Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
CS 5410 - Computer and Network Security: Malware and Botnets
Professor Kevin Butler Fall 2015
CS 5410 - Computer and Network Security: Malware and Botnets - - PowerPoint PPT Presentation
CS 5410 - Computer and Network Security: Malware and Botnets Professor Kevin Butler Fall 2015 Southeastern Security for Enterprise and Infrastructure (SENSEI) Center Final Posters Final posters are your chance to show myself and your peers
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
Professor Kevin Butler Fall 2015
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
the excellent work you’ve done this semester.
writing a full paper for the class.
tables, etc)
posters will be turned in (as a single PDF per group), as will all code.
2
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
3
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
categorized as malware.
self-reproducing automata”
itself.
Code Red Worm (2001), SQL Slammer (2003), Zeus Trojan (2007)
4
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
5
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
6
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
encrypted with a different key.
is modified in every instance.
rewritten.
7
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
compromised machines which are administered by command and control (C&C) networks.
8
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
9
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
botnets and the activity is highly controversial.
to be to to be noticed and targeted for takedown.
10
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
command and control center (C&C).
“A botnet is comparable to compulsory military service for windows boxes”
11
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
12
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
to communicate between parties.
13
Server Server Server Server ServerSoutheastern Security for Enterprise and Infrastructure (SENSEI) Center
mechanisms such as IRC are generally easy to attack.
architectures to avoid such weaknesses.
relying on a P2P architecture?
14
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
situation?
IRC bots?
traffic and that associated with bots?
15
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
how does a provider defend against such multi-homed botnets?
strategies for botmasters?
16
1 2 3
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
their control, a botmaster can unleash massive torrents of traffic at a target.
vs Scientology, Unknown vs CNN, Unknown vs ...
17
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
18
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
“dissect” bots.
active botnets.
in exploiting them).
means of potentially interfering with the botnet.
helping at all.
19
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
advertise a product (legitimate or otherwise).
20
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
21
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
Value Chain, K. Levchenko, et al.,Proceedings of the IEEE Symposium and Security and Privacy, May 2011
22
2e+04 1e+05 5e+05 2e+06 1e+07 50 100 200 500 1000 2000 Number of Email Targets Number of Responders IND USA FRA POL RUS CHN GBR BRA MYS CAN TUR BGR KOR DEU UKR JPN AUS TWN CZE THA SAU EGY ZAF ITA ISR HUN PAK ROM MEX NLD ARG CHL ESP HKG SGP AUT CHE SWE 2e−04 5e−04 1e−03 2e−03 5e−03 1e−02 5e−05 2e−04 5e−04 2e−03 Response Rate for Self−prop Email Response Rate for Pharmacy Email USA IND FRA POL CHN GBR CAN RUS BRA AUS DEU MYS ZAF KOR THA JPN SAU BGR TUR ITA CZE UKR EGY NLD ISR ROM PAK TWN PHL VNM HUN MEX CHL ARG
Bank Name BIN Country Affiliate Programs Azerigazbank 404610 Azerbaijan GlvMd, RxPrm, PhEx, Stmul, RxPnr, WldPh B&N 425175 Russia ASR B&S Card Service 490763 Germany MaxGm Borgun Hf 423262 Iceland Trust Canadian Imperial Bank of Commerce 452551 Canada WldPh Cartu Bank 478765 Georgia DrgRev DnB Nord (Pirma) 492175 Latvia Eva, OLPh, USHC Latvia Savings 490849 Latvia EuSft, OEM, WchSh, Royal, SftSl Latvijas Pasta Banka 489431 Latvia SftSl
427852
DmdRp, VgREX, Dstn, Luxry, SwsRp, OneRp State Bank of Mauritius 474140 Mauritius DrgRev Visa Iceland 450744 Iceland Staln Wells Fargo 449215 USA Green Wirecard AG 424500 Germany ClFr
Supplier Item Origin Affiliate Programs Aracoma Drug Orange bottle of tablets (pharma) WV, USA ClFr Combitic Global Caplet Pvt. Ltd. Blister-packed tablets (pharma) Delhi, India GlvMd M.K. Choudhary Blister-packed tablets (pharma) Thane, India OLPh PPW Blister-packed tablets (pharma) Chennai, India PhEx, Stmul, Trust, ClFr
Blister-packed tablets (pharma) Villupuram, India WldPh Rhine Inc. Blister-packed tablets (pharma) Thane, India RxPrm, DrgRev Supreme Suppliers Blister-packed tablets (pharma) Mumbai, India Eva Chen Hua Small white plastic bottles (herbal) Jiangmen, China Stud Etech Media Ltd Novelty-sized supplement (herbal) Christchurch, NZ Staln Herbal Health Fulfillment Warehouse White plastic bottle (herbal) MA, USA Eva MK Sales White plastic bottle (herbal) WA, USA GlvMd Riverton, Utah shipper White plastic bottle (herbal) UT, USA DrMax, Grow Guo Zhonglei Foam-wrapped replica watch Baoding, China Dstn, UltRp
Registrar % of spam
20 40 60 80 100
− N a u N e t ( R U ) − B e i j i n g I n n
a t i v e ( C N ) − B i z c n . c
( C N ) − C h i n a S p r i n g b
r d ( C N ) − e N
( U S )
1 2 5 10 20 50 100
AS serving Web/DNS
20 40 60 80 100
−Chinanet (CN) −Evolva (RO) − E v
v a ( R O ) − V L i n e T e l e c
( U A )
1 2 5 10 20 50 100 500 Target
DNS server Web server
Bank
20 40 60 80 100 Azerigazbank Saint Kitts DnB Nord Latvia Savings B + N B + S Wells Fargo Visa Iceland Wirecard Borgun Hf State Mauritius Cartu Bank Latvijas Pasta
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
23
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
24
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
25
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
26
E2: Inbound Infection E1: Inbound Scan E3: Egg Download E5: Outbound Scan E4: C&C Communica- tions V-to-A V-to-C V-to-* Type I V-to-* Type II A-to-V A-to-V
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
27
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
28
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
29
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
30
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
move their hosting infrastructure between many IP addresses.
31
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
32
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
evolution.
them incredibly valuable for many kinds of attacks.
DGAs.
33