This time
Peering into
Underground
Economies
On top of the stack
Application-layer
security Peering into Underground Economies Final exam - - PowerPoint PPT Presentation
This time On top of the stack Application-layer security Peering into Underground Economies Final exam Cumulative Monday May 18 Software security Crypto 10:30 AM 12:30 PM Networking HERE (CSIC 2117) Teaching
Peering into
On top of the stack
Application-layer
Monday May 18 10:30 AM – 12:30 PM HERE (CSIC 2117)
Please set aside some time this week to do them!
On top of the stack
Application-layer
them (UDP vs TCP)
(applies to reliability in general)
and completely only at the end hosts, then put it there, not in the network.
enhancement
application?
timing? ….?
These are all just packets and you can construct whatever packets you want
each layer
by the underlying layers, then you have to add it to the “end”
external attack?
greater the risk
Scalable solution to management complexity
any outsiders from having unwanted access
traffic
Internet Internal network
Scalable solution to management complexity
any outsiders from having unwanted access
traffic What do we know about reference monitors?
Internet Internal network
Scalable solution to management complexity
What do we know about reference monitors? You must ensure complete mediation
connections
services on internal machines
control policy
externally visible
externally visible
matches
dst-port, protocol, TCP flags)
(perform “deep packet inspection” that looks at the payloads, not just the headers
Getting around the Great Firewall of China
Getting around the Great Firewall of China
go through the firewall
all but a specific set of hosts (for businesses who use VPNs)
another that the country is ok with (e.g., Skype)
the path redirects you to your true destination D’.
Getting around the Great Firewall of China
go through the firewall
all but a specific set of hosts (for businesses who use VPNs)
another that the country is ok with (e.g., Skype)
the path redirects you to your true destination D’.
Avoiding censorship from a “routing-capable adversary” is one of the most challenging open problems
Getting around the Great Firewall of China
can still be censored if their traffic goes through China
damage”
two hosts in Brazil to have their traffic routed through the US.
are doing with our traffic
that my packets avoided these these regions of the world…”
Peering into
defenses
we can understand
shut down to cease spam?)
companies who wrote the software) want to know about them
middlemen (e.g. Grusq) who match vulnerability finders up with buyers. Take commission (15% typical).
(cease payment when zero-day over)
companies who wrote the software) want to know about them
middlemen (e.g. Grusq) who match vulnerability finders up with buyers. Take commission (15% typical).
(cease payment when zero-day over)
Google offers a max of $3133.70 for information about flaws in their tech
“Shopping for zero-days” Forbes 2012
companies who wrote the software) want to know about them
middlemen (e.g. Grusq) who match vulnerability finders up with buyers. Take commission (15% typical).
(cease payment when zero-day over)
Google offers a max of $3133.70 for information about flaws in their tech
social networks, etc.) that seeks to
address from sending
be able to operate those IP addresses
address from sending
be able to operate those IP addresses
Compromise lots of computers!
(bots) under unified control of an attacker (botmaster)
method of control
payload is orthogonal!
to rendezvous with botnet “command- and-control” (C&C)
commands and updates
(bots) under unified control of an attacker (botmaster)
method of control
payload is orthogonal!
to rendezvous with botnet “command- and-control” (C&C)
commands and updates
(bots) under unified control of an attacker (botmaster)
method of control
payload is orthogonal!
to rendezvous with botnet “command- and-control” (C&C)
commands and updates
C&C
(bots) under unified control of an attacker (botmaster)
method of control
payload is orthogonal!
to rendezvous with botnet “command- and-control” (C&C)
commands and updates
C&C
(bots) under unified control of an attacker (botmaster)
method of control
payload is orthogonal!
to rendezvous with botnet “command- and-control” (C&C)
commands and updates
C&C
Topology can be star (like this), hierarchical, peer-to-peer…
notices by ISPs
manage DNS yourself and create throwaway domains that redirect to a more permanent domain)
program (more later)
shut down due to blacklisting and takedown notices?
Botnet used for sending spam Botmaster
Web server Web server Web server
TCP HTTP Proxy bots Workers
Name server
Infected machines
Botnet used for sending spam Botmaster
Web server Web server Web server
TCP HTTP Proxy bots Workers
Name server
Botnet used for sending spam Botmaster
Web server Web server Web server
TCP HTTP Proxy bots Workers
Name server
“Bulletproof hosting” services
appealing to their ISPs (“please block this user..”)
(for a price)
Business Network
web server
address mapping changes quickly)
accounts)
web server replies to mask change in user balance
None of these cause serious pain for the infected user! Users have little incentive to prevent these
How do you advertise the capabilities of your amazing botnet?
Some DNS root servers advertise query volume “see how much attack traffic we can fend off!” How do you advertise the capabilities of your amazing botnet?
Some DNS root servers advertise query volume “see how much attack traffic we can fend off!” How do you advertise the capabilities of your amazing botnet?
Some DNS root servers advertise query volume “see how much attack traffic we can fend off!” How do you advertise the capabilities of your amazing botnet? “Look for the surge 4 days from now”
Internet
Internet
botnet, so this is equivalent to preventing malware infections in general - hard
botnet, so this is equivalent to preventing malware infections in general - hard
generate a large list of possible domain names.
botnet, so this is equivalent to preventing malware infections in general - hard
generate a large list of possible domain names.
Counter-counter measure?
conversions and to register for payouts
Markets drive efficiency and specialization: some specialize in botnets, others in spam
Customer Issuing bank Acquiring bank Payment processor Merchant
Card association network (e.g., Visa, MasterCard) Facilitates payment
connections across many different goods
any warehouse/storage
acquiring bank in Azerbaijan
acquiring bank in Azerbaijan
delivers 10 days later
Measurement study
Few affiliate programs constitute the majority
affiliate program over time?)
with an order number
with an order number
affiliate program):
3rd party servers
asked for logs
Over 100k orders/month in this dataset alone Some have guessed that “spammers make little money at all”
“Why do you rob banks?” “Because that’s where the money is”
pursued and shut down
components
Why does the emergence of the underground economy matter?
themselves be infiltrated
botnets, taking over C&C
day
And why continuing to study it matters
deep knowledge of the tools you use, and adherence to a set of design principles
neither can we
system building, human interaction, ….
You are now responsible.
You are now responsible. thoroughness, responsibility, ethics, and education Bring copious amounts of to your future endeavors.