trapping botnets by dns failure graphs: validation ...€¦ · trapping botnets by dns failure...

39
Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello, Peter Romirer-Maierhofer Telecommunications Research Center Vienna (FTW) Contact: [email protected]

Upload: others

Post on 24-Sep-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a

3G Network

Arian Bär, Antonio Paciello, Peter Romirer-MaierhoferTelecommunications Research Center Vienna (FTW)

Contact: [email protected]

Page 2: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 2 -© FTW 2012

Recent Botnet attacks

Dec. 2012 – Eurograbber Bot steals € 36 Million– Infects PCs and Smartphones, modified version of Zeus

Mar. 2013 – Attack on Spamhouse– Up to 300Gbps incoming traffic, using DNS reflection

Apr. 2013 – Attack on WordPress– 90k distinct IP adresses, approx. 100k Bots

Very common application: Email Spam

Do we have bots in our network?

Page 3: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 3 -© FTW 2012

Botnet Introduction

Zombie

Zombie

Zombie

Page 4: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 4 -© FTW 2012

Botnet Introduction

BotmasterZombie

Zombie

Zombie

Page 5: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 5 -© FTW 2012

Botnet Introduction

Internet

BotmasterZombie

Zombie

Zombie

Page 6: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 6 -© FTW 2012

Botnet Introduction

Internet

9.9.9.9

Page 7: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 7 -© FTW 2012

Botnet Introduction

Internet

9.9.9.9

Page 8: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 8 -© FTW 2012

Botnet Introduction

Internet

9.9.9.9

Page 9: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 9 -© FTW 2012

Botnet Introduction

Internet

evil-botnet.com

Page 10: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 10 -© FTW 2012

Botnet Introduction

Internet

evil-botnet.com

Page 11: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 11 -© FTW 2012

Botnet Introduction

Internet

hasdaflv.orgfjruswfx.orgeufoewui.orgpqcfedte.org

Page 12: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 12 -© FTW 2012

Botnet Introduction

Internet

pqcfedte.org hasdaflv.orgfjruswfx.orgeufoewui.orgpqcfedte.org

Page 13: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 13 -© FTW 2012

Problem Description and Data

Mobile networks are very attractive for botnets– Always-on mobile devices with high computational capabilities

Mobile network specific threats– Cell/Core overload– Network specific attacks (e.g. malicious calls)– Steal critical information (e.g. mobile TAN)

Data from a major European mobile operator– Serving hundreds of thousands of hosts– 83 days analyzed for botnet tracking– Provides stable anonymized Mobile Station IDentifier (MSID)

Page 14: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 14 -© FTW 2012

Our Approach

DNS failure graph analysis– Graph formed by hosts requesting non-existing domain names

– Target: Find botnets using Domain Generation Algorithms (DGA)– Based on methods presented by Jiang et al. (*)

(*) Nan Jiang, Jin Cao, Yu Jin, L.E. Li, and Zhi-Li Zhang. Identifying suspicious activities through DNS failure graph nalysis. In Network Protocols (ICNP), 2010 18th IEEE International Conference on, pages 144 –153, October 2010.

yotube.comfacebook.coniluysad.orgkjnnwwx.org

Page 15: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 15 -© FTW 2012

Our Approach

DNS failure graph analysis– Graph formed by hosts requesting non-existing domain names

– Target: Find botnets using Domain Generation Algorithms (DGA)– Based on methods presented by Jiang et al. (*)

(*) Nan Jiang, Jin Cao, Yu Jin, L.E. Li, and Zhi-Li Zhang. Identifying suspicious activities through DNS failure graph nalysis. In Network Protocols (ICNP), 2010 18th IEEE International Conference on, pages 144 –153, October 2010.

yotube.comfacebook.coniluysad.orgkjnnwwx.org

Page 16: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 16 -© FTW 2012

Adjacency Matrix of Failed DNS Queries

Page 17: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 17 -© FTW 2012

Hamming Distance Reordering

1 1 1

0 0 1

1 0 1Original Matrix Re-ordered Matrix

Page 18: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 18 -© FTW 2012

Hamming Distance Reordering

1

1

1

1 1 1

0 0 1

1 0 1Original Matrix Re-ordered Matrix

Page 19: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 19 -© FTW 2012

Hamming Distance Reordering

1 1

1 0

1 1

1 1 1

0 0 1

1 0 1Original Matrix Re-ordered Matrix

Page 20: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 20 -© FTW 2012

Hamming Distance Reordering

1 1 1

1 0 0

1 1 0

1 1 1

0 0 1

1 0 1Original Matrix Re-ordered Matrix

Page 21: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 21 -© FTW 2012

Hamming Distance Reordering

1 1 1

1 0 0

1 1 0

1 1 1

0 0 1

1 0 1Original Matrix Re-ordered Matrix

Apply the same for rows

Page 22: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 22 -© FTW 2012

Approach: Adjacency Matrix Reordering

Matrix reordering according to hamming distance

X and Y axis are re-ordered separately

Page 23: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 23 -© FTW 2012

Approache: Cluster Identification

Zoom reveals clusters of hosts and Domain names

Identify clusters by DBSCAN Clustering

Are all those clusters caused by botnets?

Clusters

Page 24: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 24 -© FTW 2012

Found Clusters

Top 5 identified Clusters in one day

Page 25: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 25 -© FTW 2012

Found Clusters

Top 5 identified Clusters in one day

Tracking Clusters– By active suspicious domain names requested by cluster K– Utilizing stable MSID

Page 26: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 26 -© FTW 2012

Cluster A (Conficker)

Page 27: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 27 -© FTW 2012

Cluster B (tang0-hote1.com)

Page 28: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 28 -© FTW 2012

Conclusion

We identified bots in a 3G mobile network

Our Approach: Stable MSID – Robust to IP churn– Allows tracking of botnet size over long periods of time– Reveals posible much larger botnet size (up-to 6 times)

We speculate that botnets are larger than reported by current botnet trackers

Page 29: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 29 -© FTW 2012

Outlook

Study impact of IP churn– Compare number of different IPs with MSIDs

Combine results from different networks– Combine data from different data sources– If a name is suspicious in two networks it is more suspicious

Combined with active domain name analysis– e.g. with the approach presented by Andreas Berger

Page 30: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 30 -© FTW 2012

Contact: [email protected]

Thank you for your attention

Page 31: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 31 -© FTW 2012

Backup - Slides

Page 32: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 32 -© FTW 2012

System Overview

Page 33: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 33 -© FTW 2012

Cluster Tracking

Track clusters by active domain names

Domain Cluster Ratio (DCR)– Was the name mainly requested by cluster K?

Cluster Internal Ratio (CIR)– How common was it in cluster K?

Find domains mainly requested by hosts of a cluster

Tracking was applied to two largest clusters– Cluster A (Conficker) tracked over 14 days– Cluster B (tang0-hote1.com) tracked over 83 days

Page 34: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 34 -© FTW 2012

Analyzing Found Clusters

Sort Clusters by distinct Second Level Domains (SLD)

– SLD(D(K)) - number of distinct SLD for Cluster K– D(K) - number of Domains of Cluster K

Top 5 Clusters according to

Page 35: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 35 -© FTW 2012

Analyzing Found Clusters

Sort Clusters by distinct Second Level Domains (SLD)

– SLD(D(K)) - number of distinct SLD for Cluster K– D(K) - number of Domains of Cluster K

Top 5 Clusters according to

Page 36: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 36 -© FTW 2012

Cluster A (Conficker)

Page 37: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 37 -© FTW 2012

Outline

Why do we need this

Mobile network data

DNS filtering and labeling

Clustering queries

Describe found clusters

Explain Churn

Show Tracking

Summary

Page 38: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 38 -© FTW 2012

Effect of IP churn

Previous approaches– Botnet tracking uses IPs to estimate the total size of the botnet– Many ISPs assign dynamic IPs to hosts (i.e. IP adresses may be

shared among different hosts)

Our Approach: Stable MSID – Reveal much larger botnet size (up-to 6 times)– Botnets might by larger than expected– Allows tracking of botnet size over long periods of time

We speculate that botnets are larger than reported by current botnet trackers

Page 39: Trapping Botnets by DNS failure graphs: Validation ...€¦ · Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello,

- 39 -© FTW 2012

Conclusion

Validatation of the Approach of Jiang et al.

Applied to a larger 3G network

Extended by a efficient DBSCAN cluster identification

5 Clusters of suspicious hosts analyzed

2 Clusters tracked over long time

Our study indicates a much larger botnet size