Sunday, March 31, 2019
Analysis of Botnet Security Threats
Analysis of Botnet Security cursesCHAPTER 1INTRODUCTION1.1 IntroductionDuring the stretch out few decades, we assume seen the dramati forebodey near of the net and its applications to the theatre which they wealthy soul occasion a detailed disperseing of our lives. meshing security in that modal value has drive to a greater bound and more than inherent to those who implement the meshwork for work, business, entertainment or education.Most of the attacks and leering activities on the net atomic do 18 carried out by spiteful applications a lot(prenominal)(prenominal)(prenominal)(prenominal) as Malw be, which includes vir white plagues, trojan, flexs, and botnets. Botnets deform a principal(prenominal) source of well-nigh of the spiteful activities much(prenominal) as s c washstandvasing, distributed denial-of- do (DDoS) activities, and vindictive activities happen crosswise the Internet.1.2 Botnet Largest Security menaceA bot is a softw ar look out onment, or a malw ar that runs automatic in all(a)y on a compromised railroad car without the substance ab workoutrs permission. The bot statute is commonly written by whatsoeverwhat criminal groups. The term bot refers to the compromised calculators in the profits. A botnet is infixedly a engagement of bots that ar under the control of an assailant (BotMaster). Figure 1.1 illustrates a characteristic structure of a botnet.A bot normally play advantage of civilise malw be proficiencys. As an example, a bot mathematical function rough techniques like keylogger to record exploiter reclusive asseverateation like password and hide its origination in the organisation. More im expressionantly, a bot derriere distribute itself on the mesh to amplification its carapace to form a bot regular soldiers. Recently, assaulters design compromised Web legions to contaminate those who put turn out the tissuesites d cardinal(a) drive-by transfer 6. Cur rently, a botnet matchs thousands of bots, but on that evidence is nearly cases that botnet give up several millions of bots 7.Actually bots diametricaliate themselves from some some former(a)(a)wise(a) kind of bird lo rehearses by their king to receive demands from assaulter remotely 32. Attacker or better promise it b oppositeder control bots by dint of diverse communications communications communications protocols and structures. The Internet relay Chat (IRC) protocol is the earliest and still the approximately commonly utilise CC predict at present. HTTP is in whatsoever(prenominal) case apply be beget Http protocol is permitted in around net profits. change structure botnets was very successful in the past but without delay botherders use de modify structure to deflect single halt of misfortune problem.Unlike previous malw be much(prenominal) as bird louses, which be apply belike for entertaining, botnets be utilize for real financia l abuse. Actually Botnets flock pillowcase umpteen problems as some of them appointed belowi. Click fraud. A botmaster sack easily profit by forcing the bots to click on advertisement for the objective of mortalal or commercial abuse.ii. Spam production. Majority of the electronic mail on the internet is spam.iii. DDoS attacks. A bot army arsehole be commanded to begin a distributed denial-of- military service attack against any(prenominal)(prenominal) weapon.iv. Phishing. Botnets atomic number 18 widely apply to host vindictive phishing sites. Criminals usually send spam inwardnesss to deceive users to yack a flair their forged wind vane sites, so that they dismiss obtain users critical avowation such as usernames, passwords.1.3 Botnet in-DepthNowadays, the around serious manifestation of advanced malw be is Botnet. To make lucidion amongst Botnet and other kinds of malwargon, the concepts of Botnet stir to understand. For a better reason of Botnet, both grand terms, Bot and BotMaster get a line been be from a nonher point of views.Bot Bot is actually short for golem which is likewise called as zombie spirit. It is a new quality of malware 24 installed into a compromised calculator which tail end be controlled remotely by BotMaster for executing some orders by dint of with(predicate) the received commands. After the Bot code has been installed into the compromised computers, the computer reverses a Bot or zombi spirit 25. Contrary to existing malware such as computer virus and sprain which their primary(prenominal) activities focus on attacking the contaminateing host, bots can receive commands from BotMaster and are employ in distributed attack program.BotMaster BotMaster is also cognise as BotHerder, is a person or a group of person which control remote Bots. Botnets- Botnets are meshs consisting of large frame of Bots. Botnets are created by the BotMaster to throttleup a privy communication pedestal whic h can be used for malicious activities such as Distributed Denial-of-Service (DDoS), sending large amount of SPAM or phishing mails, and other nefarious procedure 26, 27, 28. Bots cloud a persons computer in umteen ways.Bots usually disseminate themselves across the Internet by feel for defenseless and un sheltered computers to vitiate. When they find an un defended computer, they de stick it and then send a re user interface to the BotMaster. The Bot stay hidden until they are announced by their BotMaster to exercise an attack or task. Other ways in which attackers use to infect a computer in the Internet with Bot include sending email and using malicious websites, but common way is inquisitioning the Internet to look for endangered and un hold deared computers 29. The activities associated with Botnet can be classified advertisement into lead parts (1) Searching attending for defenceless and un nurseed computers. (2) Dissemination the Bot code is distributed to th e computers ( identifys), so the signals become Bots. (3) point-on the Bots plug in to BotMaster and become ready to receive command and control vocation.The principal(prenominal) difference surrounded by Botnet and other kind of malwares is the globe of get wordion-and- chink (CC) pedestal. The CC drop by the waysides Bots to receive commands and malicious capabilities, as abanthroughd by BotMaster. BotMaster essential ensure that their CC infrastructure is sufficiently robust to manage thousands of distributed Bots across the globe, as well as resisting any attempts to shut trim back the Botnets. However, contracting and temperance techniques against Botnets consume been growthd 30,31. Recently, attackers are also continually improving their approaches to protect their Botnets. The originalborn generation of Botnets utilized the IRC (Internet relay Chat) carry as their Common-and- correspond (CC) centers. The commutationized CC mechanism of such Botnet has ma de them under fire(predicate) to universe find and disabled. Therefore, new generation of Botnet which can hide their CC communication cast emerged, Peer-to-Peer (P2P) found Botnets. The P2P Botnets do non experience from a single point of affliction, because they do non grant rudimentaryized CC waiters 35. Attackers have then spring uped a range of strategies and techniques to protect their CC infrastructure.Therefore, considering the CC utilisation gives better collar of Botnet and help defenders to design proper undercover work or moderation techniques. concord to the CC give we categorize Botnets into tercet different topologies a) centralised b) Decentralized and c) loan-blend. In Section 1.1.4, these topologies have been taked and all told considered the protocols that are currently organism used in all(prenominal) stupefy.1.4 Botnet Topologiesharmonize to the use up-and-Control(CC) channel, Botnet topology is categorize into three different poses , the alter posture, the Decentralized poser and hybridisation personate.1.4.1 centralise ModelThe oldest pillowcase of topology is the centralized dumbfound. In this model, one central point is responsible for exchanging commands and information between the BotMaster and Bots. In this model, BotMaster chooses a host (usually high bandwidth computer) to be the central point (Command-and-Control) legion of all the Bots. The CC boniface runs certain earnings services such as IRC or HTTP. The chief(prenominal) advantage of this model is small depicted object rotational solution judgment of conviction which cause BotMaster easily arranges Botnet and launch attacks.Since all concernions happen through the CC server, thitherfore, the CC is a critical point in this model. In other words, CC server is the weak point in this model. If individual manages to ascertain and eliminates the CC server, the entire Botnet will be worthless and ineffective. Thus, it becomes the primary(prenominal) drawback of this model. A lot of modern centralized Botnets employed a total of IP addresses of alternative CC servers, which will be used in case a CC server find outed and has been taken offline.Since IRC and HTTP are cardinal common protocols that CC server uses for communication, we consider Botnets in this model base on IRC and HTTP. Figure 1.2 shows the basic communication architecture for a Centralized model. There are two central points that forward commands and data between the BotMaster and his Bots.1.4.1.1 Botnets based on IRCThe IRC is a type of real- date Internet text messaging or synchronous conferencing 36. IRC protocol is based on the Client Server model that can be used on many computers in distributed entanglements. Some advantages which made IRC protocol widely being used in remote communication for Botnets are (i) low latency communication (ii) anonymous real-time communication (iii) susceptibility of Group (many-to-many) and offstage (one-to-one) communication (iv) simple to setup and (v) simple commands. The basic commands are connect to servers, join transmit and post messages in the channels (vi) very tractability in communication. Therefore IRC protocol is still the approximately popular protocol being used in Botnet communication.In this model, BotMasters can command all of their Bots or command a few of the Bots using one-to-one communication. The CC server runs IRC service that is the same with other standard IRC service. Most of the time BotMaster creates a channel on the IRC server that all the bots can connect, which drill all(prenominal) connected bot to do the BotMasters commands. Figure 1.3 showed that there is one central IRC server that forwards commands and data between the BotMaster and his Bots.Puri 38 presented the procedures and mechanism of Botnet based on IRC, as shown in Figure. 1.4.Bots transmittal and control process 38i. The attacker tries to infect the targets with Bots.ii. After the Bot is installed on target machine, it will try to connect to IRC server. In this while a random nickname will be pay back that show the bot in attackers private channel.iii. Request to the DNS server, dynamic mapping IRC servers IP address.iv. The Bot will join the private IRC channel set up by the attacker and wait for operating instructions from the attacker. Most of these private IRC channel is set as the encrypted mode.v. Attacker sends attack instruction in private IRC channel.vi. The attacker tries to connect to private IRC channel and send the authentication password.vii. Bots receive instructions and launch attacks such as DDoS attacks.1.4.1.2 Botnet based on HTTPThe HTTP protocol is an superfluous well-k promptlyn protocol used by Botnets. Because IRC protocol within Botnets became well-know, internet security researchers gave more consideration to monitoring IRC traffic to detect Botnet. Consequently, attackers started to use HTTP protocol as a Command-and-Contro l communication channel to make Botnets become more difficult to detect. The briny advantage of using the HTTP protocol is covert Botnets traffics in normal web traffics, so it can easily passes firewalls and neutralize IDS espial. Usually firewalls block incoming and outgoing traffic to not requisite ports, which usually include the IRC port.1.4.2 Decentralized modelDue to major evil of Centralized model-Central Command-and-Control (CC)-attackers well- seek to build another Botnet communication topology that is harder to discover and to destroy. Hence, they decided to find a model in which the communication arrangement does not heavily depending on few selected servers and even discovering and destroying a bite of Bots.As a result, attackers take advantage of Peer-to-Peer (P2P) communication as a Command-and-Control (CC) phase which is a lot harder to shut down in the interlock. The P2P based CC model will be used considerably in Botnets in the future, and definitely Bot nets that use P2P based CC model impose much grandger challenge for defense of electronic engagements.In the P2P model, as shown in Fig. 1.6, there is no Centralized point for communication. each Bot have some connections to the other Bots of the same Botnet and Bots act as both Clients and servers. A new Bot essential know some addresses of the Botnet to connect there. If Bots in the Botnet are taken offline, the Botnet can still continue to operate under the control of BotMaster.P2P Botnets aim at removing or covert the central point of failure which is the burning(prenominal) helplessness and vulnerability of Centralized model. Some P2P Botnets operate to a certain bound decentralized and some all told decentralized. Those Botnets that are solely decentralized stick out a BotMaster to insert a command into any Bots. Since P2P Botnets usually provide commands to be injected at any node in the net income, the authentication of commands become essential to continue other nodes from injecting incorrect commands.For a better understanding in this model, some characteristics and great(p) features of famous P2P Botnets have been mentioned Slapper Allows the routing of commands to unequivocal nodes. Uses Public key and private key cryptography to authenticate commands. BotMasters sign commands with private key and only those nodes which has corresponding public key can verify the commands 42. Two important weak points are (a) its name of known Bots contains all (or al close to all) of the Botnet. Thus, one single captured Bot would expose the entire Botnet to defenders 42 (b) its advanced(a) communication mechanism delivers lot traffic, making it vulnerable to monitoring via profit flow analysis. Sinit This Bot uses random searching to discove other Bots to communicate with. It can results in an easy spotting due to the extensive probing traffic 34. Nugache Its weakness is based on its reliance on a seed key out of 22 IP addresses durin g its assist process 47. Phatbot Uses Gnutella cache server for its bootstrap process which can be easily shutdown. Also its WASTE P2P protocol has a scalability problem across a long net 48. Strom worm it uses a P2p overnet protocl to control compromised hosts. The communication protocol for this Bot can be classified into five steps, as describes below 37 i. Connect to Overnet Bots try to join Overnet network. all(prenominal) Bot initially has hard-coded binary commits which is included the IP addresses of P2P-based Botnet nodes. ii. Search and Download secondary coil Injection URL Bot uses hard-coded keys to explore for and transfer the URL on the Overnet network 37. iii. Decrypt substitute(prenominal) Injection URL compromised hosts take advantages of a key(hard coded) to rewrite the URL. iv. Download Secondary Injection compromised hosts attempt to download the second jibe from a server( probably web server). It could be infected files or modifyd files or diagnos e of the P2P nodes 37.1.4.3 Hybrid modelThe Bots in the Hybrid Botnet are categorise into two groups1) Servant Bots Bots in the first group are called as retainer Bots, because they behave as both customers and servers, which have static, rou plank IP addresses and are kind from the entire Internet.2) Client Bots Bots in the second group is called as client Bots since they do not accept incoming connections. This group contains the re principal(prenominal)ing Bots, including- (a) Bots with dynamically designated IP addresses (b) Bots with Non-rou put back IP addresses and (c) Bots behind firewalls which they cannot be connected from the global Internet.1.5 play down of the ProblemBotnets which are controlled remotely by BotMasters can launch coarse denial of service attacks, several infiltration attacks, can be used to spread spam and also conduct malicious activities 115. While bot army activity has, so far, been limited to criminal activity, their potential for causing la rge- shell damage to the entire internet is immeasurable 115. Therefore, Botnets are one of the most dangerous types of network-based attack today because they involve the use of very large, synchronised groups of hosts for their malicious activities.Botnets obtain their power by size, both in their increase bandwidth and in their reach. As mentioned before Botnets can cause severe network disruptions through large denial- of-service attacks, and the danger of this interruption can charge enterp tramps big sums in extortion fees. Botnets are also used to harvest personal, corporate, or politics sensitive information for sale on a blooming nonionic crime market.1.6 Statement of the ProblemRecently, botnets are using new type of command-and-control(CC) communication which is totally decentralized. They utilize peer-to-peer style communication. Tracking the starting point and activity of this botnet is much more complicated due to the Peer-to-Peer communication infrastructure.Comb ating botnets is usually an issue of discovering their weakness their central position of command, or CC server. This is emblematicly an IRC network that all bots connect to central point, however with the use of P2P regularity we cannot find any central point of command. In the P2P networks each bots in searching to connect other peers which can receive or interpenetrate commands through network. Therefore, an accurate maculation and fighting system is required to pr emergence or stop such dangerous networks.1.7 Research Questionsa. What are the main differences between centralized and decentralized botnets?b. What is the best and efficient general protractible solution for catching non-specific Peer-to- Peer botnets?1.8 Objectives of the Studyi. To heighten a network-based theoretical account for Peer-to-Peer botnets spying by common air in network communication.ii. To admit the mien of bots and recognizing behavioral similarities across multiple bots in order to deve lop mentioned fashion model.1.9 Scope of the StudyThe project scope is limited to developing some algorithmic programs pertaining to our proposed framework. This algorithms are using for decreasing traffics by filtering it, classifying intended traffics, monitoring traffics and the detection of malicious activities.1.10 Significance of the nationalPeer-to-Peer botnets are one of the most advanced types of cyber crime today. They give the full control of many computers around to human beings to exploit them for malicious activities purpose such as spread of virus and worm, spam distribution and DDoS attack. Therefore, studying the behavior of P2P botnets and develop a technique that can detect them is important and high-demanded.1.11 Summary appreciation the Botnet Command-and-Control(CC) is a critical part in recognizing how to best protect against the overall botnet threat. The CC channels utilized by the Botnets will often show the type and decimal point of actions an enterpr ise can follow in either blocking or shutting down a botnet, and the probability of success.It is also obvious that attackers have been trying for old age to move away from Centralized CC channels, and are achieving some success using Decentralized(P2P) CC channels over the cobblers last 5 or so geezerhood. Therefore in this chapter we have be a classification for better understanding of Botnets CC channels, which is included Centralized, Decentralized, and Hybrid model and tried to evaluate recognized protocols in each of them. sense the communication topologies in Botnets is essential to precisely identify, detect and mitigate the ever-increase Botnets threats.CHAPTER 2LITERATURE REVIEW2.1 IntroductionBefore majority of botnets was using IRC (Internet Relay Chat) as a communication protocol for Command and Control(CC) mechanism. Therefore, many researches tried to develop botnet detection scheme which was based on analysis of IRC traffic 50. As a result, attackers decided to d evelop more civilize botnets, such as Storm worm and Nugache toward the utilization of P2P networks for CC infrastructures. In chemical reaction to this movement, researches have proposed various models of botnets detection that are based on P2P infrastructure 5.One key advantage of both IRC and HTTP Botnet is the use of central Command and Control. This characteristic provides the attacker with very well- unionised communication. However, the assets also considers as a main disfavour to the attacker 8. The threat of the Botnet can be decreased and peradventure omitted if the central CC is taken over or taken down 8. The method that is starting to come out is P2P structure for Botnet interaction. There is not any centralized centre for P2P botnets. Any nodes in P2P botnet behave as client and server as well. If any point in the network is shut down the botnet still can continue its operation.The storm botnet is one of the main and recognized recent P2P botnets. It customized th e overnet P2P file-sharing application which is based on the Kademlia distributed haschischeesh table algorithm 55 and exploit it for its CC infrastructure. Recently many researchers peculiarly in the anti-virus community and electronic media concentrated on storm worm 56,57.2.2 minimize and HistoryA peer-to-peer network is a network of computers that any computer in the network can behave as both a client and a server.Some explanation of peer-to-peer networks does not bring any form of centralized coordination. This definition is more comfortable because the attacker may be interested in hybrid architectures 8.2.2.1 HistoryThe table 2.1 shows a summary of some well-known bots and P2P protocols. The range of time from the first bots, EggDrop, until the Storm Worm P2P bot is newly released. The first non-malicious bot was EggDrop that came up many years ago, and we know it as one of the first IRC bots that came to market. GTBot that have many other categories is another well-know n malicious bot, that its variants are IRC client, mIRC.exe61.After a while, P2P protocols have been used for Botnet activities. Napster is one of the first bot that used P2P as its communication. Napster built an curriculum that permit all bots can find each other and cover files with each other in the network. In this bot, file sharing has been through with(p) in the centralized server that we can say it was not on the whole a P2P botnet. Therefore, all bots have to upload an index of their files to the centralized server and also if they are flavour for other files among all bots, have to search in centralized server. If it can find any file that looking for, then can directly connect to that bot and download what they want. Nowadays, because Napster has been shutdown as their service recognized as illegal service, many other P2P service focusing on avoiding such finding.After few years laterwards(prenominal) Napster, Gnutella protocol came up as the first completely P2P services. Actually subsequently Gnutellas , as shown in dishearten 2.1, many other P2P protocols have been released, such as Kademilia and Chord. This two new p2p service are using distributed haschischeesh table as a method for finding information in the peer-to-peer networks.Agobot is another malicious P2P bot that came up recently and become widespread because of acceptable design and modular code base 61. Nowadays many researchers are concentrating on P2P bots and there is an anticipation that P2P bots will reach to the stage that Centralized botnets will not been used any more in the future. dining table 2.1 P2P based Botnets2.3 Peers-to-Peer Overlay NetworksOverlay networks are categorized into two categories organise and Unstructured. All nodes in first category can connect to most X peers regarding some conditions for identification of nodes that those peers want to connect. However in uncrystallized type there is not any specified limit for the descend of peers that they can connect, in spite of the fact that there is not any condition for connecting to other peers. Overnet is a devout example of structured p2p networks and Chorf is a great example of formless P2P networks.2.3.1 Brief overview of OvernetOne of the popular file sharing networks is Overnet that use for their design use distributed hash table (DHT) algorithm that called Kademlia55. Each node let ons a 128-bit id for joining the network and also use for sending to other node for introducing itself. Actually each node in the network saves the information about other nodes in order to pathway query messages.2.3.2 Brief overview of GnutellaGnutellas is a unstructured file sharing network. In this network, when a node like n want to connect to a node like m, use a ping message to inform the other node for its presence. As long as node m received ping message, then send it back to other nodes in its neighbor and also send a Pong message to the transmitter of ping message that was node n. this transaction among node let them to take up about each other.2.4 Botnet DetectionIn particular, to compare existing botnet detection techniques, different methods are described and then disadvantages of each method are mentioned respectively.2.4.1 Honeypot-based trackingHoneypot can be used to collect bots for analyzing its behavior and tactile sensations and also for tracking botnets. But using honeypots have several limitations. The most important limitation is because of limited scale of exploited activities that can track. And also it cannot capture the bots that use the method of propagation other than see, such as spam. And finally it can only give report for transmission system machines that are anticipated and put in the network as trap system. So it means that it can not give a report for those computers that are infected with bot in the network but are not employ as trap machines. So we can come to this conclusion that by and large in this technique we h ave to wait until one bot in the network infect our system and then we can track or examine the machine.2.4.2 Intrusion detection systemsIntrusion detection techniques can be categorized into two categories host-based and network-based solution. Host-based techniques are used for recognizing malware binaries such as viruses. A satisfactory example of this type is anti-virus detection systems. However, we know that anti-virus are good for undecomposed virus detection. The most important disadvantages of anti-virus are that bots can easily hedge in the detection technique by changing their ghosts easily, because the detection system cannot update their databases consistency. And also bots can disable any anti-virus tools in the system to protect themselves from detection.Network- based intrusion detection system is another method for detection that is used in the field of botnet detection. Snort67 and Bro68 are the two well-known signature based detection system that are used curr ently. They use a database as signatures of famous malicious activities to detect botnets or any other malware. Actually if our objective is using this technique for botnet detection, we have to keep update the database and recognizing all malware quickly to make a signature of it and add to our database. For solving this solving this problem recently researchers are using anomaly based IDS that can detect malicious activities based on behavior of malware or detection techniques.2.4.3 Bothunter Dialog correlation-based Botnet detectionThis technique developed an evidence-trail approach for spy successful bot infection with descriptors during communication for infection process. In this strategy, bot infection pattern are modeled to use for recognizing the whole process of infection of botnet in the network. All behavior that occur the bot infection such as target examine, CC establishment, binary downloading and outbound propagation have to model by this method. This method ga thers an evidence-trail of connected infection process for each intragroup machine and then tries to look for a threshold combination of sequences that will move the condition for bot infection 32.The BotHunter use snort with adding two anomaly-detection components to it that are SLADE (Statistical freightage Anomaly Detection Engine) and SCADE (Statistical scan Anomaly Detection Engine). SCADE produce versed and external scan detection warnings that are weighted for criticality toward malware scanning patterns. SLADE manage a byte-distribution payload anomaly detection of incoming packets, providing a matching non-signature approach in inbound exploit detection 32 .Slade use an n-gram payload examination of traffics that have typical malware intrusions. SCADE execute some port scan analysis for incoming and outgoing traffics. Actually BotHunter has a affiliation between scan and alarm intrusion that shows a host has been infected. When a adequate sequence of alerts is establi shed to match BotHunters infection dialogueueue model, a comprehensive report is created to get all the related publications participants that have a rule in infection dialog 32. This method provides some important featuresi. This technique concentrates on malware detection by IDS-driven dialog correlation. This model shows an essential network processes that occur during a successful bot infection.ii. This technique has one IDS-independent dialog correlation engine and three bot-specific sensors. This technique can automatically produce a report of whole detection of bot, as well as the infection of agent, identification of the computer that has been infected and source of Command and Control centre.2.4.3.1 Bot infection sequencesActually understanding bot infection life processes is a ambitious work for protection of network in the future. The major work in this area is differentiating between successful bot infection and background exploit attempt. For make to this point a nalysis of two-way dialog flow between innate hosts and external hosts (internet) is necessitate. In a good design network which uses filtering at gateway, the threats of direct exploitations are limited. However, contemporary malware families are highly flexible in their ability to attack vulnerable hosts through email attachments, infected P2P media, and drive-by download infections 32.2.4.3.2 Modeling the infection dialog processThe bot distribution model can conclude by an analysis of external communication traffics that shows the behavior of pertinent botnet. Incoming scan and utilize alarms are not enough to ground a winning malware infection, as are assumed that a unchanging stream of scan and exploit signals will be observed from the way out monitor 32.Figure 2.1 shows the process of bot infection in BotHunter that used for evaluating network flows through eight stages. This model is almost similar with the model that Rajab et al. presented for IRC detection model. The model that they proposed has early initial scanning that is a previous consideration happen in form of IP exchange and pointing vulnerable ports. Actually figure 2.1 is not aimed for a strict ordering of infection exits that happen during bot infection.The important issue here is that bot dialog processes analysis have to be strong to the absence of some dialog founts and must not need strong sequencing on the order in bound dialog is conducted. One solution to solve the problem of sequence order and event is to use a weighted event threshold system that take smallest essential sparse sequences of events under which bot profile depositment can be initiated 32. For instance, it is possible put weighting and threshold system for the look of each event in a way that a smallest set of event is important prior of bot detection.2.4.3.3 Design and implementationMore attention devote for designing a passive network monitoring system in this part which be able of identifying the bidire ctional warning signs when interior(a) hosts are infected with bAnalysis of Botnet Security ThreatsAnalysis of Botnet Security ThreatsCHAPTER 1INTRODUCTION1.1 IntroductionDuring the last few decades, we have seen the dramatically rise of the Internet and its applications to the point which they have become a critical part of our lives. Internet security in that way has become more and more important to those who use the Internet for work, business, entertainment or education.Most of the attacks and malicious activities on the Internet are carried out by malicious applications such as Malware, which includes viruses, trojan, worms, and botnets. Botnets become a main source of most of the malicious activities such as scanning, distributed denial-of-service (DDoS) activities, and malicious activities happen across the Internet.1.2 Botnet Largest Security ThreatA bot is a software code, or a malware that runs automatically on a compromised machine without the users permission. The bot code is usually written by some criminal groups. The term bot refers to the compromised computers in the network. A botnet is essentially a network of bots that are under the control of an attacker (BotMaster). Figure 1.1 illustrates a typical structure of a botnet.A bot usually take advantage of civilize malware techniques. As an example, a bot use some techniques like keylogger to record user private information like password and hide its existence in the system. More importantly, a bot can distribute itself on the internet to increase its scale to form a bot army. Recently, attackers use compromised Web servers to contaminate those who visit the websites through drive-by download 6. Currently, a botnet contains thousands of bots, but there is some cases that botnet contain several millions of bots 7.Actually bots differentiate themselves from other kind of worms by their ability to receive commands from attacker remotely 32. Attacker or better call it botherder control bots thro ugh different protocols and structures. The Internet Relay Chat (IRC) protocol is the earliest and still the most commonly used CC channel at present. HTTP is also used because Http protocol is permitted in most networks. Centralized structure botnets was very successful in the past but now botherders use decentralized structure to avoid single point of failure problem.Unlike previous malware such as worms, which are used probably for entertaining, botnets are used for real financial abuse. Actually Botnets can cause many problems as some of them constituteed belowi. Click fraud. A botmaster can easily profit by forcing the bots to click on advertisement for the purpose of personal or commercial abuse.ii. Spam production. Majority of the email on the internet is spam.iii. DDoS attacks. A bot army can be commanded to begin a distributed denial-of-service attack against any machine.iv. Phishing. Botnets are widely used to host malicious phishing sites. Criminals usually send spam mes sages to deceive users to visit their forged web sites, so that they can obtain users critical information such as usernames, passwords.1.3 Botnet in-DepthNowadays, the most serious manifestation of advanced malware is Botnet. To make distinction between Botnet and other kinds of malware, the concepts of Botnet have to understand. For a better understanding of Botnet, two important terms, Bot and BotMaster have been defined from another point of views.Bot Bot is actually short for zombie which is also called as Zombie. It is a new type of malware 24 installed into a compromised computer which can be controlled remotely by BotMaster for executing some orders through the received commands. After the Bot code has been installed into the compromised computers, the computer becomes a Bot or Zombie 25. Contrary to existing malware such as virus and worm which their main activities focus on attacking the infecting host, bots can receive commands from BotMaster and are used in distributed attack platform.BotMaster BotMaster is also known as BotHerder, is a person or a group of person which control remote Bots. Botnets- Botnets are networks consisting of large number of Bots. Botnets are created by the BotMaster to setup a private communication infrastructure which can be used for malicious activities such as Distributed Denial-of-Service (DDoS), sending large amount of SPAM or phishing mails, and other nefarious purpose 26, 27, 28. Bots infect a persons computer in many ways.Bots usually disseminate themselves across the Internet by looking for vulnerable and unprotected computers to infect. When they find an unprotected computer, they infect it and then send a report to the BotMaster. The Bot stay hidden until they are announced by their BotMaster to perform an attack or task. Other ways in which attackers use to infect a computer in the Internet with Bot include sending email and using malicious websites, but common way is searching the Internet to look for vulne rable and unprotected computers 29. The activities associated with Botnet can be classified into three parts (1) Searching searching for vulnerable and unprotected computers. (2) Dissemination the Bot code is distributed to the computers (targets), so the targets become Bots. (3) sign-on the Bots connect to BotMaster and become ready to receive command and control traffic.The main difference between Botnet and other kind of malwares is the existence of Command-and-Control (CC) infrastructure. The CC consent tos Bots to receive commands and malicious capabilities, as apply by BotMaster. BotMaster must ensure that their CC infrastructure is sufficiently robust to manage thousands of distributed Bots across the globe, as well as resisting any attempts to shutdown the Botnets. However, detection and mitigation techniques against Botnets have been increased 30,31. Recently, attackers are also continually improving their approaches to protect their Botnets. The first generation of Bo tnets utilized the IRC (Internet Relay Chat) channels as their Common-and-Control (CC) centers. The centralized CC mechanism of such Botnet has made them vulnerable to being find and disabled. Therefore, new generation of Botnet which can hide their CC communication have emerged, Peer-to-Peer (P2P) based Botnets. The P2P Botnets do not experience from a single point of failure, because they do not have centralized CC servers 35. Attackers have therefore developed a range of strategies and techniques to protect their CC infrastructure.Therefore, considering the CC live on gives better understanding of Botnet and help defenders to design proper detection or mitigation techniques. According to the CC channel we categorize Botnets into three different topologies a) Centralized b) Decentralized and c) Hybrid. In Section 1.1.4, these topologies have been analyzed and completely considered the protocols that are currently being used in each model.1.4 Botnet TopologiesAccording to the Com mand-and-Control(CC) channel, Botnet topology is categorized into three different models, the Centralized model, the Decentralized model and Hybrid model.1.4.1 Centralized ModelThe oldest type of topology is the centralized model. In this model, one central point is responsible for exchanging commands and data between the BotMaster and Bots. In this model, BotMaster chooses a host (usually high bandwidth computer) to be the central point (Command-and-Control) server of all the Bots. The CC server runs certain network services such as IRC or HTTP. The main advantage of this model is small message latency which cause BotMaster easily arranges Botnet and launch attacks.Since all connections happen through the CC server, therefore, the CC is a critical point in this model. In other words, CC server is the weak point in this model. If individual manages to discover and eliminates the CC server, the entire Botnet will be worthless and ineffective. Thus, it becomes the main drawback of th is model. A lot of modern centralized Botnets employed a list of IP addresses of alternative CC servers, which will be used in case a CC server discovered and has been taken offline.Since IRC and HTTP are two common protocols that CC server uses for communication, we consider Botnets in this model based on IRC and HTTP. Figure 1.2 shows the basic communication architecture for a Centralized model. There are two central points that forward commands and data between the BotMaster and his Bots.1.4.1.1 Botnets based on IRCThe IRC is a type of real-time Internet text messaging or synchronous conferencing 36. IRC protocol is based on the Client Server model that can be used on many computers in distributed networks. Some advantages which made IRC protocol widely being used in remote communication for Botnets are (i) low latency communication (ii) anonymous real-time communication (iii) ability of Group (many-to-many) and secluded (one-to-one) communication (iv) simple to setup and (v) si mple commands. The basic commands are connect to servers, join channels and post messages in the channels (vi) very tractableness in communication. Therefore IRC protocol is still the most popular protocol being used in Botnet communication.In this model, BotMasters can command all of their Bots or command a few of the Bots using one-to-one communication. The CC server runs IRC service that is the same with other standard IRC service. Most of the time BotMaster creates a channel on the IRC server that all the bots can connect, which instruct each connected bot to do the BotMasters commands. Figure 1.3 showed that there is one central IRC server that forwards commands and data between the BotMaster and his Bots.Puri 38 presented the procedures and mechanism of Botnet based on IRC, as shown in Figure. 1.4.Bots infection and control process 38i. The attacker tries to infect the targets with Bots.ii. After the Bot is installed on target machine, it will try to connect to IRC server. In this while a random nickname will be generate that show the bot in attackers private channel.iii. Request to the DNS server, dynamic mapping IRC servers IP address.iv. The Bot will join the private IRC channel set up by the attacker and wait for instructions from the attacker. Most of these private IRC channel is set as the encrypted mode.v. Attacker sends attack instruction in private IRC channel.vi. The attacker tries to connect to private IRC channel and send the authentication password.vii. Bots receive instructions and launch attacks such as DDoS attacks.1.4.1.2 Botnet based on HTTPThe HTTP protocol is an spare well-known protocol used by Botnets. Because IRC protocol within Botnets became well-known, internet security researchers gave more consideration to monitoring IRC traffic to detect Botnet. Consequently, attackers started to use HTTP protocol as a Command-and-Control communication channel to make Botnets become more difficult to detect. The main advantage of using the HTTP protocol is hiding Botnets traffics in normal web traffics, so it can easily passes firewalls and avoid IDS detection. Usually firewalls block incoming and outgoing traffic to not needed ports, which usually include the IRC port.1.4.2 Decentralized modelDue to major disadvantage of Centralized model-Central Command-and-Control (CC)-attackers tried to build another Botnet communication topology that is harder to discover and to destroy. Hence, they decided to find a model in which the communication system does not heavily depending on few selected servers and even discovering and destroying a number of Bots.As a result, attackers take advantage of Peer-to-Peer (P2P) communication as a Command-and-Control (CC) pattern which is much harder to shut down in the network. The P2P based CC model will be used considerably in Botnets in the future, and definitely Botnets that use P2P based CC model impose much bigger challenge for defense of networks.In the P2P model, as shown in Fig. 1. 6, there is no Centralized point for communication. Each Bot have some connections to the other Bots of the same Botnet and Bots act as both Clients and servers. A new Bot must know some addresses of the Botnet to connect there. If Bots in the Botnet are taken offline, the Botnet can still continue to operate under the control of BotMaster.P2P Botnets aim at removing or hiding the central point of failure which is the main weakness and vulnerability of Centralized model. Some P2P Botnets operate to a certain extent decentralized and some completely decentralized. Those Botnets that are completely decentralized allow a BotMaster to insert a command into any Bots. Since P2P Botnets usually allow commands to be injected at any node in the network, the authentication of commands become essential to stay other nodes from injecting incorrect commands.For a better understanding in this model, some characteristics and important features of famous P2P Botnets have been mentioned Slapper All ows the routing of commands to distinct nodes. Uses Public key and private key cryptography to authenticate commands. BotMasters sign commands with private key and only those nodes which has corresponding public key can verify the commands 42. Two important weak points are (a) its list of known Bots contains all (or almost all) of the Botnet. Thus, one single captured Bot would expose the entire Botnet to defenders 42 (b) its advance(a) communication mechanism produces lot traffic, making it vulnerable to monitoring via network flow analysis. Sinit This Bot uses random searching to discove other Bots to communicate with. It can results in an easy detection due to the extensive probing traffic 34. Nugache Its weakness is based on its reliance on a seed list of 22 IP addresses during its bootstrap process 47. Phatbot Uses Gnutella cache server for its bootstrap process which can be easily shutdown. Also its WASTE P2P protocol has a scalability problem across a long network 48. Strom worm it uses a P2p overnet protocl to control compromised hosts. The communication protocol for this Bot can be classified into five steps, as describes below 37 i. Connect to Overnet Bots try to join Overnet network. Each Bot initially has hard-coded binary files which is included the IP addresses of P2P-based Botnet nodes. ii. Search and Download Secondary Injection URL Bot uses hard-coded keys to explore for and download the URL on the Overnet network 37. iii. Decrypt Secondary Injection URL compromised hosts take advantages of a key(hard coded) to decode the URL. iv. Download Secondary Injection compromised hosts attempt to download the second crack from a server(probably web server). It could be infected files or updated files or list of the P2P nodes 37.1.4.3 Hybrid modelThe Bots in the Hybrid Botnet are categorized into two groups1) Servant Bots Bots in the first group are called as servant Bots, because they behave as both clients and servers, which have static, rout able IP addresses and are social from the entire Internet.2) Client Bots Bots in the second group is called as client Bots since they do not accept incoming connections. This group contains the remaining Bots, including- (a) Bots with dynamically designated IP addresses (b) Bots with Non-routable IP addresses and (c) Bots behind firewalls which they cannot be connected from the global Internet.1.5 Background of the ProblemBotnets which are controlled remotely by BotMasters can launch huge denial of service attacks, several infiltration attacks, can be used to spread spam and also conduct malicious activities 115. While bot army activity has, so far, been limited to criminal activity, their potential for causing large- scale damage to the entire internet is immeasurable 115. Therefore, Botnets are one of the most dangerous types of network-based attack today because they involve the use of very large, synchronised groups of hosts for their malicious activities.Botnets obtain their power by size, both in their increasing bandwidth and in their reach. As mentioned before Botnets can cause severe network disruptions through huge denial- of-service attacks, and the danger of this interruption can charge enterprises big sums in extortion fees. Botnets are also used to harvest personal, corporate, or governing body sensitive information for sale on a blooming organized crime market.1.6 Statement of the ProblemRecently, botnets are using new type of command-and-control(CC) communication which is totally decentralized. They utilize peer-to-peer style communication. Tracking the starting point and activity of this botnet is much more complicated due to the Peer-to-Peer communication infrastructure.Combating botnets is usually an issue of discovering their weakness their central position of command, or CC server. This is typically an IRC network that all bots connect to central point, however with the use of P2P method we cannot find any central point of command. In the P2P networks each bots in searching to connect other peers which can receive or program commands through network. Therefore, an accurate detection and fighting method is required to prevent or stop such dangerous networks.1.7 Research Questionsa. What are the main differences between centralized and decentralized botnets?b. What is the best and efficient general extensible solution for detecting non-specific Peer-to- Peer botnets?1.8 Objectives of the Studyi. To develop a network-based framework for Peer-to-Peer botnets detection by common behavior in network communication.ii. To study the behavior of bots and recognizing behavioral similarities across multiple bots in order to develop mentioned framework.1.9 Scope of the StudyThe project scope is limited to developing some algorithms pertaining to our proposed framework. This algorithms are using for decreasing traffics by filtering it, classifying intended traffics, monitoring traffics and the detection of malicious activitie s.1.10 Significance of the studyPeer-to-Peer botnets are one of the most sophisticated types of cyber crime today. They give the full control of many computers around to earth to exploit them for malicious activities purpose such as spread of virus and worm, spam distribution and DDoS attack. Therefore, studying the behavior of P2P botnets and develop a technique that can detect them is important and high-demanded.1.11 SummaryUnderstanding the Botnet Command-and-Control(CC) is a critical part in recognizing how to best protect against the overall botnet threat. The CC channels utilized by the Botnets will often show the type and point of actions an enterprise can follow in either blocking or shutting down a botnet, and the probability of success.It is also obvious that attackers have been trying for years to move away from Centralized CC channels, and are achieving some success using Decentralized(P2P) CC channels over the last 5 or so years. Therefore in this chapter we have defi ned a classification for better understanding of Botnets CC channels, which is included Centralized, Decentralized, and Hybrid model and tried to evaluate recognized protocols in each of them. Understanding the communication topologies in Botnets is essential to precisely identify, detect and mitigate the ever-increasing Botnets threats.CHAPTER 2LITERATURE REVIEW2.1 IntroductionBefore majority of botnets was using IRC (Internet Relay Chat) as a communication protocol for Command and Control(CC) mechanism. Therefore, many researches tried to develop botnet detection scheme which was based on analysis of IRC traffic 50. As a result, attackers decided to develop more sophisticated botnets, such as Storm worm and Nugache toward the utilization of P2P networks for CC infrastructures. In response to this movement, researches have proposed various models of botnets detection that are based on P2P infrastructure 5.One key advantage of both IRC and HTTP Botnet is the use of central Command a nd Control. This characteristic provides the attacker with very well-organized communication. However, the assets also considers as a main disadvantage to the attacker 8. The threat of the Botnet can be decreased and possibly omitted if the central CC is taken over or taken down 8. The method that is starting to come out is P2P structure for Botnet interaction. There is not any centralized centre for P2P botnets. Any nodes in P2P botnet behave as client and server as well. If any point in the network is shut down the botnet still can continue its operation.The storm botnet is one of the main and recognized recent P2P botnets. It customized the overnet P2P file-sharing application which is based on the Kademlia distributed hash table algorithm 55 and exploit it for its CC infrastructure. Recently many researchers particularly in the anti-virus community and electronic media concentrated on storm worm 56,57.2.2 Background and HistoryA peer-to-peer network is a network of computers th at any computer in the network can behave as both a client and a server.Some explanation of peer-to-peer networks does not need any form of centralized coordination. This definition is more comfortable because the attacker may be interested in hybrid architectures 8.2.2.1 HistoryThe table 2.1 shows a summary of some well-known bots and P2P protocols. The range of time from the first bots, EggDrop, until the Storm Worm P2P bot is newly released. The first non-malicious bot was EggDrop that came up many years ago, and we know it as one of the first IRC bots that came to market. GTBot that have many other categories is another well-known malicious bot, that its variants are IRC client, mIRC.exe61.After a while, P2P protocols have been used for Botnet activities. Napster is one of the first bot that used P2P as its communication. Napster built an platform that permit all bots can find each other and share files with each other in the network. In this bot, file sharing has been done in t he centralized server that we can say it was not completely a P2P botnet. Therefore, all bots have to upload an index of their files to the centralized server and also if they are looking for other files among all bots, have to search in centralized server. If it can find any file that looking for, then can directly connect to that bot and download what they want. Nowadays, because Napster has been shutdown as their service recognized as illegal service, many other P2P service focusing on avoiding such finding.After few years after Napster, Gnutella protocol came up as the first completely P2P services. Actually after Gnutellas , as shown in Table 2.1, many other P2P protocols have been released, such as Kademilia and Chord. This two new p2p service are using distributed hash table as a method for finding information in the peer-to-peer networks.Agobot is another malicious P2P bot that came up recently and become widespread because of good design and modular code base 61. Nowadays m any researchers are concentrating on P2P bots and there is an anticipation that P2P bots will reach to the stage that Centralized botnets will not been used any more in the future.Table 2.1 P2P based Botnets2.3 Peers-to-Peer Overlay NetworksOverlay networks are categorized into two categories unified and Unstructured. All nodes in first category can connect to most X peers regarding some conditions for identification of nodes that those peers want to connect. However in unstructured type there is not any specified limit for the number of peers that they can connect, in spite of the fact that there is not any condition for connecting to other peers. Overnet is a good example of structured p2p networks and Chorf is a good example of unstructured P2P networks.2.3.1 Brief overview of OvernetOne of the popular file sharing networks is Overnet that use for their design use distributed hash table (DHT) algorithm that called Kademlia55. Each node produces a 128-bit id for joining the netwo rk and also use for sending to other node for introducing itself. Actually each node in the network saves the information about other nodes in order to travel plan query messages.2.3.2 Brief overview of GnutellaGnutellas is a unstructured file sharing network. In this network, when a node like n want to connect to a node like m, use a ping message to inform the other node for its presence. As long as node m received ping message, then send it back to other nodes in its neighbor and also send a Pong message to the transmitter of ping message that was node n. this transaction among node let them to learn about each other.2.4 Botnet DetectionIn particular, to compare existing botnet detection techniques, different methods are described and then disadvantages of each method are mentioned respectively.2.4.1 Honeypot-based trackingHoneypot can be used to collect bots for analyzing its behavior and signatures and also for tracking botnets. But using honeypots have several limitations. Th e most important limitation is because of limited scale of exploited activities that can track. And also it cannot capture the bots that use the method of propagation other than scanning, such as spam. And finally it can only give report for infection machines that are anticipated and put in the network as trap system. So it means that it can not give a report for those computers that are infected with bot in the network but are not devoted as trap machines. So we can come to this conclusion that for the most part in this technique we have to wait until one bot in the network infect our system and then we can track or analyze the machine.2.4.2 Intrusion detection systemsIntrusion detection techniques can be categorized into two categories host-based and network-based solution. Host-based techniques are used for recognizing malware binaries such as viruses. A good example of this type is anti-virus detection systems. However, we know that anti-virus are good for honest virus detect ion. The most important disadvantages of anti-virus are that bots can easily turn off the detection technique by changing their signatures easily, because the detection system cannot update their databases consistency. And also bots can disable any anti-virus tools in the system to protect themselves from detection.Network- based intrusion detection system is another method for detection that is used in the field of botnet detection. Snort67 and Bro68 are the two well-known signature based detection system that are used currently. They use a database as signatures of famous malicious activities to detect botnets or any other malware. Actually if our objective is using this technique for botnet detection, we have to keep update the database and recognizing all malware quickly to make a signature of it and add to our database. For solving this solving this problem recently researchers are using anomaly based IDS that can detect malicious activities based on behavior of malware or det ection techniques.2.4.3 Bothunter Dialog correlation-based Botnet detectionThis technique developed an evidence-trail approach for detecting successful bot infection with patterns during communication for infection process. In this strategy, bot infection pattern are modeled to use for recognizing the whole process of infection of botnet in the network. All behavior that occur the bot infection such as target scanning, CC establishment, binary downloading and outbound propagation have to model by this method. This method gathers an evidence-trail of connected infection process for each internal machine and then tries to look for a threshold combination of sequences that will induce the condition for bot infection 32.The BotHunter use snort with adding two anomaly-detection components to it that are SLADE (Statistical burden Anomaly Detection Engine) and SCADE (Statistical scan Anomaly Detection Engine). SCADE produce internal and external scan detection warnings that are weighted for criticality toward malware scanning patterns. SLADE perform a byte-distribution payload anomaly detection of incoming packets, providing a matching non-signature approach in inbound exploit detection 32 .Slade use an n-gram payload examination of traffics that have typical malware intrusions. SCADE execute some port scan analysis for incoming and outgoing traffics. Actually BotHunter has a draw between scan and alarm intrusion that shows a host has been infected. When a adequate sequence of alerts is established to match BotHunters infection dialog model, a comprehensive report is created to get all the related events participants that have a rule in infection dialog 32. This method provides some important featuresi. This technique concentrates on malware detection by IDS-driven dialog correlation. This model shows an essential network processes that occur during a successful bot infection.ii. This technique has one IDS-independent dialog correlation engine and three bot-specif ic sensors. This technique can automatically produce a report of whole detection of bot, as well as the infection of agent, identification of the computer that has been infected and source of Command and Control centre.2.4.3.1 Bot infection sequencesActually understanding bot infection life processes is a dispute work for protection of network in the future. The major work in this area is differentiating between successful bot infection and background exploit attempt. For range to this point analysis of two-way dialog flow between internal hosts and external hosts (internet) is needed. In a good design network which uses filtering at gateway, the threats of direct exploitations are limited. However, contemporary malware families are highly flexible in their ability to attack vulnerable hosts through email attachments, infected P2P media, and drive-by download infections 32.2.4.3.2 Modeling the infection dialog processThe bot distribution model can conclude by an analysis of extern al communication traffics that shows the behavior of germane(predicate) botnet. Incoming scan and utilize alarms are not enough to state a winning malware infection, as are assumed that a unchangeable stream of scan and exploit signals will be observed from the way out monitor 32.Figure 2.1 shows the process of bot infection in BotHunter that used for evaluating network flows through eight stages. This model is almost similar with the model that Rajab et al. presented for IRC detection model. The model that they proposed has early initial scanning that is a antecedent consideration happen in form of IP exchange and pointing vulnerable ports. Actually figure 2.1 is not aimed for a strict ordering of infection events that happen during bot infection.The important issue here is that bot dialog processes analysis have to be strong to the absence of some dialog events and must not need strong sequencing on the order in bound dialog is conducted. One solution to solve the problem of se quence order and event is to use a weighted event threshold system that take smallest essential sparse sequences of events under which bot profile statement can be initiated 32. For instance, it is possible put weighting and threshold system for the look of each event in a way that a smallest set of event is important prior of bot detection.2.4.3.3 Design and implementationMore attention devoted for designing a passive network monitoring system in this part which be able of identifying the bidirectional warning signs when internal hosts are infected with b
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.