SlideShare a Scribd company logo
1 of 47
Download to read offline
Botnets and Applications
Nick Feamster
CS 7260
March 6, 2006
Administrivia
• Quizzes are all graded, will go back Wednesday
• Interim reports and presentations: 3 weeks
– Turn in a writeup that includes:
• Draft of related work section
• Current status
• Any results so far
– 10-minute presentation that includes the same
2
Today’s Lecture: Botnets
• DDoS Wrapup
• What is a botnet?
• How is a botnet controlled?
• Utilities: Rootkits
• Propagation
– Dagon et al., Modeling Botnet Propagation using Timezones
• What can be done with a botnet?
– Spam
– Phishing
– Click fraud
– Identity theft
– DDoS
• Detection, Tracking, and Mitigation
– Honeynets
3
Code Red: Host Infection Rate
Measured using backscatter technique
Exponential infection rate
4
Designing Fast-Spreading Worms
• Hit-list scanning
– Time to infect first 10k hosts dominates infection time
– Solution: Reconnaissance (stealthy scans, etc.)
• Permutation scanning
– Observation: Most scanning is redundant
– Idea: Shared permutation of address space. Start scanning from
own IP address. Re-randomize when another infected machine
is found.
• Internet-scale hit lists
– Flash worm: complete infection within 30 seconds
5
Recent Advances: Slammer
• February 2003
• Exploited vulnerability in MS SQL server
• Exploit fit into a single UDP packet
– Send and forget!
• Lots of damage
– BofA, Wash. Mutual ATMs unavailable
– Continental Airlines ticketing offline
– Seattle E911 offline
6
Scary recent advances: Witty
• March 19, 2004
• Single UDP packet exploits flaw in the passive
analysis of Internet Security Systems products.
• “Bandwidth-limited” UDP worm ala’ Slammer.
• Initial spread seeded via a hit-list.
• All 12,000 vulnerable hosts infected within 45 mins
• Payload: slowly corrupt random disk blocks
7
Why Denial-of-Service “Works”
• Asymmetry: generating a request is cheaper than
formulating a response
• One attack machine can generate a lot of requests, and
effectively multiply its power
• Not always possible to achieve this asymmetry
8
Why does Distributed DoS work?
• Simplicity
• “On by default” design
• Readily available zombie machines
• Attacks look like normal traffic
• Internet’s federated operation obstructs
cooperation for diagnosis/mitigation
9
Research: DoS-Resistant Architectures
• Identity: better notion of who is sending traffic
• Resource allocation: controlling and limited access to
network resources
• Detection: tracking and mitigating malicious flows and
“unwanted packets”
• Accountability: assigning responsibility for bad packets
or packet streams
• Epidemiology: tracking machine infections
10
Botnets
• Bots: Autonomous programs performing tasks
• Plenty of “benign” bots
– e.g., weatherbug
• Botnets: group of bots
– Typically carries malicious connotation
– Large numbers of infected machines
– Machines “enlisted” with infection vectors like worms
(last lecture)
• Available for simultaneous control by a master
• Size: up to 350,000 nodes (from today’s paper)
11
“Rallying” the Botnet
• Easy to combine worm, backdoor functionality
• Problem: how to learn about successfully
infected machines?
• Options
– Email
– Hard-coded email address
12
Botnet Control
Dynamic
DNS
Infected
Machine
Botnet
Controller
(IRC server)
• Botnet master typically runs some IRC server on a well-
known port (e.g., 6667)
• Infected machine contacts botnet with pre-programmed
DNS name (e.g., big-bot.de)
• Dynamic DNS: allows controller to move about freely
13
Botnet History: How we got here
• Early 1990s: IRC bots
– eggdrop: automated management of IRC channels
• 1999-2000: DDoS tools
– Trinoo, TFN2k, Stacheldraht
• 1998-2000: Trojans
– BackOrifice, BackOrifice2k, SubSeven
• 2001- : Worms
– Code Red, Blaster, Sasser
Fast spreading capabilities
pose big threat
Put these pieces together and add a controller… 14
Putting it together
1. Miscreant (botherd) launches
worm, virus, or other
mechanism to infect Windows
machine.
2. Infected machines contact
botnet controller via IRC.
3. Spammer (sponsor) pays
miscreant for use of botnet.
4. Spammer uses botnet to send
spam emails.
15
Top sources of botnet controllers
ASN AS Name Unique C&Cs
6517 YIPESCOM - Yipes Communication 60
21840 SAGONET-TPA - Sago Networks 90
25761 STAMINUS-COMM - Staminus Commu 86
4766 KIXS-AS-KR Korea Telecom 43
13680 AS13680 Hostway Corporation Ta 22
21698 NEBRIX-CA - Nebrix Communicati 24
13301 UNITEDCOLO-AS Autonomous Syste 27
21788 NOC - Network Operations Cente 29
29415 EUROWAN-ASN OVANET - EuroWan d 16
13749 EVERYONES-INTERNET - Everyones 24
30083 SERVER4YOU - Server4You Inc. 21
25700 SWIFTDESK - SWIFTDESK VENTURE 13
23522 CIT-FOONET - CREATIVE INTERNET 14
27595 ATRIVO-AS - Atrivo 31
13237 LAMBDANET-AS European Backbone 11
As of June 7, 2005, data from Prof. Randall Vaughnposted to NANOG. 16
Tools: Rootkits
• Software to set up and maintain an environment
on a compromised machine
– Binary: Replace system files with trojan counterpart
– Kernel: Uses kernel components
– Library: Uses system library trojans
• Key idea: conceal presence
17
Binary Rootkits: Defeat Auditing
• Auditing commands would show nefarious activity
– last: what accounts intruders were using, where they
were coming from, and when they were in your system.
– ls: files
– ps: the sniffer, password cracking program, and anything
else being run by the intruders
– netstat: the current network connections and ports on
which listening for incoming connections
– ifconfig: if the ethernet interface was in promiscuous
mode
• Rootkit “trojans” these commands
– Usually precompiled for particular platform
– Script places the binaries over the old one
18
Binary Kits
• Rootkit’s tools deploy in a hidden directory
• Some common locations found
/dev/.hdd
/dev/.lib
/usr/src/.poop
/usr/src/linux/arch/alpha/lib/.lib/.lproc
• Invisible special characters used in dir names to make
the detection and deletion harder
• Tools to adjust timestamps and sizes of trojans to match
the original (touch files)
19
Kernel Rootkits
• First reported in 1997
• Modify system calls
– Applications run in user mode
– Hardware device interaction happens in kernel mode
– Hence the severity
• Example
– If open() call meant “ get to disk and open file from this location”
could be changed to “ get to disk and open file from this location
unless its name is “rootkit” “
• Whole operating system becomes untrustworthy
20
Mitigation: Primitive State-of-the-Art
• Filtering port 6667
• Command and control filtering
– Port numbers
– IP addresses
– Problem: need to locate command and control
21
Library Kits
• Replaces the standard system library
• Interposition: Can be positioned in such a way
that they will be loaded before the system
libraries
% ldd /bin/ls
linux-gate.so.1 => (0x00c3a000)
librt.so.1 => /lib/librt.so.1 (0x0020f000)
libacl.so.1 => /lib/libacl.so.1 (0x001e8000)
libselinux.so.1 => /lib/libselinux.so.1 (0x00ac1000)
libc.so.6 => /lib/libc.so.6 (0x0092b000)
libpthread.so.0 => /lib/libpthread.so.0 (0x008ae000)
/lib/ld-linux.so.2 (0x0090d000)
libattr.so.1 => /lib/libattr.so.1 (0x001e2000)
ls
ld-linuxlibc
Kernel
22
Digression: Other Recent Rootkits
"Most people, I think, don't even know what a
rootkit is, so why should they care about it?"
-Thomas Hesse
• Sony DRM Rootkit
(identified by Mark Russinovich, Oct 31, 2005)
– Stealth installation and concealment
– Removal rendered CD unplayable
– masks files whose filenames start with "$sys$"
• Nov. 10: taken advantage of by virus writers
• Nov. 10: class action lawsuits
• Nov. 16: massive recall of 2+ million CDs
• Nov. 17: DRM uninstaller found to be worse than rootkit
– Uninstaller installs ActiveX component that can be exploited by attacker
sites
23
Botnet Propagation
• Email (social engineering)
• Remote vulnerabilities
• Webpages
• “Seed” botnets
– Faster scanning of unpatched systems
• Worms
24
Botnet Detection and Tracking
• Network Intrusion Detection Systems (e.g., Snort)
– Signature: alert tcp any any -> any any (msg:"Agobot/Phatbot
Infection Successful"; flow:established; content:"221
• Honeynets: gather information
– Run unpatched version of Windows
– Usually infected within 10 minutes
– Capture binary
• determine scanning patterns, etc.
– Capture network traffic
• Locate identity of command and control, other bots, etc.
25
Detection: In-Protocol
• Snooping on IRC Servers
• Email (e.g., CipherTrust ZombieMeter)
– > 170k new zombies per day
– 15% from China
• Managed network sensing and anti-virus detection
– Sinkholes detect scans, infected machines, etc.
• Drawback: Cannot detect botnet structure
26
Using DNS Traffic to Find Controllers
• Different types of queries may reveal info
– Repetitive A queries may indicate bot/controller
– MX queries may indicate spam bot
– PTR queries may indicate a server
• Usually 3 level: hostname.subdomain.TLD
• Names and subdomains that just look rogue
– (e.g., irc.big-bot.de)
27
DNS Monitoring
• Command-and-control hijack
– Advantages: accurate estimation of bot population
– Disadvantages: bot is rendered useless; can’t
monitor activity from command and control
• Complete TCP three-way handshakes
– Can distinguish distinct infections
– Can distinguish infected bots from port scans, etc.
28
Modeling Botnet Propagation
• Heterogeneous mix of vulnerabilities
• Diurnal patterns
Diurnal patterns can
have an effect on the
rate of propagation
Can model spread of
the botnet based on
short-term propagation.
29
Modeling Propagation: Single TZ
Infected
hosts
Online
infected
hosts
Online vulnerable
hosts
Pairwise infection rate:
scanning rate/size of IP space
Removal rate: some
fraction of online
infected machines
• Useful for modeling the spread of “regional worms”
• Question: How common is this?
• Extension to multiple timezones is (reasonably) straightforward
30
Spread across multiple timezones
Online vulnerable
hosts in timezone i
Newly infected
hosts in timezone i
Infection from zone j to i
• Question: What assumption is being made
regarding scanning rates and timezones?
31
Experimental Validation
• How to capture various parameters?
– Derive diurnal shaping function by country
– Monitor scanning activity per hour, per day (24 bins)
– Normalize each day to 1 and curve-fit
• How to estimate N(t) per timezone?
32
Fitting the model to the data
Diurnal shaping function yields more accurate model.
33
Applications of the model
• Forecasting the spread of botnets
• Improved monitoring and response capabilities
– A faster spreading worm may be “stealth” depending
on the time of day that the worm was released
34
New Trend: Social Engineering
• Bots frequently spread through AOL IM
– A bot-infected computer is told to spread through AOL IM
– It contacts all of the logged in buddies and sends them a
link to a malicious web site
– People get a link from a friend, click on it, and say “sure,
open it” when asked
35
Early Botnets: AgoBot (2003)
• Drops a copy of itself as svchost.exe or
syschk.exe
• Propagates via Grokster, Kazaa, etc.
• Also via Windows file shares
36
Botnet Operation
• General
– Assign a new random nickname to the bot
– Cause the bot to display its status
– Cause the bot to display system information
– Cause the bot to quit IRC and terminate itself
– Change the nickname of the bot
– Completely remove the bot from the system
– Display the bot version or ID
– Display the information about the bot
– Make the bot execute a .EXE file
• IRC Commands
– Cause the bot to display network information
– Disconnect the bot from IRC
– Make the bot change IRC modes
– Make the bot change the server Cvars
– Make the bot join an IRC channel
– Make the bot part an IRC channel
– Make the bot quit from IRC
– Make the bot reconnect to IRC
• Redirection
– Redirect a TCP port to another host
– Redirect GRE traffic that results to proxy
PPTP VPN connections
• DDoS Attacks
– Redirect a TCP port to another host
– Redirect GRE traffic that results to proxy
PPTP VPN connections
• Information theft
– Steal CD keys of popular
games
• Program termination
37
PhatBot (2004)
• Direct descendent of AgoBot
• More features
– Harvesting of email addresses via Web and local machine
– Steal AOL logins/passwords
– Sniff network traffic for passwords
• Control vector is peer-to-peer (not IRC)
38
Peer-to-Peer Control
• Good
– distributed C&C
– possible better anonymity
• Bad
– more information about network structure directly
available to good guys IDS,
– overhead,
– typical p2p problems like partitioning, join/leave, etc
39
Botnet Application: Spam
• Example: Bobax
– Approximate size: 100k bots
Proportionally less
spam from bots
40
Most Bot IP addresses do not return
65% of bots only send mail to a
domain once over 18 months
Collaborative spam filtering seems to be helping track bot IP addresses
41
Blacklisting Seems to Work Pretty Well
vs. ~80% on average
~95% of bots listed in
one or more blacklists
• Premium for spamming bots that are not blacklisted
42
Botnet Application: Phishing
“Phishing attacks use both social engineering
and technical subterfuge to steal consumers'
personal identity data and financial account
credentials.” -- Anti-spam working group
• Social-engineering schemes
– Spoofed emails direct users to counterfeit web sites
– Trick recipients into divulging financial, personal data
• Anti-Phishing Working Group Report (Oct. 2005)
– 15,820 phishing e-mail messages 4367 unique phishing sites identified.
– 96 brand names were hijacked.
– Average time a site stayed on-line was 5.5 days.
Question: What does phishing have to do with botnets?
43
Which web sites are being phished?
Source: Anti-phishing working
group report, Dec. 2005
• Financial services by far the most targeted sites
New trend: Keystroke logging…
44
Phishing: Detection and Research
• Idea: Phishing generates sudden uptick of
password re-use at a brand-new IP address
H(pwd)
etrade.com
H(pwd)
Rogue Phisher
Distribution of password harvesting across bots can help.
45
Botnet Application: Click Fraud
• Pay-per-click advertising
– Publishers display links from advertisers
– Advertising networks act as middlemen
• Sometimes the same as publishers (e.g., Google)
• Click fraud: botnets used to click on pay-per-
click ads
• Motivation
– Competition between advertisers
– Revenue generation by bogus content provider
46
Open Research Questions
• Botnet membership detection
– Existing techniques
• Require special privileges
• Disable the botnet operation
– Under various datasets (packet traces, various
numbers of vantage points, etc.)
• Click fraud detection
• Phishing detection
47

More Related Content

What's hot

Enabling Worm and Malware Investigation Using Virtualization
Enabling Worm and Malware Investigation Using VirtualizationEnabling Worm and Malware Investigation Using Virtualization
Enabling Worm and Malware Investigation Using Virtualizationamiable_indian
 
Incident response: Advanced Network Forensics
Incident response: Advanced Network ForensicsIncident response: Advanced Network Forensics
Incident response: Advanced Network ForensicsNapier University
 
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...CODE BLUE
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools iSyaiful Ahdan
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWallwebhostingguy
 
Hackito Ergo Sum 2011: Capture me if you can!
Hackito Ergo Sum 2011: Capture me if you can!Hackito Ergo Sum 2011: Capture me if you can!
Hackito Ergo Sum 2011: Capture me if you can!stricaud
 
Hacking - penetration tools
Hacking - penetration toolsHacking - penetration tools
Hacking - penetration toolsJenishChauhan4
 
A New Framework for Detection
A New Framework for DetectionA New Framework for Detection
A New Framework for DetectionSourcefire VRT
 
Security & ethical hacking
Security & ethical hackingSecurity & ethical hacking
Security & ethical hackingAmanpreet Singh
 
Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationOlehLevytskyi1
 
Cont-Forensic-Analytics-Dipto-14Apr2015-post
Cont-Forensic-Analytics-Dipto-14Apr2015-postCont-Forensic-Analytics-Dipto-14Apr2015-post
Cont-Forensic-Analytics-Dipto-14Apr2015-postDipto Chakravarty
 
Penetration Testing Project Game of Thrones CTF: 1
Penetration Testing Project Game of Thrones CTF: 1Penetration Testing Project Game of Thrones CTF: 1
Penetration Testing Project Game of Thrones CTF: 1Florin D. Tanasache
 
Reverse Engineering the TomTom Runner pt. 1
Reverse Engineering the TomTom Runner pt. 1 Reverse Engineering the TomTom Runner pt. 1
Reverse Engineering the TomTom Runner pt. 1 Luis Grangeia
 

What's hot (19)

Enabling Worm and Malware Investigation Using Virtualization
Enabling Worm and Malware Investigation Using VirtualizationEnabling Worm and Malware Investigation Using Virtualization
Enabling Worm and Malware Investigation Using Virtualization
 
Incident response: Advanced Network Forensics
Incident response: Advanced Network ForensicsIncident response: Advanced Network Forensics
Incident response: Advanced Network Forensics
 
Pentesting ntp-17-02-18
Pentesting ntp-17-02-18Pentesting ntp-17-02-18
Pentesting ntp-17-02-18
 
Intro To Hacking
Intro To HackingIntro To Hacking
Intro To Hacking
 
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools i
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Hackito Ergo Sum 2011: Capture me if you can!
Hackito Ergo Sum 2011: Capture me if you can!Hackito Ergo Sum 2011: Capture me if you can!
Hackito Ergo Sum 2011: Capture me if you can!
 
SIEM
SIEMSIEM
SIEM
 
Hacking - penetration tools
Hacking - penetration toolsHacking - penetration tools
Hacking - penetration tools
 
A New Framework for Detection
A New Framework for DetectionA New Framework for Detection
A New Framework for Detection
 
Snort-IPS-Tutorial
Snort-IPS-TutorialSnort-IPS-Tutorial
Snort-IPS-Tutorial
 
Pyongyang Fortress
Pyongyang FortressPyongyang Fortress
Pyongyang Fortress
 
Security & ethical hacking
Security & ethical hackingSecurity & ethical hacking
Security & ethical hacking
 
Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentation
 
Cont-Forensic-Analytics-Dipto-14Apr2015-post
Cont-Forensic-Analytics-Dipto-14Apr2015-postCont-Forensic-Analytics-Dipto-14Apr2015-post
Cont-Forensic-Analytics-Dipto-14Apr2015-post
 
Network Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using WiresharkNetwork Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using Wireshark
 
Penetration Testing Project Game of Thrones CTF: 1
Penetration Testing Project Game of Thrones CTF: 1Penetration Testing Project Game of Thrones CTF: 1
Penetration Testing Project Game of Thrones CTF: 1
 
Reverse Engineering the TomTom Runner pt. 1
Reverse Engineering the TomTom Runner pt. 1 Reverse Engineering the TomTom Runner pt. 1
Reverse Engineering the TomTom Runner pt. 1
 

Viewers also liked

Net Pc Station
Net Pc StationNet Pc Station
Net Pc StationSaadHabib
 
How to install Windows 7
How to install Windows 7 How to install Windows 7
How to install Windows 7 zhairine143
 
Writing Modular Command-line Apps with App::Cmd
Writing Modular Command-line Apps with App::CmdWriting Modular Command-line Apps with App::Cmd
Writing Modular Command-line Apps with App::CmdRicardo Signes
 
CMD Command prompts
CMD Command promptsCMD Command prompts
CMD Command promptsAhmed Hesham
 
Chapter 1 Introduction to PC Hardware
Chapter 1 Introduction to PC HardwareChapter 1 Introduction to PC Hardware
Chapter 1 Introduction to PC Hardwareaskme
 
Troubleshooting
TroubleshootingTroubleshooting
TroubleshootingJulia .
 
Basic Computer Troubleshooting
Basic Computer TroubleshootingBasic Computer Troubleshooting
Basic Computer TroubleshootingMeredith Martin
 
A z index of the windows cmd command line
A z index of the windows cmd command lineA z index of the windows cmd command line
A z index of the windows cmd command lineproser tech
 

Viewers also liked (10)

Net Pc Station
Net Pc StationNet Pc Station
Net Pc Station
 
Cmd or not to cmd?
Cmd or not to cmd?Cmd or not to cmd?
Cmd or not to cmd?
 
How to install Windows 7
How to install Windows 7 How to install Windows 7
How to install Windows 7
 
CMD Command
CMD CommandCMD Command
CMD Command
 
Writing Modular Command-line Apps with App::Cmd
Writing Modular Command-line Apps with App::CmdWriting Modular Command-line Apps with App::Cmd
Writing Modular Command-line Apps with App::Cmd
 
CMD Command prompts
CMD Command promptsCMD Command prompts
CMD Command prompts
 
Chapter 1 Introduction to PC Hardware
Chapter 1 Introduction to PC HardwareChapter 1 Introduction to PC Hardware
Chapter 1 Introduction to PC Hardware
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
 
Basic Computer Troubleshooting
Basic Computer TroubleshootingBasic Computer Troubleshooting
Basic Computer Troubleshooting
 
A z index of the windows cmd command line
A z index of the windows cmd command lineA z index of the windows cmd command line
A z index of the windows cmd command line
 

Similar to Botnetsand applications

Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques SafiUllah Saikat
 
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)André Fucs de Miranda
 
14_526_topic10.ppt
14_526_topic10.ppt14_526_topic10.ppt
14_526_topic10.pptImXaib
 
virusessssßsssssssssssssssssssssssssssssssss.ppt
virusessssßsssssssssssssssssssssssssssssssss.pptvirusessssßsssssssssssssssssssssssssssssssss.ppt
virusessssßsssssssssssssssssssssssssssssssss.pptNioLemuelLazatinConc
 
Malwares Malwares Malwares Malwares Malwares
Malwares Malwares Malwares Malwares MalwaresMalwares Malwares Malwares Malwares Malwares
Malwares Malwares Malwares Malwares MalwaresNioLemuelLazatinConc
 
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...Eric Vanderburg
 
Avast @ Machine Learning
Avast @ Machine LearningAvast @ Machine Learning
Avast @ Machine LearningAvast
 
unit 2 confinement techniques.pdf
unit 2 confinement techniques.pdfunit 2 confinement techniques.pdf
unit 2 confinement techniques.pdfRohitGautam261127
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptcemporku
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdftehkotak4
 
Defending Against Botnets
Defending Against BotnetsDefending Against Botnets
Defending Against BotnetsJim Lippard
 
Day 2 Dns Cert 4c Malicious Use
Day 2   Dns Cert 4c Malicious UseDay 2   Dns Cert 4c Malicious Use
Day 2 Dns Cert 4c Malicious Usevngundi
 
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm IntelligenceOrder vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm IntelligencePriyanka Aash
 
Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?HackIT Ukraine
 
a framework for fingerprinting ICS honeypots
a framework for fingerprinting ICS honeypotsa framework for fingerprinting ICS honeypots
a framework for fingerprinting ICS honeypotsMohammad Reza Zamiri
 

Similar to Botnetsand applications (20)

Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques
 
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)
 
14_526_topic10.ppt
14_526_topic10.ppt14_526_topic10.ppt
14_526_topic10.ppt
 
14_526_topic10.ppt
14_526_topic10.ppt14_526_topic10.ppt
14_526_topic10.ppt
 
14_526_topic10.ppt
14_526_topic10.ppt14_526_topic10.ppt
14_526_topic10.ppt
 
virusessssßsssssssssssssssssssssssssssssssss.ppt
virusessssßsssssssssssssssssssssssssssssssss.pptvirusessssßsssssssssssssssssssssssssssssssss.ppt
virusessssßsssssssssssssssssssssssssssssssss.ppt
 
Malwares Malwares Malwares Malwares Malwares
Malwares Malwares Malwares Malwares MalwaresMalwares Malwares Malwares Malwares Malwares
Malwares Malwares Malwares Malwares Malwares
 
Fear, Uncertainty and Doubt
Fear, Uncertainty and DoubtFear, Uncertainty and Doubt
Fear, Uncertainty and Doubt
 
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
 
Avast @ Machine Learning
Avast @ Machine LearningAvast @ Machine Learning
Avast @ Machine Learning
 
unit 2 confinement techniques.pdf
unit 2 confinement techniques.pdfunit 2 confinement techniques.pdf
unit 2 confinement techniques.pdf
 
ch11.ppt
ch11.pptch11.ppt
ch11.ppt
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
 
Defending Against Botnets
Defending Against BotnetsDefending Against Botnets
Defending Against Botnets
 
Day 2 Dns Cert 4c Malicious Use
Day 2   Dns Cert 4c Malicious UseDay 2   Dns Cert 4c Malicious Use
Day 2 Dns Cert 4c Malicious Use
 
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm IntelligenceOrder vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
 
Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?
 
Botnet.pptx
Botnet.pptxBotnet.pptx
Botnet.pptx
 
a framework for fingerprinting ICS honeypots
a framework for fingerprinting ICS honeypotsa framework for fingerprinting ICS honeypots
a framework for fingerprinting ICS honeypots
 

More from UltraUploader

01 le 10 regole dell'hacking
01   le 10 regole dell'hacking01   le 10 regole dell'hacking
01 le 10 regole dell'hackingUltraUploader
 
00 the big guide sz (by dr.to-d)
00   the big guide sz (by dr.to-d)00   the big guide sz (by dr.to-d)
00 the big guide sz (by dr.to-d)UltraUploader
 
[E book ita] php manual
[E book   ita] php manual[E book   ita] php manual
[E book ita] php manualUltraUploader
 
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...UltraUploader
 
[Ebook ita - database] access 2000 manuale
[Ebook   ita - database] access 2000 manuale[Ebook   ita - database] access 2000 manuale
[Ebook ita - database] access 2000 manualeUltraUploader
 
(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)UltraUploader
 
(Ebook ita - inform - access) guida al database access (doc)
(Ebook   ita - inform - access) guida al database access (doc)(Ebook   ita - inform - access) guida al database access (doc)
(Ebook ita - inform - access) guida al database access (doc)UltraUploader
 
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
(Ebook   computer - ita - pdf) fondamenti di informatica - teoria(Ebook   computer - ita - pdf) fondamenti di informatica - teoria
(Ebook computer - ita - pdf) fondamenti di informatica - teoriaUltraUploader
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorUltraUploader
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worriesUltraUploader
 
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...UltraUploader
 
Bird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyBird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyUltraUploader
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesUltraUploader
 
Biological versus computer viruses
Biological versus computer virusesBiological versus computer viruses
Biological versus computer virusesUltraUploader
 
Biological aspects of computer virology
Biological aspects of computer virologyBiological aspects of computer virology
Biological aspects of computer virologyUltraUploader
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksUltraUploader
 
Binary obfuscation using signals
Binary obfuscation using signalsBinary obfuscation using signals
Binary obfuscation using signalsUltraUploader
 

More from UltraUploader (20)

1 (1)
1 (1)1 (1)
1 (1)
 
01 intro
01 intro01 intro
01 intro
 
01 le 10 regole dell'hacking
01   le 10 regole dell'hacking01   le 10 regole dell'hacking
01 le 10 regole dell'hacking
 
00 the big guide sz (by dr.to-d)
00   the big guide sz (by dr.to-d)00   the big guide sz (by dr.to-d)
00 the big guide sz (by dr.to-d)
 
[E book ita] php manual
[E book   ita] php manual[E book   ita] php manual
[E book ita] php manual
 
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
 
[Ebook ita - database] access 2000 manuale
[Ebook   ita - database] access 2000 manuale[Ebook   ita - database] access 2000 manuale
[Ebook ita - database] access 2000 manuale
 
(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)
 
(Ebook ita - inform - access) guida al database access (doc)
(Ebook   ita - inform - access) guida al database access (doc)(Ebook   ita - inform - access) guida al database access (doc)
(Ebook ita - inform - access) guida al database access (doc)
 
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
(Ebook   computer - ita - pdf) fondamenti di informatica - teoria(Ebook   computer - ita - pdf) fondamenti di informatica - teoria
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
 
Blast off!
Blast off!Blast off!
Blast off!
 
Bird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyBird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassembly
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
 
Biological versus computer viruses
Biological versus computer virusesBiological versus computer viruses
Biological versus computer viruses
 
Biological aspects of computer virology
Biological aspects of computer virologyBiological aspects of computer virology
Biological aspects of computer virology
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networks
 
Binary obfuscation using signals
Binary obfuscation using signalsBinary obfuscation using signals
Binary obfuscation using signals
 

Botnetsand applications

  • 1. Botnets and Applications Nick Feamster CS 7260 March 6, 2006
  • 2. Administrivia • Quizzes are all graded, will go back Wednesday • Interim reports and presentations: 3 weeks – Turn in a writeup that includes: • Draft of related work section • Current status • Any results so far – 10-minute presentation that includes the same 2
  • 3. Today’s Lecture: Botnets • DDoS Wrapup • What is a botnet? • How is a botnet controlled? • Utilities: Rootkits • Propagation – Dagon et al., Modeling Botnet Propagation using Timezones • What can be done with a botnet? – Spam – Phishing – Click fraud – Identity theft – DDoS • Detection, Tracking, and Mitigation – Honeynets 3
  • 4. Code Red: Host Infection Rate Measured using backscatter technique Exponential infection rate 4
  • 5. Designing Fast-Spreading Worms • Hit-list scanning – Time to infect first 10k hosts dominates infection time – Solution: Reconnaissance (stealthy scans, etc.) • Permutation scanning – Observation: Most scanning is redundant – Idea: Shared permutation of address space. Start scanning from own IP address. Re-randomize when another infected machine is found. • Internet-scale hit lists – Flash worm: complete infection within 30 seconds 5
  • 6. Recent Advances: Slammer • February 2003 • Exploited vulnerability in MS SQL server • Exploit fit into a single UDP packet – Send and forget! • Lots of damage – BofA, Wash. Mutual ATMs unavailable – Continental Airlines ticketing offline – Seattle E911 offline 6
  • 7. Scary recent advances: Witty • March 19, 2004 • Single UDP packet exploits flaw in the passive analysis of Internet Security Systems products. • “Bandwidth-limited” UDP worm ala’ Slammer. • Initial spread seeded via a hit-list. • All 12,000 vulnerable hosts infected within 45 mins • Payload: slowly corrupt random disk blocks 7
  • 8. Why Denial-of-Service “Works” • Asymmetry: generating a request is cheaper than formulating a response • One attack machine can generate a lot of requests, and effectively multiply its power • Not always possible to achieve this asymmetry 8
  • 9. Why does Distributed DoS work? • Simplicity • “On by default” design • Readily available zombie machines • Attacks look like normal traffic • Internet’s federated operation obstructs cooperation for diagnosis/mitigation 9
  • 10. Research: DoS-Resistant Architectures • Identity: better notion of who is sending traffic • Resource allocation: controlling and limited access to network resources • Detection: tracking and mitigating malicious flows and “unwanted packets” • Accountability: assigning responsibility for bad packets or packet streams • Epidemiology: tracking machine infections 10
  • 11. Botnets • Bots: Autonomous programs performing tasks • Plenty of “benign” bots – e.g., weatherbug • Botnets: group of bots – Typically carries malicious connotation – Large numbers of infected machines – Machines “enlisted” with infection vectors like worms (last lecture) • Available for simultaneous control by a master • Size: up to 350,000 nodes (from today’s paper) 11
  • 12. “Rallying” the Botnet • Easy to combine worm, backdoor functionality • Problem: how to learn about successfully infected machines? • Options – Email – Hard-coded email address 12
  • 13. Botnet Control Dynamic DNS Infected Machine Botnet Controller (IRC server) • Botnet master typically runs some IRC server on a well- known port (e.g., 6667) • Infected machine contacts botnet with pre-programmed DNS name (e.g., big-bot.de) • Dynamic DNS: allows controller to move about freely 13
  • 14. Botnet History: How we got here • Early 1990s: IRC bots – eggdrop: automated management of IRC channels • 1999-2000: DDoS tools – Trinoo, TFN2k, Stacheldraht • 1998-2000: Trojans – BackOrifice, BackOrifice2k, SubSeven • 2001- : Worms – Code Red, Blaster, Sasser Fast spreading capabilities pose big threat Put these pieces together and add a controller… 14
  • 15. Putting it together 1. Miscreant (botherd) launches worm, virus, or other mechanism to infect Windows machine. 2. Infected machines contact botnet controller via IRC. 3. Spammer (sponsor) pays miscreant for use of botnet. 4. Spammer uses botnet to send spam emails. 15
  • 16. Top sources of botnet controllers ASN AS Name Unique C&Cs 6517 YIPESCOM - Yipes Communication 60 21840 SAGONET-TPA - Sago Networks 90 25761 STAMINUS-COMM - Staminus Commu 86 4766 KIXS-AS-KR Korea Telecom 43 13680 AS13680 Hostway Corporation Ta 22 21698 NEBRIX-CA - Nebrix Communicati 24 13301 UNITEDCOLO-AS Autonomous Syste 27 21788 NOC - Network Operations Cente 29 29415 EUROWAN-ASN OVANET - EuroWan d 16 13749 EVERYONES-INTERNET - Everyones 24 30083 SERVER4YOU - Server4You Inc. 21 25700 SWIFTDESK - SWIFTDESK VENTURE 13 23522 CIT-FOONET - CREATIVE INTERNET 14 27595 ATRIVO-AS - Atrivo 31 13237 LAMBDANET-AS European Backbone 11 As of June 7, 2005, data from Prof. Randall Vaughnposted to NANOG. 16
  • 17. Tools: Rootkits • Software to set up and maintain an environment on a compromised machine – Binary: Replace system files with trojan counterpart – Kernel: Uses kernel components – Library: Uses system library trojans • Key idea: conceal presence 17
  • 18. Binary Rootkits: Defeat Auditing • Auditing commands would show nefarious activity – last: what accounts intruders were using, where they were coming from, and when they were in your system. – ls: files – ps: the sniffer, password cracking program, and anything else being run by the intruders – netstat: the current network connections and ports on which listening for incoming connections – ifconfig: if the ethernet interface was in promiscuous mode • Rootkit “trojans” these commands – Usually precompiled for particular platform – Script places the binaries over the old one 18
  • 19. Binary Kits • Rootkit’s tools deploy in a hidden directory • Some common locations found /dev/.hdd /dev/.lib /usr/src/.poop /usr/src/linux/arch/alpha/lib/.lib/.lproc • Invisible special characters used in dir names to make the detection and deletion harder • Tools to adjust timestamps and sizes of trojans to match the original (touch files) 19
  • 20. Kernel Rootkits • First reported in 1997 • Modify system calls – Applications run in user mode – Hardware device interaction happens in kernel mode – Hence the severity • Example – If open() call meant “ get to disk and open file from this location” could be changed to “ get to disk and open file from this location unless its name is “rootkit” “ • Whole operating system becomes untrustworthy 20
  • 21. Mitigation: Primitive State-of-the-Art • Filtering port 6667 • Command and control filtering – Port numbers – IP addresses – Problem: need to locate command and control 21
  • 22. Library Kits • Replaces the standard system library • Interposition: Can be positioned in such a way that they will be loaded before the system libraries % ldd /bin/ls linux-gate.so.1 => (0x00c3a000) librt.so.1 => /lib/librt.so.1 (0x0020f000) libacl.so.1 => /lib/libacl.so.1 (0x001e8000) libselinux.so.1 => /lib/libselinux.so.1 (0x00ac1000) libc.so.6 => /lib/libc.so.6 (0x0092b000) libpthread.so.0 => /lib/libpthread.so.0 (0x008ae000) /lib/ld-linux.so.2 (0x0090d000) libattr.so.1 => /lib/libattr.so.1 (0x001e2000) ls ld-linuxlibc Kernel 22
  • 23. Digression: Other Recent Rootkits "Most people, I think, don't even know what a rootkit is, so why should they care about it?" -Thomas Hesse • Sony DRM Rootkit (identified by Mark Russinovich, Oct 31, 2005) – Stealth installation and concealment – Removal rendered CD unplayable – masks files whose filenames start with "$sys$" • Nov. 10: taken advantage of by virus writers • Nov. 10: class action lawsuits • Nov. 16: massive recall of 2+ million CDs • Nov. 17: DRM uninstaller found to be worse than rootkit – Uninstaller installs ActiveX component that can be exploited by attacker sites 23
  • 24. Botnet Propagation • Email (social engineering) • Remote vulnerabilities • Webpages • “Seed” botnets – Faster scanning of unpatched systems • Worms 24
  • 25. Botnet Detection and Tracking • Network Intrusion Detection Systems (e.g., Snort) – Signature: alert tcp any any -> any any (msg:"Agobot/Phatbot Infection Successful"; flow:established; content:"221 • Honeynets: gather information – Run unpatched version of Windows – Usually infected within 10 minutes – Capture binary • determine scanning patterns, etc. – Capture network traffic • Locate identity of command and control, other bots, etc. 25
  • 26. Detection: In-Protocol • Snooping on IRC Servers • Email (e.g., CipherTrust ZombieMeter) – > 170k new zombies per day – 15% from China • Managed network sensing and anti-virus detection – Sinkholes detect scans, infected machines, etc. • Drawback: Cannot detect botnet structure 26
  • 27. Using DNS Traffic to Find Controllers • Different types of queries may reveal info – Repetitive A queries may indicate bot/controller – MX queries may indicate spam bot – PTR queries may indicate a server • Usually 3 level: hostname.subdomain.TLD • Names and subdomains that just look rogue – (e.g., irc.big-bot.de) 27
  • 28. DNS Monitoring • Command-and-control hijack – Advantages: accurate estimation of bot population – Disadvantages: bot is rendered useless; can’t monitor activity from command and control • Complete TCP three-way handshakes – Can distinguish distinct infections – Can distinguish infected bots from port scans, etc. 28
  • 29. Modeling Botnet Propagation • Heterogeneous mix of vulnerabilities • Diurnal patterns Diurnal patterns can have an effect on the rate of propagation Can model spread of the botnet based on short-term propagation. 29
  • 30. Modeling Propagation: Single TZ Infected hosts Online infected hosts Online vulnerable hosts Pairwise infection rate: scanning rate/size of IP space Removal rate: some fraction of online infected machines • Useful for modeling the spread of “regional worms” • Question: How common is this? • Extension to multiple timezones is (reasonably) straightforward 30
  • 31. Spread across multiple timezones Online vulnerable hosts in timezone i Newly infected hosts in timezone i Infection from zone j to i • Question: What assumption is being made regarding scanning rates and timezones? 31
  • 32. Experimental Validation • How to capture various parameters? – Derive diurnal shaping function by country – Monitor scanning activity per hour, per day (24 bins) – Normalize each day to 1 and curve-fit • How to estimate N(t) per timezone? 32
  • 33. Fitting the model to the data Diurnal shaping function yields more accurate model. 33
  • 34. Applications of the model • Forecasting the spread of botnets • Improved monitoring and response capabilities – A faster spreading worm may be “stealth” depending on the time of day that the worm was released 34
  • 35. New Trend: Social Engineering • Bots frequently spread through AOL IM – A bot-infected computer is told to spread through AOL IM – It contacts all of the logged in buddies and sends them a link to a malicious web site – People get a link from a friend, click on it, and say “sure, open it” when asked 35
  • 36. Early Botnets: AgoBot (2003) • Drops a copy of itself as svchost.exe or syschk.exe • Propagates via Grokster, Kazaa, etc. • Also via Windows file shares 36
  • 37. Botnet Operation • General – Assign a new random nickname to the bot – Cause the bot to display its status – Cause the bot to display system information – Cause the bot to quit IRC and terminate itself – Change the nickname of the bot – Completely remove the bot from the system – Display the bot version or ID – Display the information about the bot – Make the bot execute a .EXE file • IRC Commands – Cause the bot to display network information – Disconnect the bot from IRC – Make the bot change IRC modes – Make the bot change the server Cvars – Make the bot join an IRC channel – Make the bot part an IRC channel – Make the bot quit from IRC – Make the bot reconnect to IRC • Redirection – Redirect a TCP port to another host – Redirect GRE traffic that results to proxy PPTP VPN connections • DDoS Attacks – Redirect a TCP port to another host – Redirect GRE traffic that results to proxy PPTP VPN connections • Information theft – Steal CD keys of popular games • Program termination 37
  • 38. PhatBot (2004) • Direct descendent of AgoBot • More features – Harvesting of email addresses via Web and local machine – Steal AOL logins/passwords – Sniff network traffic for passwords • Control vector is peer-to-peer (not IRC) 38
  • 39. Peer-to-Peer Control • Good – distributed C&C – possible better anonymity • Bad – more information about network structure directly available to good guys IDS, – overhead, – typical p2p problems like partitioning, join/leave, etc 39
  • 40. Botnet Application: Spam • Example: Bobax – Approximate size: 100k bots Proportionally less spam from bots 40
  • 41. Most Bot IP addresses do not return 65% of bots only send mail to a domain once over 18 months Collaborative spam filtering seems to be helping track bot IP addresses 41
  • 42. Blacklisting Seems to Work Pretty Well vs. ~80% on average ~95% of bots listed in one or more blacklists • Premium for spamming bots that are not blacklisted 42
  • 43. Botnet Application: Phishing “Phishing attacks use both social engineering and technical subterfuge to steal consumers' personal identity data and financial account credentials.” -- Anti-spam working group • Social-engineering schemes – Spoofed emails direct users to counterfeit web sites – Trick recipients into divulging financial, personal data • Anti-Phishing Working Group Report (Oct. 2005) – 15,820 phishing e-mail messages 4367 unique phishing sites identified. – 96 brand names were hijacked. – Average time a site stayed on-line was 5.5 days. Question: What does phishing have to do with botnets? 43
  • 44. Which web sites are being phished? Source: Anti-phishing working group report, Dec. 2005 • Financial services by far the most targeted sites New trend: Keystroke logging… 44
  • 45. Phishing: Detection and Research • Idea: Phishing generates sudden uptick of password re-use at a brand-new IP address H(pwd) etrade.com H(pwd) Rogue Phisher Distribution of password harvesting across bots can help. 45
  • 46. Botnet Application: Click Fraud • Pay-per-click advertising – Publishers display links from advertisers – Advertising networks act as middlemen • Sometimes the same as publishers (e.g., Google) • Click fraud: botnets used to click on pay-per- click ads • Motivation – Competition between advertisers – Revenue generation by bogus content provider 46
  • 47. Open Research Questions • Botnet membership detection – Existing techniques • Require special privileges • Disable the botnet operation – Under various datasets (packet traces, various numbers of vantage points, etc.) • Click fraud detection • Phishing detection 47