CS 5410 - Computer and Network Security: Malware and Botnets - - PowerPoint PPT Presentation

cs 5410 computer and network security malware and botnets
SMART_READER_LITE
LIVE PREVIEW

CS 5410 - Computer and Network Security: Malware and Botnets - - PowerPoint PPT Presentation

CS 5410 - Computer and Network Security: Malware and Botnets Professor Kevin Butler Fall 2015 Southeastern Security for Enterprise and Infrastructure (SENSEI) Center Final Posters Final posters are your chance to show myself and your peers


slide-1
SLIDE 1

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

CS 5410 - Computer and Network Security: Malware and Botnets

Professor Kevin Butler Fall 2015

slide-2
SLIDE 2

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Final Posters

  • Final posters are your chance to show myself and your peers

the excellent work you’ve done this semester.

  • An opportunity!
  • What should be included in a good poster?
  • I suggest arranging areas much like you would if you were

writing a full paper for the class.

  • You are going to need to show results (e.g., graphs, 


tables, etc)

  • In addition to presenting them, all 


posters will be turned in (as a single 
 PDF per group), as will all code.

  • Practice your elevator pitch!

2

slide-3
SLIDE 3

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Story

3

slide-4
SLIDE 4

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Malware

  • Software with “malicious intentions” is generally

categorized as malware.

  • First proposed in 1949 in John von Neumann’s “Theory of

self-reproducing automata”

  • A theoretical treatise on code that could reproduce

itself.

  • Countless real examples have followed:
  • The Morris Worm(1988), Michelangelo Virus (1991), 


Code Red Worm (2001), SQL Slammer (2003),
 Zeus Trojan (2007)


4

slide-5
SLIDE 5

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Evolution of Malware

  • Malware is generally classified into these categories:
  • Virus - generally included as part of an executable

file, requires some assistance to infect.

  • Worm - similar to a virus, able to self propagate.
  • Trojan - infected software, generally do not

spread.

  • These are not “hard and fast” rules.

5

slide-6
SLIDE 6

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Ransomware

  • New twist on malware: extort the user by

encrypting all of their files and demanding a ransom

  • Helpful: telephone


support for getting
 your credit card
 details

6

TOR hidden service

slide-7
SLIDE 7

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Detection and Evasion

  • Malware is most often detected statically:
  • MD5/SHA256 hashes are commonly used in commercial AVs
  • Tactics to evade such detection have become commonplace:
  • Encrypted Malware: Virus is encrypted, and each instance is

encrypted with a different key.

  • Polymorphic Malware: Encrypted, but the decryption routine

is modified in every instance.

  • Metamorphic Malware: Everything is entirely 


rewritten.

  • Where does the arms race go from here?


7

slide-8
SLIDE 8

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

  • A botnet is a network of software robots (bots) run on

compromised machines which are administered by command and control (C&C) networks.

  • Bot master - the owner/controller of a botnet
  • What is the advantage to this approach over the others?

Botnets

8

slide-9
SLIDE 9

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

  • Worms, Tojan horses, backdoors, browser-bugs, etc...


  • Note: the software on these systems is updated
  • Bot theft: bot controllers penetrate/"steal" bots.

Infection

9

slide-10
SLIDE 10

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Statistics (controversial)

  • The actual number of bots, the size of the

botnets and the activity is highly controversial.

  • As of 2012: millions of bots
  • 1/4 of hosts are now part of bot-nets
  • Growing fast (many more bots)
  • Assertion: botnets are getting smaller(?!?)
  • When they become large, they are more likely 


to be to to be noticed and targeted for 
 takedown.

10

slide-11
SLIDE 11

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Botnet Architecture

  • An army of compromised hosts (“bots”) coordinated via a

command and control center (C&C).

“A botnet is comparable to compulsory military service for windows boxes”

  • - Bjorn Stromberg

11

slide-12
SLIDE 12

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Typical Botnet

12

  • 1. Compromise
  • 2. Download
  • 3. DNS Lookup
  • 4. Join
  • 5. Command
slide-13
SLIDE 13

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

IRC

  • 1988 - one-to-many or many-to-many chat (for BBS)
  • Client/server -- TCP Port 6667
  • Used to report on 1991 Soviet coup attempt
  • Channels (sometimes password protected) are used

to communicate between parties.

  • Invisible mode (no list, not known)
  • Invite only (must be invited to participate)
  • Botnets rarely rely on IRC anymore.
  • Many ISPs block IRC these days.

13

Server Server Server Server Server
slide-14
SLIDE 14

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

P2P Botnets

  • Bots that rely on centralized communications

mechanisms such as IRC are generally easy to attack.

  • Single point of failure for the bad guys...
  • Increasingly, botnets have turned to P2P-based

architectures to avoid such weaknesses.

  • e.g., Slapper, Phatbot, Conficker
  • What are the challenges for a botmaster 


relying on a P2P architecture?


14

slide-15
SLIDE 15

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

P2P Botnets

  • What advantages do defenders have in this

situation?

  • How do communication patterns compare to

IRC bots?

  • How do you tell between “legitimate” P2P

traffic and that associated with bots?

15

slide-16
SLIDE 16

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Wireless/Mobile

  • Mobile devices offer new avenues for botnets.
  • With the ability to communicate over multiple (5) interfaces,

how does a provider defend against such multi-homed botnets?

  • How does this change the game in terms of communications

strategies for botmasters?


16

1 2 3

slide-17
SLIDE 17

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Campaign: DDoS

  • Distributed Denial of Service (DDoS)
  • With hundreds of thousands of malicious devices under

their control, a botmaster can unleash massive torrents of traffic at a target.

  • Examples: Unknown vs Estonia, Russia/Georgia, Anonymous

vs Scientology, Unknown vs CNN, Unknown vs ...

  • What’s the advantage of doing this from a botnet?

17

slide-18
SLIDE 18

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Stuxnet?

  • What was Stuxnet?
  • Classification?
  • What was its goal?
  • How did it try to do this?
  • How was it delivered?
  • Was it effective?

18

slide-19
SLIDE 19

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

How are researchers learning?

  • Honeypots are often used to attract, observer and eventually

“dissect” bots.

  • A number of recent efforts in this space have actually hijacked

active botnets.

  • Large portions of these networks have been monitored:
  • ... to learn about the targets of the botnet (and their success

in exploiting them).

  • ... to learn about weaknesses in their architecture to use as a 


means of potentially interfering with the botnet.

  • ... to figure out whether deployed defenses are 


helping at all.

19

slide-20
SLIDE 20

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Campaign: Spam

  • Spam: Unsolicited mass emailing, generally attempting to

advertise a product (legitimate or otherwise).

  • In the past, has been as high as 90+% of email by volume.
  • Approximately 72% in 2014.
  • This is an economic problem... why?
  • Botnets are an excellent platform for spam campaigns.
  • Massive bandwidth for sending messages
  • Many locations for hosting infrastructure.

20

slide-21
SLIDE 21

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Spamalytics

  • Very little was previously known about the

conversion rate of spam.

  • Why not?
  • Methodology: Hijack a botnet, watch what

happens.

  • Good methodology?
  • Issues?

21

slide-22
SLIDE 22

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Spamalytics (cont)

  • What was learned?
  • What can we do in terms of defense?
  • Click Trajectories: End-to-End Analysis of the Spam

Value Chain, K. Levchenko, et al.,Proceedings of the IEEE Symposium and Security and Privacy, May 2011

22

2e+04 1e+05 5e+05 2e+06 1e+07 50 100 200 500 1000 2000 Number of Email Targets Number of Responders IND USA FRA POL RUS CHN GBR BRA MYS CAN TUR BGR KOR DEU UKR JPN AUS TWN CZE THA SAU EGY ZAF ITA ISR HUN PAK ROM MEX NLD ARG CHL ESP HKG SGP AUT CHE SWE 2e−04 5e−04 1e−03 2e−03 5e−03 1e−02 5e−05 2e−04 5e−04 2e−03 Response Rate for Self−prop Email Response Rate for Pharmacy Email USA IND FRA POL CHN GBR CAN RUS BRA AUS DEU MYS ZAF KOR THA JPN SAU BGR TUR ITA CZE UKR EGY NLD ISR ROM PAK TWN PHL VNM HUN MEX CHL ARG

Bank Name BIN Country Affiliate Programs Azerigazbank 404610 Azerbaijan GlvMd, RxPrm, PhEx, Stmul, RxPnr, WldPh B&N 425175 Russia ASR B&S Card Service 490763 Germany MaxGm Borgun Hf 423262 Iceland Trust Canadian Imperial Bank of Commerce 452551 Canada WldPh Cartu Bank 478765 Georgia DrgRev DnB Nord (Pirma) 492175 Latvia Eva, OLPh, USHC Latvia Savings 490849 Latvia EuSft, OEM, WchSh, Royal, SftSl Latvijas Pasta Banka 489431 Latvia SftSl

  • St. Kitts & Nevis Anguilla National Bank

427852

  • St. Kitts & Nevis

DmdRp, VgREX, Dstn, Luxry, SwsRp, OneRp State Bank of Mauritius 474140 Mauritius DrgRev Visa Iceland 450744 Iceland Staln Wells Fargo 449215 USA Green Wirecard AG 424500 Germany ClFr

Supplier Item Origin Affiliate Programs Aracoma Drug Orange bottle of tablets (pharma) WV, USA ClFr Combitic Global Caplet Pvt. Ltd. Blister-packed tablets (pharma) Delhi, India GlvMd M.K. Choudhary Blister-packed tablets (pharma) Thane, India OLPh PPW Blister-packed tablets (pharma) Chennai, India PhEx, Stmul, Trust, ClFr

  • K. Sekar

Blister-packed tablets (pharma) Villupuram, India WldPh Rhine Inc. Blister-packed tablets (pharma) Thane, India RxPrm, DrgRev Supreme Suppliers Blister-packed tablets (pharma) Mumbai, India Eva Chen Hua Small white plastic bottles (herbal) Jiangmen, China Stud Etech Media Ltd Novelty-sized supplement (herbal) Christchurch, NZ Staln Herbal Health Fulfillment Warehouse White plastic bottle (herbal) MA, USA Eva MK Sales White plastic bottle (herbal) WA, USA GlvMd Riverton, Utah shipper White plastic bottle (herbal) UT, USA DrMax, Grow Guo Zhonglei Foam-wrapped replica watch Baoding, China Dstn, UltRp

Registrar % of spam

20 40 60 80 100

− N a u N e t ( R U ) − B e i j i n g I n n

  • v

a t i v e ( C N ) − B i z c n . c

  • m

( C N ) − C h i n a S p r i n g b

  • a

r d ( C N ) − e N

  • m

( U S )

1 2 5 10 20 50 100

AS serving Web/DNS

20 40 60 80 100

−Chinanet (CN) −Evolva (RO) − E v

  • l

v a ( R O ) − V L i n e T e l e c

  • m

( U A )

1 2 5 10 20 50 100 500 Target

DNS server Web server

Bank

20 40 60 80 100 Azerigazbank Saint Kitts DnB Nord Latvia Savings B + N B + S Wells Fargo Visa Iceland Wirecard Borgun Hf State Mauritius Cartu Bank Latvijas Pasta

slide-23
SLIDE 23

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Campaign: Click Fraud

  • Click fraud is the revenue generated from clicking on

paid-advertising links automatically, without any user desire or interest.

  • Who are the adversaries here and what are they after?
  • Publisher (revenue)
  • Competitor (cost)
  • Why are botnets used as part of 


these campaigns?

23

slide-24
SLIDE 24

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

So What Do We Do?

  • Given the magnitude of this problem, how

do we fight it?

  • We have area and problem... Think about

solution and methodology!

  • There are two places from which we can try

to combat bots:

  • Local Network
  • At or above the ISP level

24

slide-25
SLIDE 25

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

BotHunter: IDS Dialog Correlation

  • Simple Approach: Why not just use an IDS

looking for a single signature?

  • Detection need not be based on a single event.
  • Knowing something about the structure of

communication can potentially help us find

  • ur bot.
  • So how do they do it?

25

slide-26
SLIDE 26

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Circle of Life

  • Bots follow a very regular pattern: Scan,

Infect, “Egg” Download, Communicate (C&C), Action.

  • Why does this reduce false positives?

26

E2: Inbound Infection E1: Inbound Scan E3: Egg Download E5: Outbound Scan E4: C&C Communica- tions V-to-A V-to-C V-to-* Type I V-to-* Type II A-to-V A-to-V

slide-27
SLIDE 27

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Simple Bayesian Calculation

  • Just as an intuition...
  • What is the probability of a false positive in a system?
  • P(I|A) = 0.001
  • If we rely upon multiple independent indicators that

are correlated in time:

  • P(I|A) * P(I|A)’ * P(I|A)’’ * P(I|A)’’ * ... P(I|A)’n
  • We can reduce the number of false positives by not

simply looking for single events.

27

slide-28
SLIDE 28

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Components

  • BotHunter relies on SCADE and SLADE
  • Inbound and outbound traffic scanning for

phases 1 and 5

  • Find suspicious payloads in intervening

phases.

  • Deployments:
  • Georgia Tech - four month deployment
  • SRI - one month deployment

28

slide-29
SLIDE 29

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Results

  • True Positives:
  • Deploy 10 bots in a virtual network

(Phatbot, RxBot, GTBot)

  • Overlay it with GT traffic.
  • False Positives:
  • GT - Less than 1 per month
  • SRI - 1 in a single month
  • Assumptions? Weaknesses?

29

slide-30
SLIDE 30

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

From the Network - DNS

  • Is this enough?
  • What about all the networks that don’t

deploy BotHunter?

  • What about going after DNS instead?

30

  • 3. DNS Lookup
slide-31
SLIDE 31

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

From DNS - (Fast) Flux

  • A botnet with a single IP address is easy to shut down.
  • In response, many bots use Dynamic DNS and quickly

move their hosting infrastructure between many IP addresses.

  • What can be done now?

31

slide-32
SLIDE 32

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Domain Generation Algorithms

  • To prevent takedown, bots can change the

C&C domain they speak to each day.

  • Ok, great. How do we coordinate this?

  • HMAC(k,currentdomain) + .com/.org/.net
  • Is random good enough?

32

slide-33
SLIDE 33

Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

Summary

  • Botnets represent the current pinnacle of malware

evolution.

  • They can be reprogrammed infinitely! This makes

them incredibly valuable for many kinds of attacks.

  • Where are they not valuable?
  • Techniques to identify and shut them down vary:
  • Organization: Detect the life-cycle.
  • ISP: Watch for DNS use, try and determine

DGAs.

33