SlideShare a Scribd company logo
1 of 18
Download to read offline
Botnets - Detection and Mitigation

       Literature study presentation

                       By
       Ajit Skanda Kumarawamy (1735764)
             Faculty of Exact Sciences
                  VU Amsterdam

               Under the guidance of
               Dr.Corina Stratan
           Faculty of Exact Sciences
                VU Amsterdam
Topics

   Introduction
Study of botnet detection and mitigation
techniques
   Storm worm
   BotHunter
   BotSniffer
   RBSeeker
   Torpig Botnet Takeover
   Conclusion
Botnets – an introduction

   What is a bot?
   A computer that is running piece of malware
   Without knowledge of host/owner through external instructions
   Can be self-propogating


   What is a botnet?
   A co-ordinated group of bots under the control of a botmaster
   Act in a similar or co-related manner
   Used for fraudulant and abusive activities
Types of Botnets

   IRC based



   HTTP based



   P2P based
Attacks of botnets

   DDOS attacks

   Spamming

   Key logging and data/identity thefts

   Phishing and pharming

   Click fraud

   Distribution of other adware/spyware.
C&C and its role

   Command and Control – nerve centre of botnets

   Publish/push commands

   (Re)Organize botnets into subnets

   Methods of communication

Key component of botnet mitigation is to identify
C&C communication protocol
Methods for identifying botnets

   Signature based detection
Compare incoming and outgoing packets of data to a set of known
signatures of bot binaries


   Anomaly based detection
An analytical method for identifying and studying botnets rather
than a preventative process
Analyse the network traffic for any irregular behavior like TCP Syn
scanning
Steps for mitigation of botnets


The three generic steps for mitigation of botnets:

   Acquiring and analyzing a bot.
   Infiltrate the botnet.

Identify and takedown the C&C server/
botmaster.
Storm worm – a case study

Most virulent P2P bot out there in the wild
(Peacomm,Nuwar or Zhelatin)

   Uses the OVERNET and an own P2P network

Propogates using e-mails (attachment or
embedded link)

   Uses specific keys as rendezvous point/ mailbox

   Controller publishes commands at keys
Storm worm – analysis and
mitigation

Obtain bot binary using a spam trap and a client
honeypot

   Compute keys - two methods

   Use a Sybil attack to infiltrate the Stormnet

   Mitigate using Eclipsing content and polluting
BotHunter – Infection lifecycle
model
BotHunter - Architecture
BotSniffer – Spatial temporal
correlation and similarity
BotSniffer - Architecture
RBSeeker

   Used for detecting Redirection bots
   Spam source sub-system
   Netflow analysis sub-system
   Active DNS anomaly detection sub-system
   Correlation of aggregated data
Takeover of the Torpig Botnet

   Data harvesting bot - financial data
   Fast flux vs Domain flux
   Deterministic DGA and weak C&C
    communication procedure
   Sinkholing .net and .com domains
   25/01/2009 – 04/02/2009
   8310 accounts with range of $83K - $8.3M
Conclusions

   Botnets provide services to interested parties
Botnet detection techniques should go hand in
hand
Co-operation between authorities, registrars,
ISPs
Lower layers of Botnet infrastructure should be
dismantled
Thank you

More Related Content

Viewers also liked

The Godfather - P2P Botnets: Security & Communication
The Godfather -  P2P Botnets: Security & CommunicationThe Godfather -  P2P Botnets: Security & Communication
The Godfather - P2P Botnets: Security & CommunicationArturBalanuta
 
The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...
The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...
The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...Gianluca Stringhini
 
شناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNS
شناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNSشناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNS
شناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNSMahdi Sayyad
 
Cryptovirology Introduction, SecurityThreats, Safeguards and Countermeasures
Cryptovirology Introduction, SecurityThreats, Safeguards and CountermeasuresCryptovirology Introduction, SecurityThreats, Safeguards and Countermeasures
Cryptovirology Introduction, SecurityThreats, Safeguards and CountermeasuresM Mehdi Ahmadian
 
Barcamp2015 cyberguerre et-botnet
Barcamp2015 cyberguerre et-botnetBarcamp2015 cyberguerre et-botnet
Barcamp2015 cyberguerre et-botnetBarcampCameroon
 
آشنایی با جرم‌یابی قانونی رایانه‌ای
آشنایی با جرم‌یابی قانونی رایانه‌ایآشنایی با جرم‌یابی قانونی رایانه‌ای
آشنایی با جرم‌یابی قانونی رایانه‌ایRamin Najjarbashi
 
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1  Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1 securityxploded
 

Viewers also liked (9)

2 dc meet new
2 dc meet new2 dc meet new
2 dc meet new
 
The Godfather - P2P Botnets: Security & Communication
The Godfather -  P2P Botnets: Security & CommunicationThe Godfather -  P2P Botnets: Security & Communication
The Godfather - P2P Botnets: Security & Communication
 
The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...
The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...
The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...
 
شناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNS
شناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNSشناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNS
شناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNS
 
Cryptovirology Introduction, SecurityThreats, Safeguards and Countermeasures
Cryptovirology Introduction, SecurityThreats, Safeguards and CountermeasuresCryptovirology Introduction, SecurityThreats, Safeguards and Countermeasures
Cryptovirology Introduction, SecurityThreats, Safeguards and Countermeasures
 
Barcamp2015 cyberguerre et-botnet
Barcamp2015 cyberguerre et-botnetBarcamp2015 cyberguerre et-botnet
Barcamp2015 cyberguerre et-botnet
 
آشنایی با جرم‌یابی قانونی رایانه‌ای
آشنایی با جرم‌یابی قانونی رایانه‌ایآشنایی با جرم‌یابی قانونی رایانه‌ای
آشنایی با جرم‌یابی قانونی رایانه‌ای
 
Botnet Architecture
Botnet ArchitectureBotnet Architecture
Botnet Architecture
 
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1  Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
 

Similar to Botnets - Detection and Mitigation

Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkEditor IJCATR
 
A review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsA review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsAlexander Decker
 
Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques SafiUllah Saikat
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The BotmasterIJERA Editor
 
A Taxonomy of Botnet Detection Approaches
A Taxonomy of Botnet Detection ApproachesA Taxonomy of Botnet Detection Approaches
A Taxonomy of Botnet Detection ApproachesFabrizio Farinacci
 
Storm Worm & Botnet
Storm Worm & BotnetStorm Worm & Botnet
Storm Worm & BotnetKendiv
 
A Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior AnalysisA Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior Analysisidescitation
 
Synopsis viva presentation
Synopsis viva presentationSynopsis viva presentation
Synopsis viva presentationkirubavenkat
 
Botnet detection by Imitation method
Botnet detection  by Imitation methodBotnet detection  by Imitation method
Botnet detection by Imitation methodAcad
 
A Survey of Botnet Detection Techniques
A Survey of Botnet Detection TechniquesA Survey of Botnet Detection Techniques
A Survey of Botnet Detection Techniquesijsrd.com
 
Detection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P BotnetsDetection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P BotnetsCSCJournals
 
Literature survey on peer to peer botnets
Literature survey on peer to peer botnetsLiterature survey on peer to peer botnets
Literature survey on peer to peer botnetsAcad
 
Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far AlleneMcclendon878
 
Lab3code.c#include stdio.h#include stdlib.h#include.docx
Lab3code.c#include stdio.h#include stdlib.h#include.docxLab3code.c#include stdio.h#include stdlib.h#include.docx
Lab3code.c#include stdio.h#include stdlib.h#include.docxsmile790243
 
Bot net detection by using ssl encryption
Bot net detection by using ssl encryptionBot net detection by using ssl encryption
Bot net detection by using ssl encryptionAcad
 

Similar to Botnets - Detection and Mitigation (20)

Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social Network
 
Botnets
BotnetsBotnets
Botnets
 
A review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsA review botnet detection and suppression in clouds
A review botnet detection and suppression in clouds
 
Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques
 
Botnets
BotnetsBotnets
Botnets
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The Botmaster
 
A Taxonomy of Botnet Detection Approaches
A Taxonomy of Botnet Detection ApproachesA Taxonomy of Botnet Detection Approaches
A Taxonomy of Botnet Detection Approaches
 
introduction to Botnet
introduction to Botnetintroduction to Botnet
introduction to Botnet
 
Storm Worm & Botnet
Storm Worm & BotnetStorm Worm & Botnet
Storm Worm & Botnet
 
A Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior AnalysisA Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior Analysis
 
Synopsis viva presentation
Synopsis viva presentationSynopsis viva presentation
Synopsis viva presentation
 
Botnet detection by Imitation method
Botnet detection  by Imitation methodBotnet detection  by Imitation method
Botnet detection by Imitation method
 
A Survey of Botnet Detection Techniques
A Survey of Botnet Detection TechniquesA Survey of Botnet Detection Techniques
A Survey of Botnet Detection Techniques
 
Botnet
Botnet Botnet
Botnet
 
Detection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P BotnetsDetection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P Botnets
 
Ce hv6 module 63 botnets
Ce hv6 module 63 botnetsCe hv6 module 63 botnets
Ce hv6 module 63 botnets
 
Literature survey on peer to peer botnets
Literature survey on peer to peer botnetsLiterature survey on peer to peer botnets
Literature survey on peer to peer botnets
 
Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far
 
Lab3code.c#include stdio.h#include stdlib.h#include.docx
Lab3code.c#include stdio.h#include stdlib.h#include.docxLab3code.c#include stdio.h#include stdlib.h#include.docx
Lab3code.c#include stdio.h#include stdlib.h#include.docx
 
Bot net detection by using ssl encryption
Bot net detection by using ssl encryptionBot net detection by using ssl encryption
Bot net detection by using ssl encryption
 

Botnets - Detection and Mitigation

  • 1. Botnets - Detection and Mitigation Literature study presentation By Ajit Skanda Kumarawamy (1735764) Faculty of Exact Sciences VU Amsterdam Under the guidance of Dr.Corina Stratan Faculty of Exact Sciences VU Amsterdam
  • 2. Topics  Introduction Study of botnet detection and mitigation techniques  Storm worm  BotHunter  BotSniffer  RBSeeker  Torpig Botnet Takeover  Conclusion
  • 3. Botnets – an introduction  What is a bot?  A computer that is running piece of malware  Without knowledge of host/owner through external instructions  Can be self-propogating  What is a botnet?  A co-ordinated group of bots under the control of a botmaster  Act in a similar or co-related manner  Used for fraudulant and abusive activities
  • 4. Types of Botnets  IRC based  HTTP based  P2P based
  • 5. Attacks of botnets  DDOS attacks  Spamming  Key logging and data/identity thefts  Phishing and pharming  Click fraud  Distribution of other adware/spyware.
  • 6. C&C and its role  Command and Control – nerve centre of botnets  Publish/push commands  (Re)Organize botnets into subnets  Methods of communication Key component of botnet mitigation is to identify C&C communication protocol
  • 7. Methods for identifying botnets  Signature based detection Compare incoming and outgoing packets of data to a set of known signatures of bot binaries  Anomaly based detection An analytical method for identifying and studying botnets rather than a preventative process Analyse the network traffic for any irregular behavior like TCP Syn scanning
  • 8. Steps for mitigation of botnets The three generic steps for mitigation of botnets:  Acquiring and analyzing a bot.  Infiltrate the botnet. Identify and takedown the C&C server/ botmaster.
  • 9. Storm worm – a case study Most virulent P2P bot out there in the wild (Peacomm,Nuwar or Zhelatin)  Uses the OVERNET and an own P2P network Propogates using e-mails (attachment or embedded link)  Uses specific keys as rendezvous point/ mailbox  Controller publishes commands at keys
  • 10. Storm worm – analysis and mitigation Obtain bot binary using a spam trap and a client honeypot  Compute keys - two methods  Use a Sybil attack to infiltrate the Stormnet  Mitigate using Eclipsing content and polluting
  • 11. BotHunter – Infection lifecycle model
  • 13. BotSniffer – Spatial temporal correlation and similarity
  • 15. RBSeeker  Used for detecting Redirection bots  Spam source sub-system  Netflow analysis sub-system  Active DNS anomaly detection sub-system  Correlation of aggregated data
  • 16. Takeover of the Torpig Botnet  Data harvesting bot - financial data  Fast flux vs Domain flux  Deterministic DGA and weak C&C communication procedure  Sinkholing .net and .com domains  25/01/2009 – 04/02/2009  8310 accounts with range of $83K - $8.3M
  • 17. Conclusions  Botnets provide services to interested parties Botnet detection techniques should go hand in hand Co-operation between authorities, registrars, ISPs Lower layers of Botnet infrastructure should be dismantled