A Framework for Understanding Botnets Justin Leonard, Shouhuai Xu, - - PowerPoint PPT Presentation

a framework for understanding botnets
SMART_READER_LITE
LIVE PREVIEW

A Framework for Understanding Botnets Justin Leonard, Shouhuai Xu, - - PowerPoint PPT Presentation

A Framework for Understanding Botnets Justin Leonard, Shouhuai Xu, Ravi Sandhu University of T exas at San Antonio Overview Botnet Lifecycle Botnet Architecture Command and Control Mechanisms (C&C) Dynamic Graph Model Botnet


slide-1
SLIDE 1

A Framework for Understanding Botnets

Justin Leonard, Shouhuai Xu, Ravi Sandhu University of T exas at San Antonio

slide-2
SLIDE 2

Overview

Botnet Lifecycle Botnet Architecture Command and Control Mechanisms (C&C) Dynamic Graph Model Botnet Attributes

slide-3
SLIDE 3

Botnet lifecycle

Formation – master compromises, recruits vulnerable machines, and assigns roles. Command and Control (C&C) – master sends messages to bots Attack – Bots launch attacks Post-attack – bots are detected, cured, and new bots recruited.

slide-4
SLIDE 4

Botnet Architecture

What roles are present in a botnet?

Master – human attacker(s) Controllers – coordinates subset of bots, long term asset Intruders – disposable, high-risk of detection, may downgrade into a bot Bots – responsible for attacks

slide-5
SLIDE 5

Botnet C&C Mechanisms

Anonymous Channels

Sender anonymous channels

Secret Handshakes

Privacy-preserving authentication PKI-like infrastructure or group signatures

Gossiping

Small fan-out of neighbors

slide-6
SLIDE 6

Dynamic Graph Model

Directed graph representation

Vertex set represents bots Edge set represents “knows” relation – e.g., (u,v) implies u can spontaneous communication with v. Does capturing u imply exposure of v? Undirected graph is special case

slide-7
SLIDE 7

Dynamic Graph Model

Directed graph represents snapshot

  • f graph over time.

Captures real network behavior – e.g.,

  • ffline machines, detected and cured

bots. Implies attributes should be modeled as Random Variables instead of deterministic numbers.

slide-8
SLIDE 8

Botnet Attributes

Robustness Resilience Sustainability Exposedness Bandwidth Consumption Botnet Firepower

slide-9
SLIDE 9

Robustness

Minimum number of detections to trace every bot. Random variable over time Represents weakest or “best case” detection by defender

slide-10
SLIDE 10

Resilience

Captures consequence of exposure

  • f a set of bots

Tracing uses “knows” relationship Normalized by size of botnet Intuitively captures how much a defender can achieve with fixed resources (e.g., subpoenas).

slide-11
SLIDE 11

Resilience vs Robustness

Robustness establishes minimum number of captures, resilience the effects of a capture – the resilience for the corresponding robustness set is 0. A set smaller than the robustness cannot capture all bots. Known to attack a priori, defender has limited knowledge.

slide-12
SLIDE 12

Dynamic Graph Model

Directed graph representation

Vertex set represents bots Edge set represents “knows” relation – e.g., (u,v) implies u can spontaneous communication with v. Does capturing u imply exposure of v? Undirected graph is special case

slide-13
SLIDE 13

Sustainability

Captures effects of interactions between attacker and defender. Uses a definition based on number

  • f connected bots.

Reliability from the attacker's perspective against a “malicious” defender.

slide-14
SLIDE 14

Exposedness

Worst-case probability a bot is detected by defender due to C&C. Captures the effectiveness of the defenders IDS. May be used to determine resilience set by using a “detection threshold”, above which we assume a bot is detected.

slide-15
SLIDE 15

Bandwidth Consumption

Captures the efficiency of the C&C mechanisms. Gives an intuitive measure of the “noisiness” of the botnet. Whole system point of view, as

  • pposed to exposedness, which

captures probability of detecting a particular bot based on C&C messages.

slide-16
SLIDE 16

Botnet Firepower

Captures the overall effectiveness of the botnet at launching an attack. Simple measure is the size of the botnet. Perhaps also weighted by available resources.

slide-17
SLIDE 17

Future Research

Tying definitions to existing botnet case studies. What strategies are effective at maximizing particular metrics? Can we quantitatively compare attributes relative to a given defender capability?

slide-18
SLIDE 18

Questions?