+ All Categories
Home > Documents > On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik...

On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik...

Date post: 05-Oct-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
116
On the Robustness of Random Walk Algorithms for the Detection of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität Dresden Dresden, Germany firstllast@tuddresdenlde 2 Universität Hamburg Hamburg, Germany firstllast@informatislunidhamburglde
Transcript
Page 1: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

On the Robustness of Random Walk Algorithms for the Detection

of Unstructured P2P Botnets

Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2

1 Technische Universität DresdenDresden, Germany

firstllast@tuddresdenlde

2 Universität HamburgHamburg, Germany

firstllast@informatislunidhamburglde

Page 2: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

2

Outline

[7]

Page 3: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

3

OutlineIl Motivation

[7]

Page 4: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

4

OutlineIl MotivationIIl Botnets

1l Definition2l Graph Model

[7]

Page 5: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

5

OutlineIl MotivationIIl Botnets

1l Definition2l Graph Model

IIIl Random Walss

[7]

Page 6: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

6

OutlineIl Motivation

IIl Botnets1l Definition2l Graph Model

IIIl Random Walss

IVlAnalysis and Detection

[7]

Page 7: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

7

OutlineIl Motivation

IIl Botnets1l Definition2l Graph Model

IIIl Random Walss

IVlAnalysis and Detection

Vl Limiting Knowledge[7]

Page 8: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

8

OutlineIl Motivation

IIl Botnets1l Definition2l Graph Model

IIIl Random Walss

IVlAnalysis and Detection

Vl Limiting Knowledge

VIlResults [7]

Page 9: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

9

OutlineIl Motivation

IIl Botnets1l Definition2l Graph Model

IIIl Random Walss

IVlAnalysis and Detection

Vl Limiting Knowledge

VIlResults

VIIlConclusion

[7]

Page 10: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

10[1] 10

Page 11: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

11[2]

Page 12: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

12[3]

Page 13: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

13[4]

Page 14: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

14[5]

Page 15: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

15[6]

Page 16: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

16

What are Botnets?

[9]

Page 17: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

17

What are Botnets?● Device collection

[9]

Page 18: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

18

What are Botnets?● Device collection● Internetdconnected

[9]

Page 19: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

19

What are Botnets?● Device collection● Internetdconnected● Malwaredinfected

[9]

Page 20: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

20

What are Botnets?● Device collection● Internetdconnected● Malwaredinfected● Remotely controlled

(usually centralized)

[9]

Page 21: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

21

Why are Botnets bad?

[9]

Page 22: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

22

Why are Botnets bad?● Clicsfraud

[9]

Page 23: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

23

Why are Botnets bad?● Clicsfraud● Spam

[9]

Page 24: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

24

Why are Botnets bad?● Clicsfraud● Spam● DDoS attacss

[9]

Page 25: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

25

Why are Botnets bad?● Clicsfraud● Spam● DDoS attacss● Cryptocurrency mining

[9]

Page 26: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

26

Why are Botnets bad?● Clicsfraud● Spam● DDoS attacss● Cryptocurrency mining● Intellectual property theft

[9]

Page 27: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

27

Topological Categories● Centralized

[8]

Page 28: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

28

Topological Categories● Centralized● Decentralized

[8]

Page 29: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

29

Topological Categories● Centralized● Decentralized

– Structured– Unstructured

[8]

Page 30: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

30

Centralized Botnets

Page 31: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

31

Centralized Botnets● Central C2 server

Page 32: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

32

Centralized Botnets● Central C2 server● Star topology

Page 33: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

33

Centralized Botnets● Central C2 server● Star topology● IRC/HTTP/…

Page 34: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

34

Centralized Botnets● Central C2 server● Star topology● IRC/HTTP/…● Single point of failure

Page 35: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

35

Structured P2P Botnets

Page 36: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

36

Structured P2P Botnets● No C2 server

Page 37: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

37

Structured P2P Botnets● No C2 server● Hard to tase down

Page 38: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

38

Structured P2P Botnets● No C2 server● Hard to tase down● Specific rule set

Page 39: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

39

Structured P2P Botnets● No C2 server● Hard to tase down● Specific rule set● Kademlia, Chord

Page 40: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

40

Unstructured P2P Botnets

Page 41: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

41

Unstructured P2P Botnets● Randomized

Page 42: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

42

Unstructured P2P Botnets● Randomized● Evade topological

matching

Page 43: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

43

Unstructured P2P Botnets● Randomized● Evade topological

matching● Statistical methods

necessary

Page 44: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

44

Existing Approaches

[7]

Page 45: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

45

Existing Approaches● Leverage graph models

[7]

Page 46: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

46

Existing Approaches● Leverage graph models

● … and random walss

[7]

Page 47: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

47

Existing Approaches● Leverage graph models

● … and random walss

[7]

Page 48: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

48

Existing Approaches● Leverage graph models

● … and random walss

● Focus on structured botnets [10, 11, 12]

[7]

Page 49: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

49

Existing Approaches● Leverage graph models

● … and random walss

● Focus on structured botnets [10, 11, 12]

● Do not use open technologies

[7]

Page 50: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

50

Existing Approaches● Leverage graph models

● … and random walss

● Focus on structured botnets [10, 11, 12]

● Do not use open technologies

● Often assume complete snowledge on botnet communication

[7]

Page 51: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

51

Our Approach

Page 52: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

52

Our Approach● Leverages random walss

Page 53: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

53

Our Approach● Leverages random walss● Uses opendsource

technologies

Page 54: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

54

Our Approach● Leverages random walss● Uses opendsource

technologies● Tested on

unstructured botnets

Page 55: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

55

Our Approach● Leverages random walss● Uses opendsource

technologies● Tested on

unstructured botnets● Precise when information

is limited

Page 56: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

56

Our Approach● Leverages random walss● Uses opendsource

technologies● Tested on

unstructured botnets● Precise when information

is limited● Can be combined with

other approaches

Page 57: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

57

Communication Graph

Page 58: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

58

Communication Graph

• No payload data needed

Page 59: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

59

Communication Graph

• No payload data needed

• Networs operator’s view

Page 60: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

60

Communication Graph

• No payload data needed

• Networs operator’s view

• Aggregated NetFlow data

Page 61: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

61

Communication Graph

• No payload data needed

• Networs operator’s view

• Aggregated NetFlow data

• Idea: extract welldconnected subgraph

Page 62: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

62

Communication Graph

• No payload data needed

• Networs operator’s view

• Aggregated NetFlow data

• Idea: extract welldconnected subgraph

• Approach: Random Walss

Page 63: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

63

GL=(V L , EL)

Page 64: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

64

k=0

Page 65: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

65

k=1

Page 66: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

66

k=2

Page 67: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

67

k=3

Page 68: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

68

k=4

Page 69: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

69

Probability Distribution

Page 70: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

70

Probability Distribution● n=10,000 walss

Page 71: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

71

Probability Distribution● n=10,000 walss● Of length k=3

Page 72: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

72

Probability Distribution● n=10,000 walss● Of length k=3● With loss l=0.5

Page 73: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

73

Probability Distribution● n=10,000 walss● Of length k=3● With loss l=0.5● Fastdmixing artifact

Page 74: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

74

The Analysis Pipeline

Page 75: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

75

The Analysis Pipeline

● Aggregate NetFlow data (Python 3l6, networkx)

Page 76: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

76

The Analysis Pipeline

● Aggregate NetFlow data (Python 3l6, networkx)● Evaluation steps:

– Botnet node mapping

Page 77: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

77

The Analysis Pipeline

● Aggregate NetFlow data (Python 3l6, networkx)● Evaluation steps:

– Botnet node mapping– Apply loss functions

Page 78: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

78

The Analysis Pipeline

● Aggregate NetFlow data (Python 3l6, networkx)● Evaluation steps:

– Botnet node mapping– Apply loss functions

● Execute random walss (numpy)

Page 79: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

79

The Analysis Pipeline

● Aggregate NetFlow data (Python 3l6, networkx)● Evaluation steps:

– Botnet node mapping– Apply loss functions

● Execute random walss (numpy)● Normalize resulting probability distribution

Page 80: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

80

The Analysis Pipeline

● Aggregate NetFlow data (Python 3l6, networkx)● Evaluation steps:

– Botnet node mapping– Apply loss functions

● Execute random walss (numpy)● Normalize resulting probability distribution● Cluster wals destinations (DBSCAN)

Page 81: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

81

The Test Dataset

Page 82: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

82

The Test Dataset

● CTU11 from Czech Technical University

Page 83: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

83

The Test Dataset

● CTU11 from Czech Technical University● ZA24 ZeroAccess communication graph

Page 84: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

84

Loss Strategies

17

9

19

11

4

1

18 3

7

16

6

13

5

15

10

14

0

8

Page 85: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

85

Loss Strategies● Other approaches do

not evaluate limited networs view

17

9

19

11

4

1

18 3

7

16

6

13

5

15

10

14

0

8

Page 86: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

86

Loss Strategies● Other approaches do

not evaluate limited networs view

● Unrealistic assumptions:– All communication

relationships captured17

9

19

11

4

1

18 3

7

16

6

13

5

15

10

14

0

8

Page 87: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

87

Loss Strategies● Other approaches do

not evaluate limited networs view

● Unrealistic assumptions:– All communication

relationships captured– Complete botnet in

snown networs

17

9

19

11

4

1

18 3

7

16

6

13

5

15

10

14

0

8

Page 88: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

88

Loss Strategies● Other approaches do

not evaluate limited networs view

● Unrealistic assumptions:– All communication

relationships captured– Complete botnet in

snown networs● Solution: Simulate loss on

communication graph

17

9

19

11

4

1

18 3

7

16

6

13

5

15

10

14

0

8

Page 89: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

89

Random Botnet Edge Deletion

17

9

19

11

4

1

18 3

7

16

6

13

5

15

10

14

0

8

Page 90: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

90

Random Botnet Edge Deletion● Random subset of

botnet edges

17

9

19

11

4

1

18 3

7

16

6

13

5

15

10

14

0

8

Page 91: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

91

Random Botnet Edge Deletion● Random subset of

botnet edges

17

9

19

11

4

1

18 3

7

16

6

13

5

15

10

14

0

8

Page 92: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

92

Random Botnet Edge Deletion● Random subset of

botnet edges● Outdofdview connections

17

9

19

11

4

1

18 3

7

16

6

13

5

15

10

14

0

8

Page 93: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

93

Random Botnet Edge Deletion● Random subset of

botnet edges● Outdofdview connections● ISPdrelated loss

(elgl 1:256 sampling) 17

9

19

11

4

1

18 3

7

16

6

13

5

15

10

14

0

8

Page 94: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

94

RBED Robustness

Page 95: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

95

RBED Robustness● Random Botnet Edge

Deletion

Page 96: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

96

RBED Robustness● Random Botnet Edge

Deletion

Page 97: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

97

RBED Robustness● Random Botnet Edge

Deletion

Page 98: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

98

RBED Robustness● Random Botnet Edge

Deletion● 90% loss – 83% precision

Page 99: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

99

Host-based Visibility

17

9

19

11

4

1

18 3

7

16

6

13

5

15

10

14

0

8

Page 100: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

100

Host-based Visibility● Sensor deployment

17

9

19

11

4

1

18 3

7

16

6

13

5

15

10

14

0

8

Page 101: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

101

Host-based Visibility● Sensor deployment● Randomly chosen

17

9

19

11

4

1

18 3

7

16

6

13

5

15

10

14

0

8

Page 102: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

102

Host-based Visibility● Sensor deployment● Randomly chosen

17

9

19

11

4

1

18 3

7

16

6

13

5

15

10

14

0

8

Page 103: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

103

Host-based Visibility● Sensor deployment● Randomly chosen● No communication

between unmonitored hosts 17

9

19

11

4

1

18 3

7

16

6

13

5

15

10

14

0

8

Page 104: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

104

Host-based Visibility● Sensor deployment● Randomly chosen● No communication

between unmonitored hosts

● Honeypot scenario

17

9

19

11

4

1

18 3

7

16

6

13

5

15

10

14

0

8

Page 105: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

105

Sensor-Network Robustness● Sensor deployment

Page 106: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

106

Sensor-Network Robustness● Sensor deployment

Page 107: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

107

Sensor-Network Robustness● Sensor deployment

Page 108: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

108

Sensor-Network Robustness● Sensor deployment● 25 sensors – 90% precision

Page 109: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

109

Conclusion

[7]

Page 110: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

110

Conclusion● Structured and unstructured

botnets: fastdmixing

[7]

Page 111: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

111

Conclusion● Structured and unstructured

botnets: fastdmixing● Highdprecision detection

– 83% precision

[7]

Page 112: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

112

Conclusion● Structured and unstructured

botnets: fastdmixing● Highdprecision detection

– 83% precision– With 90% missing edges

[7]

Page 113: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

113

Conclusion● Structured and unstructured

botnets: fastdmixing● Highdprecision detection

– 83% precision– With 90% missing edges

● Simple architecture[7]

Page 114: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

114

Conclusion● Structured and unstructured

botnets: fastdmixing● Highdprecision detection

– 83% precision– With 90% missing edges

● Simple architecture● Only opendsource algorithms [7]

Page 115: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

115

Thanss!Questions?

[7]

Page 116: On the Robustness of Random Walk Algorithms for the ...€¦ · of Unstructured P2P Botnets Dominik Muhs 1 Stefen Haas 2 Thorsten Strufe 1 Mathias Fischer 2 1 Technische Universität

116

References[1] http://www.theregister.co.uk/2017/04/27/hajime_iot_botnet/

[2] https://www.zdnet.com/article/satori-botnet-successor-targets-ethereum-mining-rigs/

[3] https://arstechnica.com/information-technology/2017/12/100000-strong-botnet-built-on-router-0-day-could-strike-at-any-time/

[4] https://www.scmagazine.com/malicious-bot-trafc-climbs-95-percent-in-2017-says-report/article/754164/

[5] https://www.zdnet.com/article/new-mirai-style-botnet-targets-the-fnancial-sector/

[6] https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/-hide-n-seek-botnet-uses-peer-to-peer-infrastructure-to-compromise-iot-devices

[7] Icon made by Freepik from https://www.faticon.com/

[8] Icon made by dDara from https://www.faticon.com/

[9] Icon made by Kiranshastry from https://faticon.com/

[10] Shishir Nagaraja et al. “BotGrep: fnding P2P bots with structured graph analysis”. In: USENIX Security Symposium. 2010, p. 7.

[11] Pratik Narang et al. “PeerShark: Detecting peer-to-peer botnets by tracking conversations”. In: Proceedings – IEEE Symposium on Security and Privacy. Vol. January 20. 2014, pp. 108–115.

[12] Guofei Gu, Junjie Zhang, and Wenke Lee. “BotSnifer : Detecting Botnet Command and Control Channels in Network Trafc”. In: Proceedings of the 15th Annual Network and Distributed System Security Symposium. 53.1 (2008), pp. 1–13.


Recommended