Dynamic profiles for malware communication
Joao Marques, Mick Cox MSc System & Network Engineering University of Amsterdam
Monday 6 February, 2017
Dynamic profiles for malware communication Joao Marques, Mick Cox - - PowerPoint PPT Presentation
Dynamic profiles for malware communication Joao Marques, Mick Cox MSc System & Network Engineering University of Amsterdam Monday 6 February, 2017 Outline Introduction Part I - Intrusion Detection Part II: Botnets & Advanced
Joao Marques, Mick Cox MSc System & Network Engineering University of Amsterdam
Monday 6 February, 2017
Introduction Part I - Intrusion Detection Part II: Botnets & Advanced Persistent Threats Part III: Research Outline Part IV: Intelligent Malware Part V: Possible Countermeasures Discussion, Conclusion & Future Work
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 2
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 2
Hosting organization
Organization:
Supervisor:
Notable other:
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 3
The goal
Is it possible to construct a dynamic network profile between a Command & Control server and the beacon, which is undetectable by state-of-the-art detection frameworks?
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 4
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 5
Definition
Intrusion Detection & Prevention Systems in short:
Figure 1: Simplified Snort 2 Architecture
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 6
Network, DNS and Host-based
Network Based IDS (NIDS)
(packets)
validation engine
traffic
Snort, Suricata and Bro Host Based IDS (HIDS)
systems (system metrics, usage)
engine
cover the network
OSSEC, Tripwire Others proposed types include DNS based, Storage based, Wireless, Hybrid, and more.
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 7
Methods
Signature based IDS
(malicious usage)
0-days
negative Anomaly based IDS
behavior)
behavior (anomalies)
negative Signature or anomaly based detection exists across the location (Host/Network)
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 8
Validation engine
Rule Header
Rule Options
Dynamic modules and preprocessors
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 9
Example rule
An example for matching content: alert tcp any any -> any 139 (content:"|5c 00|P|00|I|00|P|00|E|00 5c|";)
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 10
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 11
Botnets in short:
Advanced Persistent Threats in short:
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 12
Architecture
Different architectures between C&C’s to bots exist:
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 13
The whole process
In summarization: most attacks do follow the following process.
channels
vulnerability and downloading the malware as a result
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 14
Detection techniques
Figure 2: Botnet detection techniques
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 15
Hiding mechanisms
Some of the reported hiding mechanisms include:1
1Survey and taxonomy of botnet res. thr. life-cycle, Rodr´
ıguez-G´
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 16
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 17
Start with exploiting signature based detection.
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 18
VMware EXSi server at reims.studlab.os3.nl contains a virtual test environment as seen in the figure bellow:
Figure 3: Test environment
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 19
Leading to the pivot
⇒ not normal exists, for every area.
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 20
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 21
The concept
Malware that can make an educated guess prior to starting communication with the C&C, to avoid using anomalous methods of communication that could end up in the detection of the infection.
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 22
The objective
The objective of this degree of ”intelligence” is to:
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 23
Assumptions
Basic assumptions:
infected host.
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 24
Malware Operation Method
A vulnerability in the victim is exploited and the payload executed. The malware gets downloaded and executed. From this point on the malware:
time
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 25
Malware Operation Method
”intelligent” analysis of the acquired information
communication
secure manner to prevent/hinder the creation of signatures
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 26
Functionality Implemented
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 27
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 28
Usability trade-off
Enforcing heavy restrictions on users
patterns
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 29
Defined yet again
In essence, what are HIDS?
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 30
Anomaly based System Profiling
Checks for metrics and performance indicators
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 31
Anomaly based User Profiling
Anomaly based user profiling can be done on the basis of:1
decisions)
usage, keystroke analysis, commands, lexical and syntactic features. Frequent or continuous (re)training of the training set is required, risking an attacker can over time manipulate the profile away from the genuine user.
1User Profiling in Intrusion Detection, Peng et al. (2016)
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 32
Would it work?
The good:
from the network The bad:
The ugly:
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 33
Log analysis
Actually already other systems, but for convenience listed here. Difficult to disable logging. Some options do exist:
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 34
Combining the previous
Correlates multiple information sources: HIDS, NIST, signature and anomaly, both in log or metrics. Cross reference them to reduce false positives.
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 35
Would it work?
The good:
The bad:
The ugly:
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 36
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 37
Bridging the gap
Intrusion Detection: looking for a needle in the haystack, involves heuristics Furthermore, evasion against signature based systems is by default and anomaly is not yet that effective due to large rate of false positives. In order to uncover some of the advanced communication methods such as advanced covert channels and side channel attacks, misusing current applications and protocols to hide in plain sight, developing such tools is needed. With our proposed system we hope to contribute to the advancement of such research.
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 38
For better understanding
In regards to the proposed framework
to make its decision more reliable and therefore evasive
in actual
(Maybe OS3 students can do their RP2 on advanced and stealthy covert channels and side channel attacks.)
Joao Marques & Mick Cox Dynamic profiles for malware communication (Research Project) MSc System & Network Engineering, University of Amsterdam 39