Analyzing Bot Family Behavior & its Detection Punit Sharma

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 2 - Mar 2014
Analyzing Bot Family Behavior & its
Detection
Punit Sharma#1, Sanjay Tiwari#2, Anchit Bijalwan#3, Emmanuel Pilli#4
#12
Deptt. Of CSE ,AIET Jaipur,#3Deptt of CSE,UTU dehradun,#4Deptt of CSE MNIT Jaipur
Abstract- Botnet have become one of the most
significant threats to the internet.It is automated
process that interacts with other network services.This
paper examine the crime & analyzing the behaviouer of
various bots.In this paper we have explained the life
cycle phases creation,infection,waiting & executing.This
paper also include the related work on botnet &
classified the existing bot into various categories &
explained the terminology in particular bots.Based on
exhaustive survey we try to categorise the whole bot &
the tool applied on it.This paper focuses on bot families
& their detection techniques.
Keywords-C&C,IRC,IM,TTL
I.INTRODUCTION
Among all media of communications, Internet is most
vulnerable to attacks owing to itspublic nature and virtually
without centralized control. Botnets have become one of
the most significant threats to the Internet.The term bot,
derived from the word ‘ro-bot’. It is an automated process
that interacts with other network services. Its generic form
is used to describe a single script or set ofscripts or a
program which is designed to perform predefined functions
automatically and
repeatedly after being triggered
intentionally or through a system infection. A typical use of
bots is to gather information such as web crawlers, or
interact automatically with IM(Instant messaging),
IRC(Internet Relay Chat), or other web interfaces. They
may also be used to interact dynamically with websites.
Although bots originated as a useful feature for carrying
out repetitive and time consuming operations but they are
being exploited for malicious intent. Bots that are used to
carry out legitimate activities in an automated manner are
called benevolent bots and those that are meant for
malicious intent are known as malicious bots. Benevolent
bots among various other activities are used by search
engines to spider online website content and by online
games to provide virtual opponent .
‘Botnet’ is a network of compromised computers (bots)
running malicious software, usually installed via all kinds
of attacking techniques such as trojan horses, worms and
viruses[1].Such zombie computers are remotely controlled
by an attacker who is known as boatmaster[2][3]. Botnets
with hudge number of computers have tremendous
cumulative bandwidth and computing capability. They are
ISSN: 2231-5381
exploited by botmasters for initiating various malicious
activities, such as email spam, distributed DOS attacks,
password cracking and key logging. Botnets have become
one of the most significant threats to the Internet. Today,
centralized botnets are still widely used. In a centralized
botnet, bots are connected to several servers (called C&C
servers) to obtain commands. This architecture is easy to
construct and efficient in distributing botmaster’s
commands.
The term botnet can be used to refer to any group of bots,
such as IRC bots, the word is generally used to refer to a
collection of compromised machines running programs,
usually referred to as worms, Trojan horses, or backdoors,
under a common command and control infrastructure.A
botnet is built in two stages,bot creation & bot propagation.
Bot creation-This stage largely depends on skills and
requirements of an attacker. The attacker may Choose to
write its own code or simply extend or customize an
existing bot.
Bot propagation-In this stage vulnerable systems and tools
to exploit them are located which are then used to gain
backdoor access to these systems facilitating installation of
bot malware by uploading or commanding the victim
machine to download a copy of the bot malware (Shannon
& Moore –2004). This infection stage involves use of
various direct and indirect techniques to spread bot
malware. These include attack through software
vulnerabilities, vulnerabilities caused by other infections,
social engineering through the use of email, instant
messaging and malicious web page content. The bot
malware is also propagated through peer to peer networks,
open file sharing, and direct client to client file exchange.
This paper examine the crime & analyzing the behaviouer
of various bots.In section II we discuss the background
studies.In this section we have explained the life cycle
phases creation,infection,waiting & executing.Section III
include the related work specific on botnet . In Section IV
we classified the existing bot into various categories &
explained the terminology in particular bots.Based on
exhaustive survey we try to categorise the whole bot & the
tool applied on it.This paper focuses on bot families & their
detection techniques.
II.BACKGROUND STUDIES
A.Life cycle of Botnet.Schiller et al.[4] have specified and
detailed the Life Cycle in various phases mentioned below.
http://www.ijettjournal.org
Page 81
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 2 - Mar 2014
1. Creation. In this phase, the bot master develops malware
software. In some cases, an existing software code is used
and custom features are implemented to finalize a malware
code. As part of the test and debugging, dry runs are
performed on the test network before deploying the bot.
Creation
Executing
Life
cycle of
Botnet
Infection
Waiting
Fig. 1 Life cycle of Botnet
B. Infection. The life of a botnet client begins when it
has been exploited. A prospective bot client can be
exploited via a malicious code that the user is tricked into
running, which can be attached against un-patched
vulnerabilities or through back doors left open by Trojan
worms or remote access Trojans and password guessing, as
well as with brute force access attempts.Once a victim’s
machine becomes infected with a bot, it is known as a
zombie. There are many possibilities forinfecting victim
computers, including the following eight :
• Software Vulnerabilities: With this method, the attacker
exploits the vulnerability encountered in a running service
in order to automatically gain access and install his
software without any user interaction. This method was
used by most worms.
• Un-patched Vulnerabilities: To support spreading via an
attack against un- patched vulnerabilities, most botnet
clients include a scanning capability so that each client is
able to expand the botnet. These scanning tools first check
for open ports. They then take the list of systems with
open ports and use vulnerability specific scanning tools to
scan those systems that have open ports associated with
known vulnerabilities.
• Drive by download: The attackers host their files on the
web server and entice people to visit the site. When the
user loads a certain page, the software is automatically
installed without user interaction, usually by exploiting
browser bugs, missed configurations, or unsecured
ActiveX controls.
• Trojan Horse: The attacker bundles his malicious
software with seemingly benign and useful software, such
as screen savers, antivirus scanners, or games. In this case,
the user is fully aware of the installation process, but he
does not know about hidden bot functionality.
ISSN: 2231-5381
• Email attachment: This method is the less popular
method. The attacker sends an attachment that will
automatically install the malware software when the user
opens it, usually without any interaction.
• Phishing emails: This method is used when the user is
lured or goaded to a Web site that installs a malicious code
in the Background, sometimes while convincing the user to
give them their bank user ID and password, account
information, and other such information.
• Spam: An instant message is sent to you by someone you
know with a message like “You got to see this!” followed
by a link to a Web site that downloads and executes a
malicious code on the computer.
• Rallying: After infection, the bot starts up for the first
time and attempts to contact its C&C Server. The term
C&C stands for “Command and Control”, which is defined
as the act of managing and taking the botnet clients. In the
centralized botnet, this could be the IRC or HTTP server.
In the decentralized P2P Botnet, the bots perform a boot
strapping protocol required to locate other peers and join
the network. Most bots are very faults-tolerant having
multiple list of back up servers to carry out attempts if the
primary ones become unavailable; this process known as
Calling Home. In other words, it is a process that involves
the moment when the botnet client initiates contact with the
Botnet Command and Control (C&C) Server. Rallying is
the term used when botnets perform first time logging to a
C&C server. In this phase, the new botnet client may
request updates. The updates could be updating exploiting
software, C&C Server names list, IP addresses, and/or
Channel names. This will ensure that the botnet client can
be managed and can be recovered should the current C&C
server be taken offline. The following steps secure the
botnet from removal.
• Retrieve Anti Virus (A/V) Step: In order to secure a
new client from removal, the botnet client requests location
of the latest antivirus (A/V) tool from the C&C Server.
The controlled bot client would download this software
and execute it to remove the A/V tool, hide from it, or
render it ineffective. The fact of shutting down the A/V
tool may raise suspicions if the user is observant. Some
bot clients will run a dll (a dynamic link library), that
neuters the A/V tool. With an Anti-A/V dll in place the
A/V tool may appear to be working normally except that it
never detects or reports the files related to the botnet client.
It may also change the Host file and LM Host file so that
attempts to contact an A/V vendor for updates will not
succeed.
• Securing the Botnet: With this step, the bot herder will
secure the botnet. The hacker might check to see what else
might be available there. In some cases (e.g. Rbot
Infection), the bot herder uses a batch file called find.bat
which tells tell the bot herder if another hacker has been
there before or where he or she put his or her tools in this
client. It may also tell the bot herder about other things on
the computer that could be useful.
http://www.ijettjournal.org
Page 82
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 2 - Mar 2014
C. Waiting .In this Phase, the botnet has joined with the
C&C network, which is related to the connectivity and/or it
communication infrastructure.
The bots wait for
commands from the botmaster. During this time, network
traffic passes between the botnet victims and the C&C
Servers. In an IRC botnet this traffic would consist mainly
of periodic keep- alive messages from the server. Each
botnet family has a set of commands that it supports.
D. Executing.Once the bot receives a command from the
botmaster, it executes it and returns any results to the
botmaster via the C&C network. Common commands, such
as those in the following list, are in line with major uses of
botnets:
• Scanning for new victims.
• Sending spam.
• Sending DoS floods and setting up traffic redirection.
III.RELATED WORK
Freiling et al.[5] expressed bot infection methods are all
most similar to other classes of malware which recruit the
vulnerable systems by exploiting
vulnerabilities of
software, trojan insertion, social engineering techniques
leading to download malicious bot code [6]
Bijalwan et al.[7] made a exhausted survey on botnet
forensic. Author proposed the advanced approach related
to botnet detection, analysis & demonstrate a noble
approach of botnet investigation & defence mechanisms.
Thapliyal & bijalwan et al.[8] made a generic framework
specific on botnet forensic.
Feily et al.[9] classified Botnet detection and tracking has
been a major research topic in recent years. Various
solutions have been proposed in Malware research and
academia.
Y.W law et al.[10] collects digital traces from both the
network & physical memory of the infected network host.
Author co-relate this information to identify the resident
botnet malware(host base approach).
Govil et al.[11] presented his efforts disseminates &
understanding of botnet,types of botnet,characterstics
Author highlighted various detection mechanismto seek
inside into their efficiency & subsequent issues about
botnet(criminology of botnet & their detection)
IV.CLASSIFICATION OF BOT FAMILIES
A.SDBot-The SDBot family of bots has been around for
almost five years (since 2002), and has grown to include
hundreds of variants and offshoots. These bots were
developed in open source malware programs, which
contribute to provide longevity to this bot. The original
SDBot author released the source code for the bot and
included his contact information, thereby providing a
means of public collaboration and evolution in order to
continue developing and improving the code. SDBot
security relies on spreading itself primarily via network
shares using blank or common passwords. Therefore,
systems with solid security and more complex passwords
will not be compromised by SDBot.
ISSN: 2231-5381
Bot Families
SD Bot
R Bot
Agobot
Spybot
Mybot
Hybot
Fig. 1 Classification of Botfamilies
B.Agobot (aka Gaobot or Phatbot)This malware was
designed with the modular functionality. This bot performs
infecting process in three stages:
1. First, Agobot infects the computer with the bot client
and an open backdoor in order to allow the attacker to
communicate with, and control the machine.
2. The second phase attempts to shutdown processes
associated with antivirus and security programs.
3. The final phase tries to block access from the infected
computer to various antivirus and security related Web
sites.
The modular approach makes sense from a design
perspective because it allows the developer to update or to
modify one portion, or module, without having to rewrite
or recompile the entire bot code.
C.Spybot.Spybot is an evolution of SDBot. The main
differences between SDBot and Spybot are that Spybot
adds a number of spyware-like capabilities such as
keystroke logging, email address harvesting and Web
surfing activities.
D. Mytob The Mytob family of worms is an example of
the converging world of malware. The originators of
Mytob took a mass mailing worm and combined it with bot
functionality based on the SDBot family. This hybrid
combination results in faster propagation and more
compromised systems waiting for a bot herder to give them
instructions.
E.Hybot-A bot net which recover CNC channel in a
tolerable delay in case of most of critical resources are
destroyed.Hybot[6] exploit hybrid CNC structure,hybrid
P2P & URL flux to ensure both robtness & effectiveness.
http://www.ijettjournal.org
Page 83
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 2 - Mar 2014
TABLE I
DESCRIPTION OF BOT
S.No.
Tools
Descriptiopn
1
SD bot
SD bot is a worm that provide a remote attacker full access on the victim’s computer.it uses an
IRC protocol to establish a connection.
2
R Bot
Rbot was the first of the bot families to use compression & encryption algorithms.
3
Agobot
Agobot is also frequently known as Gaobot,is a family of computer worms.Axel”Ago” Gembe,a
German programmer,was responsible for writing the first version.
4
Spybot
The spybot is a large family of computer worms of varying characterstics.Although the acctual
number of version is unknown.Its briefly heid the record of most variants.
5
Mybot
The Mytob family of worms is an example of the converging world of malware. The originators
of Mytob took a mass mailing worm and combined it with bot functionality based on the SDBot
family.
6
Hybot
A bot net which recover CNC channel in a tolerable delay in case of most of critical resources are
destroyed
ISSN: 2231-5381
http://www.ijettjournal.org
Page 84
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 2 - Mar 2014
TABLE II
ANALYSIS OF VARIOUS BOT
Bot family
McAfee
Symantec
Alia
ses
TrendMic
ro
Kaspersk
y
Infection Method
Advantages
Sign
System
folder
of
com
pro
mise
s
Unexpect
ed
Traffic
Propagation
SD Bot
IRC-SDBot.
R Bot
W32/SDbot.worm.g
en.g.
Ago Bot
32/Gaobot.worm.
Spy Bot
W32/Spybot.worm.
gen.
My bot
W32/Mytob.gen
@MM.
Backdoor.S
DBot
W32.Spybot.worm.
W32.HLLW.Gaobot.gen.
.
W32.
Worm.
Spybot.
W32.Mytob@m
m.
Worm_R_Bot.
Worm_Agobot.Gen. 34
Worm_Spybot.gen.
36
Worm_Mytob.g
en.
Backdoor.RBot.gen.
Backdoor.Agobot.gen.
Worm.P2P.SPYBo
t. Gen.
NetWorm.Win3
2.Mytob.Gen.
shares
insecure
networks or
uses known
vulnerability
exploits
place
a
copy
of
itself in the
systems
folder
exploit
weak
passwords and poor
security
propagate using Peer to Peer
(P2P) networking systems
spreads via
networks
P2P
arrives via email
with some sort
of file
attachment.
copies itself into the
System
(C:\Windows\Syste
m32) directory
Agobot will drop a copy of
itself into System folder on
the target system.
place a copy of
Bling.exe.
Netwmom.exe.
Wuamgrd.exe.
into System folder
place a copy(
wfdmgr.exe ) of
itself
into
System folder
establish an
IRC
connection
via TCP port
6667
and
port 7000
establish an IRC
connection via TCP
port 113.
open backdoors on the
infected systems and establish
communication
with
designated IRC servers.
Spybot
will
connect
to
a
designated
IRC
server
functionality
comes
from
SDBot malware
Attempt to
connect to
administrati
ve
shares
like
PRINT,C,D,
E,ADMIN
OR IPC
Looking for open
connection, scans on
Port 139 and 445
Attempts to spread Malware
via P2P networks
Looking for openly
and poor secured
connection
Spreads
email
BKDR_SDB
ot.
Bckdoor.IR
C.SDBot.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 85
via
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 2 - Mar 2014
TABLE III
BOTNET DETECTION TECHNIQUE
S.No.
Detection
Technique
Unknown
Bot
Detection
NO
Protocol &
Structure
Independent
NO
Encrypted
Bot
detection
NO
Real-time
Detection
NO
Low
False
Positive
NO
1
Anomalay
based
2
Signature
based
YES
NO
YES
NO
YES
3
DNS based
YES
NO
YES
NO
YES
4
Mining
based
YES
YES
YES
NO
YES
4.2Botnet detection Technique
According to information published in the Survey of
Botnet and Botnet Detection[5], Botnet detection and
tracking has been a major research topic in recent years.
Different solutions have been proposed in Malware
research and academia.
4.2.1Signature-based Detection: Binkley[7] proposed an
anomalay based algorithm for detecting IRC based botnet
meshes.Knowledge of useful signatures and behavior of
existing botnets is useful for botnet detection.The Intrusion
Detection System (IDS) monitors network traffic in order
to find signs of intrusion.However,signature-based
detection techniques can be used for detection of known
botnets.
4.2.2 Anomaly-based Detection: Wurzinger et al.[8]
developed a system that generates signature for Bro IDS[9]
using network traffic traces of bots.Anomaly-based
detection techniques attempt to detect botnets based on
several network traffic anomalies such as high network
latency, high volumes of traffic, traffic on unusual ports,
and unusual system behavior that could indicate presence
of malicious bots in the network. In anomaly detection, the
goal is to find objects that are different from most other
objects.
4.2.3 DNS-based Detection: DNS-based detection
techniques are based on particular DNS information
generated by a botnet.DNS-based detection techniques are
similar to anomaly detection techniques as similar anomaly
detection algorithms are applied on DNS traffic. This
technique generates many false positives due to
misclassification of legitimate and popular domains that
use DNS with short time-to-live (TTL). DNS techniques
are mostly useful for botnet tracking and measurement to
understand botnet technology and characteristics, but do
not necessarily detect bot infection.
4.2.4 Mining-based Detection: One effective technique
for botnet detection is to identify botnet C&C traffic.
However, botnet C&C traffic is difficult to detect. In fact,
since botnets utilize normal protocols for C&C
communications, the traffic is similar to normal traffic.
Therefore, anomaly-based techniques are not useful to
identify botnet C&C traffic[5].
V. CONCLUSION
This paper is an exhaustive analysis of bot families. In this
research Based on exhaustive survey we try to categorise
the whole bot & the tool applied on it We also tried to
focus on the various existing detection technique & their
behaviour.Even if investigation techniques is the
challenges.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
ISSN: 2231-5381
P. Wang, S. Sparks, and C. C. Zou, "An advanced
hybrid peer-to-peer botnet," Dependable and Secure
Computing, IEEE Transactions on, vol. 7, no. 2, pp.
113-127.
A. Ramachandran, N. Feamster, and D. Dagon,
"Detecting
botnet
membership
with
dnsbl
counterintelligence," Botnet Detection, pp. 131-142,
2008.
E. Cooke, F. Jahanian, and D. McPherson, "The zombie
roundup: Understanding, detecting, and disrupting
botnets," in Proceedings of the USENIX SRUTI
Workshop, 2005, p. 44.
C. Schiller and J. R. Binkley, Botnets: The killer web
applications: Syngress, 2011.
F. C. Freiling, T. Holz, and G. Wicherski, Botnet
tracking: Exploring a root-cause methodology to
prevent distributed denial-of-service attacks: Springer,
2005.
A. Ramachandran and N. Feamster, "Understanding the
network-level behavior of spammers," in ACM
SIGCOMM Computer Communication Review, 2006,
pp. 291-302.
A. Bijalwan, M. Thapaliyal, E. S. Pilli, and R. C. Joshi,
http://www.ijettjournal.org
Page 86
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 2 - Mar 2014
"Survey and Research Challenges of Botnet Forensics,"
International Journal of Computer Applications, vol.
75, 2013.2009
[8]
[9]
[10]
[11]
[12]
M. Thapliyal, A. Bijalwan, N. Garg, and E. S. Pilli, "A
Generic Process Model for Botnet Forensic Analysis,"
in Proceedings of the Conference on Advances in
Communication and Control Systems-2013, 2013.
M. Feily, A. Shahrestani, and S. Ramadass, "A survey
of botnet and botnet detection," 2009, pp. 268-273.
F. Y. W. Law, K. P. Chow, P. K. Y. Lai, H. K. S. Tse,
S. Goel, O. Akan, P. Bellavista, J. Cao, F. Dressler, D.
Ferrari, M. Gerla, H. Kobayashi, S. Palazzo, S. Sahni,
X. Shen, M. Stan, J. Xiaohua, A. Zomaya, and G.
Coulson, "A Host-Based Approach to BotNet
Investigation?
Digital Forensics and Cyber Crime." vol. 31, O. Akan,
P. Bellavista, J. Cao, F. Dressler, D. Ferrari, M. Gerla,
H. Kobayashi, S. Palazzo, S. Sahni, X. Shen, M. Stan, J.
Xiaohua, A. Zomaya, and G. Coulson, Eds.: Springer
Berlin Heidelberg, 2009, pp. 161-170.
J. Govil and G. Jivika, "Criminology of BotNets and
their
detection and
defense
methods,"
in
Electro/Information
Technology,
2007
IEEE
International Conference on, 2007, pp. 215-220.
P. Wurzinger, L. Bilge, T. Holz, J. Goebel, C. Kruegel,
and E. Kirda, "Automatically generating models for
botnet detection," Computer Security–ESORICS
2009, pp. 232-249, 2009.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 87
Download