+ All Categories
Home > Documents > Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical...

Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical...

Date post: 19-Dec-2015
Category:
View: 220 times
Download: 0 times
Share this document with a friend
Popular Tags:
12
Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University Network-based Botnet Detection Filtering, Containment, and Destruction Motorola Liaisons Z. Judy Fu and Philip R. Roberts Motorola Labs
Transcript
Page 1: Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University .

Yan ChenNorthwestern Lab for Internet

and Security Technology (LIST)

Dept. of Electrical Engineering and Computer Science

Northwestern University

http://list.cs.northwestern.edu

Network-based Botnet Detection Filtering,

Containment, and Destruction

Motorola Liaisons

Z. Judy Fu and Philip R. Roberts

Motorola Labs

Page 2: Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University .

New Internet Attack Paradigm

• Botnets have become the major attack force• Symantec identified an average of about 10,000

bot infected computers per day• # of Botnets - increasing• Bots per Botnet - decreasing

– Used to be 80k-140k, now 1000s

• More firepower:– Broadband (1Mbps Up) x 100s = OC3

• More stealthy– Polymorphic, metamorphic, etc.

• Residential users, e.g., cable modem users, are particularly susceptible due to poor maintenance

Page 3: Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University .

Birth of a Bot

• Bots are born from program binaries that infect your PC

• Various vulnerabilities can be used– E-mail viruses– Shellcode (scripts)

Page 4: Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University .

Botnet Distribution

Page 5: Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University .

Project Goal• Understand the trend of vulnerabilities and

exploits used by the botnets in the wild

• Design vulnerability based botnet detection and filtering system – Deployed at routers/base stations w/o patching the

end users– Complementary to the existing intrusion

detection/prevention systems– Can also contain the botnets from infecting inside

machines

• Find the command & control (C&C) of botnets and destroy it

Page 6: Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University .

Limitations of Exploit Based Signature

1010101

10111101

11111100

00010111

Our network

Traffic Filtering

Internet

Signature: 10.*01

XX

Polymorphic worm might not have exact exploit based signature

Polymorphism!

Page 7: Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University .

Vulnerability Signature

Work for polymorphic wormsWork for all the worms which target thesame vulnerability

Vulnerability signature traffic filtering

Internet

XX Our network

Vulnerability

XX

Page 8: Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University .

Emerging Botnet Vulnerability and Exploit

Analysis• Large operational honeynet dataset• Massive dataset on the botnet scan with payload• Preliminary analysis show that the number of new

exploits outpace the # of new vulnerabilities.

LBL NU

Sensor 5 /24 10 /24

Traces 883GB 287GB

Duration 37 months 7 months

Page 9: Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University .

Vulnerability based Botnet Filtering/Containment

• Vulnerability Signature IDS/IPS framework• Detect and filter incoming botnet• Contain inside bots and quarantine infected

customer machines

Packet Sniffing

TCP Reassembly

Protocol Identification: port# or payload

Protocol Parsing

Vulnerability Signature Matching

Single Matcher MatchingCombine multiple matchers

Page 10: Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University .

Introduction 1-10

Residential Access: Cable Modems

Diagram: http://www.cabledatacomnews.com/cmic/diagram.html

Page 11: Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University .

Snort Rule Data Mining

Netbios HTTP Oracle SUNRPC Remaining Total

Rule% 55.3% 25.8%

5.3% 2.3% 11.3% 100%

PSS% 99.9% 56.0%

96.6% 100% 84.7% 86.7%

Reduction

Ratio

67.6 1.2 1.6 2.6 1.7 4.5

• Exploit Signature to Vulnerability Signature reduction ratio

PSS means: Protocol Semantic Signature

NetBios rules include the rules from WINRPC, SMB and NetBIOS protocols

Page 12: Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University .

Preliminary Results

HTTP WINRPC

Trace size 558MB 468MB

#flows 580K 743K

#PSS Signatures 791 45

#Snort Rule Covered 974 2000+

Parsing Speed 2.893Gbps 15.186Gbps

Parsing + Matching speed 1.033Gbps 13.897Gbps

• Experiment Setting– PC XEON 3.8GHz with 4GB memory– Real traffic after TCP reassembly preload to

memory

• Experiment Results


Recommended