spam feedso Overlap in mailing lists

• They also examined whether botnets systematically share parts of their spam lists.

Image source: [https://www.usenix.org/legacy/event/nsdi09/tech/full_pahn/john_html/figs/spamlist_overlap.png]

Page 13: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

13

AnalysisAnalysis of outgoing spam

• Outgoing spam feedso Spam subjects

• Between any two spam botnets, there is no overlap in subjects sent within a given day, and an average overlap of 0.3% during the length of their study.

• Subject-based classification.

Page 14: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

14

AnalysisAnalysis of Incoming Spam

• Analysis of Incoming Spam

o Analysed 46 million spam messages obtained from a 50 day trace.o University of Washington’s filtering systems :o 89.2% of incoming mail as spamo 0.5% of spam contain viruses as attachments.o 95% of the spam messages contain HTTP links.o 1% contain links to executables.

Page 15: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

15

• Spam campaigns and Web hosting

o They cluster spam based on the following attributes• The domain names appearing in the URLs found

in spam.

• The content of Web pages linked to by the URLs.

• The resolved IP addresses of the machines hosting this content.

AnalysisAnalysis of Incoming Spam

Imagesource:[https://www.usenix.org/legacy/event/nsdi09/tech/full_papers/john/john_html/figs/num_distinct_hosts.png]

Imagesource:https://www.usenix.org/legacy/event/nsdi09/tech/full_papers/john/john_html/figs/num_messages_per_cluster.png]

Page 16: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

16

• Spam classification

Image source: [https://www.usenix.org/legacy/event/nsdi09/tech/full_papers/john/john_html/figs/spam_classification.png]

Image source: [https://www.usenix.org/legacy/event/nsdi09/tech/full_papers/john/john_html/figs/spam_breakdown_per_botnet_over_time.png]

AnalysisCorrelation analysis

Page 17: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

17

AnalysisCorrelation analysis

• Spam campaigns

Image source:[https://www.usenix.org/legacy/event/nsdi09/tech/full_papers/john/john_html/figs/classification_by_campaign_nobold.png]

Image source: [https://www.usenix.org/legacy/event/nsdi09/tech/full_papers/john/john_html/figs/hosting_infrastructure_overlap.png]

Page 18: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

18

AnalysisCorrelation analysis

• Recruiting campaigns

Image source: [https://www.usenix.org/legacy/event/nsdi09/tech/full_papers/john/john_html/figs/propagation_campaigns.png]

Page 19: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

19

Applications enabled by Botlab

• Safer web browsingo They have found 40K malicious URLs propagated by Srizbio None of them were in malware DBs (Google, etc.)o Further Gmail’s spam filtering rate was only 21% for Srizbi.o BotLab can generate malware list in real-time; they have developed a Firefox

plugin to check against this

• Spam filteringo Developed a Thunderbird extension that compares an incoming email with the

list of spam subjects and list of URLs being propagated by captive botso Preliminary results are promising

• Availability of Botlab Data- http://botlab.org/

Page 20: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

20

Critics about the paper• "Relying on anti-virus software is also impractical, as these tools do not detect many new

malware variants." was mentioned in the paper yet they used anti-virus tools to validate their duplicate binaries elimination procedure.

• Botnets are continuous evolving and it is going to be quite hard to conduct safe experiments.

• More ways of monitoring can be done on the application layer. In addition to monitoring attachments and message headers, monitoring the text content of email can also be facilitated for spam monitoring.

• There are some entities in Botlab that needs human operators. This doesn't completely eradicate the human interference. Would be exciting to see a fully automated tool.

• Paper can be considered as a basis for building a more powerful tool for spam filtering.

Page 21: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

21

Conclusion• Described Botlab, a real-time botnet monitoring system.

• Behaviour and classification of botnets.

• My critics on the paper.

Page 22: Studying Spamming Botnets Using Botlab John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy [John 2009] John, John P., Alexander Moshchuk,

22

Thank you