botsuerbotsuer: ::: suing ste althy p2p bots in network ... · p2p topologies constitute a growing...

18
Orange Labs Products and Services BotSuer BotSuer BotSuer BotSuer: : : Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis 12th International 12th International 12th International 12th International Conference Conference Conference Conference on on on on Cryptology Cryptology Cryptology Cryptology and Network and Network and Network and Network Security (CANS 2013) Security (CANS 2013) Security (CANS 2013) Security (CANS 2013) Nizar Nizar Nizar Nizar Kheir Kheir Kheir Kheir and Chirine Wolley November 21st, 2013

Upload: others

Post on 26-Sep-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: BotSuerBotSuer: ::: Suing Ste althy P2P Bots in Network ... · P2P topologies constitute a growing trend in botnet C&C communications Rise of viruses and use of botnets to trigger

Orange Labs Products and Services

BotSuerBotSuerBotSuerBotSuer:::: Suing Stealthy P2P Bots in

Network Traffic through Netflow Analysis

12th International 12th International 12th International 12th International ConferenceConferenceConferenceConference on on on on CryptologyCryptologyCryptologyCryptology and Network and Network and Network and Network Security (CANS 2013)Security (CANS 2013)Security (CANS 2013)Security (CANS 2013)

NizarNizarNizarNizar KheirKheirKheirKheir and Chirine Wolley

November 21st, 2013

Page 2: BotSuerBotSuer: ::: Suing Ste althy P2P Bots in Network ... · P2P topologies constitute a growing trend in botnet C&C communications Rise of viruses and use of botnets to trigger

2 France Telecom Group confidential Nizar Kheir

Outline

BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis

� Introduction and Motivations

� System Description

� Experimentations

� Conclusion

Page 3: BotSuerBotSuer: ::: Suing Ste althy P2P Bots in Network ... · P2P topologies constitute a growing trend in botnet C&C communications Rise of viruses and use of botnets to trigger

3 France Telecom Group confidential Nizar Kheir

Botnet threat: Myth or reality

� Do botnets constitute a real threat … Or just a storm in a teacup ?

BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis

Page 4: BotSuerBotSuer: ::: Suing Ste althy P2P Bots in Network ... · P2P topologies constitute a growing trend in botnet C&C communications Rise of viruses and use of botnets to trigger

4 France Telecom Group confidential Nizar Kheir

Understanding the botnet phenomenon

� Modern cybercrime increasingly relies on malicious software

- Self-replication, code obfuscation, executable packing

- Multiple attack vectors: Spam, Denial of Service, data theft and sabotage

� Multiple loopholes to break into an information system

– Phishing attacks, infected websites, social networks

� Control multiple terminals during single infection campaigns

– Nodes connecting to a common Command & Control (C&C) infrastructure

Botnets are networks of infected nodes controled by a single master,

and that abide to a common C&C infrastructure

BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis

Page 5: BotSuerBotSuer: ::: Suing Ste althy P2P Bots in Network ... · P2P topologies constitute a growing trend in botnet C&C communications Rise of viruses and use of botnets to trigger

5 France Telecom Group confidential Nizar Kheir

Observing botnet trends

� P2P topologies constitute a growing trend in botnet C&C

communications

Rise of viruses and use of botnets to trigger

distributed attacks (e.g. spam, ddos, scan)

C&C

bot

bot

botbot

bot

- Ease of administratrion

- High responsiveness

ButButButBut

- Single node of failure

C&C

master master

bot bot botbot

- Ease of administratrion

- High responsiveness

- Obfuscation (e.g. DNS flux)

- Better robustness

ButButButBut

- Week failover strategies

Botnets becoming stealthier Botnets becoming stealthier Botnets becoming stealthier Botnets becoming stealthier

and seeking financial gainand seeking financial gainand seeking financial gainand seeking financial gain

- Robust botnet architecture

- Strong Failover mechanisms

ButButButBut

- Difficult administration

- Low responsiveness

- Management delays

bot

bot

bot

bot

bot

bot

bot bot

bot

master

mastermaster

- Robust botnet architecture

- Strong Failover mechanisms

- Ease of administration

- High responsiveness

- Persistance

IRC botnetIRC botnetIRC botnetIRC botnetHTTP botnetHTTP botnetHTTP botnetHTTP botnet

P2P botnetP2P botnetP2P botnetP2P botnet

HTTP2P HTTP2P HTTP2P HTTP2P

botnet !!botnet !!botnet !!botnet !!

BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis

Page 6: BotSuerBotSuer: ::: Suing Ste althy P2P Bots in Network ... · P2P topologies constitute a growing trend in botnet C&C communications Rise of viruses and use of botnets to trigger

6 France Telecom Group confidential Nizar Kheir

Malware detection – AntiVirus limitations

� Malware uses binary polymorphism to evade anti-virus detection

� Inadequacy with new technologies such as Cloud infrastructures

� Multiple OS environments (e.g. Android, Microsoft, IOS)

BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis

Page 7: BotSuerBotSuer: ::: Suing Ste althy P2P Bots in Network ... · P2P topologies constitute a growing trend in botnet C&C communications Rise of viruses and use of botnets to trigger

7 France Telecom Group confidential Nizar Kheir

Botnet detection challenge – Network activity

� Network communications are the cornerstone for botnet operation

– Extract updates and commands from the C&C infrastructure

– Exfiltrate private data to external drop zones

– Trigger attacks such as spam, Denial of Service, adclicks, etc.

– Spread infections using zero-day exploits

Malware

source code

Polymorphism

renderer

Polymorphic

malware binaries

Week AV signaturesWeek AV signaturesWeek AV signaturesWeek AV signatures

Sandbox

application

DNSQueryDNSQueryDNSQueryDNSQuery malicious.org

GETGETGETGET /images/log.gif?72cea=325

NickNickNickNick bot25325

Same network activity

Strong network Strong network Strong network Strong network

footprintsfootprintsfootprintsfootprints

The swarm effect provides stronger network footprints that efficiently

characterize a family of malware, as opposed to pattern-based signatures.

BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis

Page 8: BotSuerBotSuer: ::: Suing Ste althy P2P Bots in Network ... · P2P topologies constitute a growing trend in botnet C&C communications Rise of viruses and use of botnets to trigger

8 France Telecom Group confidential Nizar Kheir

P2P botnet detection strategy

BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis

� P2P botnets evade webP2P botnets evade webP2P botnets evade webP2P botnets evade web----based signaturesbased signaturesbased signaturesbased signatures

– Replace signatures with behavioral network models

� GoalsGoalsGoalsGoals

– ExtractExtractExtractExtract P2P trafficP2P trafficP2P trafficP2P traffic

– Build Build Build Build detection systemdetection systemdetection systemdetection system

– DetectDetectDetectDetect P2P malware P2P malware P2P malware P2P malware

Based on empirical facts & behavioral patterns of P2P applicationsBased on empirical facts & behavioral patterns of P2P applicationsBased on empirical facts & behavioral patterns of P2P applicationsBased on empirical facts & behavioral patterns of P2P applications

Extract P2P network flows and cluster similar P2P applications

Setup a labelled dataset of malicious and benign P2P flow clustersSetup a labelled dataset of malicious and benign P2P flow clustersSetup a labelled dataset of malicious and benign P2P flow clustersSetup a labelled dataset of malicious and benign P2P flow clusters

Machine learning to build an appropriate malware detection system

Inline detection of botnet covert channels using Netflow recordsInline detection of botnet covert channels using Netflow recordsInline detection of botnet covert channels using Netflow recordsInline detection of botnet covert channels using Netflow records

Intelligent metrics that characterize time, space and flow features

� StrategyStrategyStrategyStrategy

– Obtain a ground truth of P2P traffic including malicious and benign applications

– Test and validate the concept using real-world traffic

– Detect P2P botnets that avoid web applications for C&C

Page 9: BotSuerBotSuer: ::: Suing Ste althy P2P Bots in Network ... · P2P topologies constitute a growing trend in botnet C&C communications Rise of viruses and use of botnets to trigger

9 France Telecom Group confidential Nizar Kheir

P2P botnet detection architecture

Network traffic

P2P bot

trafficP2P coarse filter

Dropped traffic

Flow clustering

(Unsupervised)

P2P fine filterNetflow clusters

P2P flow clusters

Supervised learningIntrusion detection

system

P2P Malware

databaseAlertAlertAlertAlert

BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis

Page 10: BotSuerBotSuer: ::: Suing Ste althy P2P Bots in Network ... · P2P topologies constitute a growing trend in botnet C&C communications Rise of viruses and use of botnets to trigger

10 France Telecom Group confidential Nizar Kheir

Behavioral P2P flow filter

� Multiple heuristics to discard flows unlikely to show P2P activity

– Only behavioral P2P characteristics with no pattern signatures

– DNS filter: P2P applications operate outside the DNS system

– Failed Connection filter: Use chunk rates to identify P2P flows

– Two filtering steps, including coarse-grained and fine-grained filtering

– Clustering P2P flows by signaling activity

– Discarding non-P2P flows using geographical distribution and

destination ports statistics

network trafic

P2P flow filter

P2P trafic

BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis

Page 11: BotSuerBotSuer: ::: Suing Ste althy P2P Bots in Network ... · P2P topologies constitute a growing trend in botnet C&C communications Rise of viruses and use of botnets to trigger

11 France Telecom Group confidential Nizar Kheir

P2P botnet detection model

BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis

� Supervised machine learning to build P2P botnet detection model

� Three categories of features to characterize P2P flows:

– Time features describe long term malware P2P signaling activity

– Space features describe chunk rate and distribution of P2P botnets

– Flow-size features describe control operations in P2P botnets

� Testing Multiple supervised learning algorithms (e.g. SVM, J48, C4.5)

– Tell apart benign P2P applications and P2P botnet operation

Page 12: BotSuerBotSuer: ::: Suing Ste althy P2P Bots in Network ... · P2P topologies constitute a growing trend in botnet C&C communications Rise of viruses and use of botnets to trigger

12 France Telecom Group confidential Nizar Kheir

Experimentation – Malware dataset

� Initial dataset of up to 20 thousand distinct malware samples

� Using virusTotal API to identify P2P malware in our initial dataset

� An overall number of 1,317 P2P malware samples to build our

malware classifier, belonging to 8 different malware families

BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis

Page 13: BotSuerBotSuer: ::: Suing Ste althy P2P Bots in Network ... · P2P topologies constitute a growing trend in botnet C&C communications Rise of viruses and use of botnets to trigger

13 France Telecom Group confidential Nizar Kheir

Experimentation – P2P learning set

� Use P2P flow filter to discard non-P2P flows triggered by malware

� Build clusters of P2P flows using our P2P flow clustering module

� We obtained 2,975 P2P flow clusters that we used to build our

supervised P2P botnet detection model

� Benign P2P learning set includes 794 benign P2P flow clusters

– 415 P2P clusters using our P2P filter applied to a corporate network

traffic

– 379 P2P clusters obtained by manually executing P2P applications

(e.g. eMule, Kademlia, bitTorrent, Gnutella)

BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis

Page 14: BotSuerBotSuer: ::: Suing Ste althy P2P Bots in Network ... · P2P topologies constitute a growing trend in botnet C&C communications Rise of viruses and use of botnets to trigger

14 France Telecom Group confidential Nizar Kheir

Experimentation – Detection accuracy

BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis

� Use cross-validation to evaluate our P2P botnet detection model

Contribution of features

towards detection

Page 15: BotSuerBotSuer: ::: Suing Ste althy P2P Bots in Network ... · P2P topologies constitute a growing trend in botnet C&C communications Rise of viruses and use of botnets to trigger

15 France Telecom Group confidential Nizar Kheir

Experimentation – Impact of P2P filter

BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis

� The P2P flow filter has little impact on false positives, but reduces

the detection rate for high filtering thresholds

Detection accuracy vs

P2P filtering threshold

Page 16: BotSuerBotSuer: ::: Suing Ste althy P2P Bots in Network ... · P2P topologies constitute a growing trend in botnet C&C communications Rise of viruses and use of botnets to trigger

16 France Telecom Group confidential Nizar Kheir

Experimentation – Live ISP flows

BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis

� 3 hours of anonymized netflow for 4,347 distinct IP addresses

� 793 P2P flow clusters discovered by the P2P filter, associated with

146 distinct IP addresses

– No False positives and 3.4% False negatives using ground truth data

provided by the ISP

� 11 P2P flow clusters identified by our system as being malicious

botnet communications

– 4 P2P flow clusters associated with the same IP address

– 20% Suspicious destination IPs according to the rbls framework

⇒1 true positive associated with a P2P botnet infection

� 0.8% False positives rate during evaluation on live internet traffic

Page 17: BotSuerBotSuer: ::: Suing Ste althy P2P Bots in Network ... · P2P topologies constitute a growing trend in botnet C&C communications Rise of viruses and use of botnets to trigger

17 France Telecom Group confidential Nizar KheirBotSuer: Suing Stealthy P2P bots in Network Traffic through Netflow Analysis

Conclusion

� Noval and fully behavioral P2P botnet detection system

� Use only network-level features, without deep packet inspection

� Automated back-end for botnet detection systems

� Higher accuracy than traditional AV systems

Page 18: BotSuerBotSuer: ::: Suing Ste althy P2P Bots in Network ... · P2P topologies constitute a growing trend in botnet C&C communications Rise of viruses and use of botnets to trigger

18 France Telecom Group confidential Nizar Kheir

Thank you

BotSuer: Suing Stealthy P2P bots in Network Traffic through Netflow Analysis