Detection of peer-to-peer botnets Matthew Steggink, Igor Idziejczak - - PowerPoint PPT Presentation

detection of peer to peer botnets
SMART_READER_LITE
LIVE PREVIEW

Detection of peer-to-peer botnets Matthew Steggink, Igor Idziejczak - - PowerPoint PPT Presentation

Outline Introduction & theory Research question Peacomm case study Detection Conclusion & future work Detection of peer-to-peer botnets Matthew Steggink, Igor Idziejczak February 6, 2008 1 / 17 Outline Introduction & theory


slide-1
SLIDE 1

Outline Introduction & theory Research question Peacomm case study Detection Conclusion & future work

Detection of peer-to-peer botnets

Matthew Steggink, Igor Idziejczak February 6, 2008

1 / 17

slide-2
SLIDE 2

Outline Introduction & theory Research question Peacomm case study Detection Conclusion & future work

Introduction & theory Research question Peacomm case study Detection Conclusion & future work

2 / 17

slide-3
SLIDE 3

Outline Introduction & theory Research question Peacomm case study Detection Conclusion & future work

Peer-to-peer botnets

◮ What are botnets . . . and peer-to-peer botnets? ◮ What’s the purpose of bots and botnets?

3 / 17

slide-4
SLIDE 4

Outline Introduction & theory Research question Peacomm case study Detection Conclusion & future work

Botnet topology

4 / 17

slide-5
SLIDE 5

Outline Introduction & theory Research question Peacomm case study Detection Conclusion & future work

Research question?

in cooperation with SURFnet

Detection of peer-to-peer botnets

◮ Why this research ◮ Goal of this research ◮ Previous work . . .

5 / 17

slide-6
SLIDE 6

Outline Introduction & theory Research question Peacomm case study Detection Conclusion & future work

Peacomm

Peacomm

◮ What is Peacomm ◮ DHT: Usage of the Overnet protocol

6 / 17

slide-7
SLIDE 7

Outline Introduction & theory Research question Peacomm case study Detection Conclusion & future work

How do users get infected?

7 / 17

slide-8
SLIDE 8

Outline Introduction & theory Research question Peacomm case study Detection Conclusion & future work

Peacomm experimental setup

◮ Peer to peer botnet study ◮ Test environment ◮ Experimenting (CW Sandbox, PerilEyez, Rootkit Unhooker,

Wireshark)

8 / 17

slide-9
SLIDE 9

Outline Introduction & theory Research question Peacomm case study Detection Conclusion & future work

Infection

◮ Executable copy (noskrnl.exe) ◮ Time configuration ◮ Initial peer list (noskrnl.config) ◮ Creates a rule in the Windows Firewall ◮ Rootkit noskrnl.sys

9 / 17

slide-10
SLIDE 10

Outline Introduction & theory Research question Peacomm case study Detection Conclusion & future work

Secondary injections

◮ Duplicate on the desktop ◮ Update malware through TCP connection ◮ Updates peer list and downloads spam message

10 / 17

slide-11
SLIDE 11

Outline Introduction & theory Research question Peacomm case study Detection Conclusion & future work

Network analysis

UDP

◮ Very noisy: 55 % ◮ Always same high numbered port (different on every host) ◮ Packet length (40-79): 98 %, in total: 51 %

11 / 17

slide-12
SLIDE 12

Outline Introduction & theory Research question Peacomm case study Detection Conclusion & future work

Network analysis

SMTP

◮ 5 % of total traffic → < 0,5% [1] ◮ 33 packets / second

ipoque.com, Internet Study 2007, August - September 2007

12 / 17

slide-13
SLIDE 13

Outline Introduction & theory Research question Peacomm case study Detection Conclusion & future work

Network analysis

MX queries

◮ 1 % of total traffic ◮ 4 packets / second → isolated case? ◮ Host MX queries are suspicious

13 / 17

slide-14
SLIDE 14

Outline Introduction & theory Research question Peacomm case study Detection Conclusion & future work

Detection

◮ Protocol traffic ◮ SMTP ◮ MX queries ◮ Connection

14 / 17

slide-15
SLIDE 15

Outline Introduction & theory Research question Peacomm case study Detection Conclusion & future work

Detection

Figure: Comparison between all traffic (black), Peacomm traffic (red) and other traffic (blue) (generated with Wireshark)

15 / 17

slide-16
SLIDE 16

Outline Introduction & theory Research question Peacomm case study Detection Conclusion & future work

Conclusion & future work

◮ Unique characteristics ◮ Hard to predict the future? ◮ Future Peacomm developments: less noisy, what now? ◮ New bots in the future: Agobot?

16 / 17

slide-17
SLIDE 17

Outline Introduction & theory Research question Peacomm case study Detection Conclusion & future work

Questions?

◮ Matthew Steggink: matthew.steggink@os3.nl ◮ Igor Idziejczak: igor.idziejczak@os3.nl

17 / 17