Botnets - Cameron University

advertisement
Wesley Cawman, Won Yi
Evolving Security: Botnet Integration
IT 4444: IT Capstone
April 27, 2011
Table of Contents
Abstract
p.1
Intro
p.1
Body
Expansion of Internet Users
p.1
Botnets
p.2
Future Trends
p.4
Proposed Uses
p.4
Conclusion / Future Work
p.5
References
p.5
Evolving Security: Botnet Integration
Wesley Cawman, Won Yi
Computing & Technology Department, Cameron University, Lawton, Oklahoma, USA
Abstract—If we want our systems to remain secure
today, we have to secure them the same way our
attackers are penetrating them. In order to do this,
security has to evolve beyond what it is today.
Security has to step past the defensive realm and step
into the offensive domain using bots and botnets to
secure our systems beyond anything we have ever
done before.
do, and because of that we are fighting man against
program and losing the battle. General Keith
Alexander of Cyber Command and others have noted
that the United States significantly lacks the man
power to fend off any real cyber-attacks against our
homeland or allies [11]. With that said, even with
more and more young men and women signing up in
the Armed Forces to aid in this battle, no amount of
man power will ever be significant enough if they
keep fighting man against program. A program does
not need to eat or sleep, and for this reason, we need
to begin fighting program against program, or in
other words bot against bot.
Keywords: Security, Bots, Botnets
Introduction
The main player in securing computer systems
has been humans aided by programs in the past. This
partnership has not been one where humans can just
set programs and forget them. The human factor in
this partnership has always been the delegator as well
as the main work force, while the programs aiding us
just perform commands we give them. Why does the
act of securing our systems rely so much on the
human factor, while those actively penetrating our
systems rarely rely on the human factor to get their
job done? The process of securing our systems
against intruders can no longer be done how it has
always been done; this is no longer good enough.
This paper does seek to persuade security
professionals to secure their systems offensively with
the aid of bots and botnets, but this paper also aims to
persuade those actively defending our country
through cyber warfare activities to add bots and
botnets to their arsenal. Some of the latest sources on
the inside suggest that those in charge of dictating
what cyber warfare is exactly are having a hard time
defining the term or their role in it. Cyber warfare
stemmed from what was once called information
warfare where one used electronic communications
and the internet to disrupt a country’s
telecommunications, power supply, transport
systems, and so on [21, 22, 23, 24]. Cyber warfare
today can be defined as the usage of computers and
other devices to attack an enemy’s information
systems as opposed to an enemy’s armies or factories
[5, 7, 8, 25]. These definitions are mostly vague, but
do suggest that these activities are conducted for the
most part by humans, against a nonhuman opponent.
This would not be such a bad thing if we understood
our role in cyber warfare, or if we were fighting
human against human in cyber space, but neither of
these are true. We are currently fighting a battle in
which we do not understand what we are supposed to
The first section in the body of this document
will look at a few statistics on the alarming growth in
the expansion of Internet users today. Then we will
look at a few statistics about botnets and discuss their
explosive growth in the last part of 2010. The
majority of this document will look at the different
functions of bots and botnets, defining different types
of bots, and looking at which attributes made the
more well-known bots successful. The main body of
this paper will end with a proposal for different
botnet prototypes to implement on both the offensive
security front, as well as the cyber warfare front. This
paper will conclude and end with a section
suggesting future studies in “thinking outside of the
box,” “other things botnets can do,” and “research for
botnets on mobile devices.”
1.
Expansion of Internet Users
79.66% of the total population of the United
States accesses the Internet on a regular basis, which
is around 247,890,434 out of 311,185,581 people [1,
2]. Looking at world statistics, 30.72% of the total
population accesses the Internet on a regular basis
which is around 2,128,038,074 out of 6,928,189,253
people [2, 3]. Even though the U.S. has an Internet
user percentage close to 80% in 2011, those users
only make up about 12% of the total Internet users
around the world [1, 2, 3, 17, 18, 19]. It is important
to point out that those regions with higher Internet
user percentages tend to sponsor a larger percentage
of attacks, threats and vulnerabilities as compared to
other regions with fewer Internet users per capita. As
these regions become more common the total number
of vulnerabilities cataloged will increase significantly
[4, 10, 14].
1
YEAR
U.S. Pop.
U.S. Users
U.S. % Pop.
World Pop.
World Users
World % Pop.
U.S. Users of World Users
2000
281,421,960
124,000,000
44.06%
6,089,648,784
393,420,161
6.46%
31.52%
2001
285,317,559
142,823,008
50.06%
6,166,108,367
494,365,743
8.02%
28.90%
2002
288,368,698
167,196,688
58.19%
6,242,347,736
673,723,065
10.79%
24.82%
2003
290,809,777
172,250,000
59.23%
6,317,998,040
783,061,780
12.39%
22.00%
2004
293,271,500
201,661,159
68.76%
6,393,741,245
909,603,748
14.23%
22.17%
2005
296,507,061
203,824,428
68.74%
6,469,688,764
1,036,367,766
16.02%
19.67%
2006
299,398,484
207,970,356
69.46%
6,546,299,902
1,159,344,058
17.71%
17.94%
2007
301,967,681
212,080,135
70.23%
6,623,914,961
1,374,566,869
20.75%
15.43%
2008
303,824,646
220,141,969
72.46%
6,700,983,106
1,602,486,278
23.91%
13.74%
2009
307,232,863
227,719,000
74.12%
6,776,763,237
1,832,779,793
27.04%
12.42%
2010
310,232,863
239,810,003
77.30%
6,852,472,823
1,966,514,816
28.70%
12.19%
2011
311,185,581
247,890,434
79.66%
6,928,189,253
2,128,038,074
30.72%
11.65%
U.S. % Pop.
World % Pop.
80.00%
U.S. Users of World Users
70.00%
60.00%
50.00%
40.00%
30.00%
20.00%
10.00%
0.00%
2000
2.
2001
2002 2003 2004 2005 2006 2007 2008 2009
Internet User Comparison Chart [1, 2, 3, 17, 18, 19]
2010
2011
remotely and secretly controlled by one or more
individuals, called bot-herders [9, 26]. It was
estimated in 2008 that around one in four personal
computers in the United States was infected by a
botnet, which in turn could be used as a zombie
computer to distribute further attacks, execute code to
send spam, host and distribute malware or other
illegal files, or used to steal the identities its users [9,
15, 26]. Today the estimates are closer to one in three
computers around the globe are infected with at least
one botnet, and in 2010 alone there was a 654%
growth in the total number of unique botnet victims
towards the end of the year, as compared to the
beginning of 2010 [6]. Consequently the popularity
of always-on Internet services such as residential
broadband has only assisted in the spread of bots,
creating larger botnets by the second. This also
ensures bot-herders that a large percentage of the
computers in their botnet will remain accessible at
any given time.
Botnets
The word bot originated from the word robot
which referred to an automated software program that
performed specific tasks on a network, with some
degree of autonomy [9, 26]. Out of this basic design
bots can be crafted to preform positively beneficial
and vital functions, or negatively destructive
functions. A positive example of bots can be the
spiderbots [12] that Google uses most notably, and
other search engines, to index webpages for
searching and to also keep the most up to date listings
of those pages. The SETI@HOME program [13] is a
positive example of botnet usage where participants
voluntarily install bots on their computers to take
advantage of free resources when they become
available, in an effort to analyze radio telescope data
for evidence of intelligent extraterrestrial life.
However, more recently bots and botnets have been
used for mostly malicious purposes. Bots are
installed unwillingly and completely unknown to the
average user and assembled into entire networks of
compromised computers–botnets—that are then
2
Damballa Total Botnet Victim Growth in 2010 [6]
Botnets have become the perfect base of
operations for computer criminals [9]. These bot
programs are designed to operate under the radar,
without any detectable evidence of their existence.
The few paranoid security experts’ out there that
notice when anything changes on their system, and
always strive to have the most up-to-date and secure
system, might not even have a chance against
becoming another botnet victim. Depending on the
nature of the bot, the attacker may have almost as
much control over the victim’s computer as the
victim has, or perhaps more [9]. Not only can botherders have administrative privileges to their
victim’s computer, but with that they can remain in
the background for years while keeping their bots upto-date and operational against the latest security
patches.
often led users into battling for operator status of
popular channels. IRC networks were designed in a
way that once every single designated channel
operator disconnected from a channel, another user
on the channel would automatically be assigned as
the operator and have full control of the channel. In
an effort to gain control of popular channels
malicious users began creating scripts that would
come to perform the first denial-of-service (DoS) and
distributed denial-of-service (DDoS) attacks on IRC
servers. Malicious attackers would target specific
servers used by channel operators and use their DoS
or DDoS scripts to force an operator offline. Once an
operator was forced offline the malicious attacker or
someone else could then gain the operator status. In
time, the same bots that once executed DoS or DDoS
scripts against operators began to execute these same
scripts against targeted individual users [9].
The botnets we experience today can trace their
origins back to the creation of the first Internet Relay
Chat (IRC) networks [9, 26]. IRC was designed as a
real-time Internet chat protocol, designed for manyto-many, group, communication. The design of IRC
was centered on channels in which users from around
the world could access and communicate with others
in a text-based discussion forum. Servers would host
numerous channels in these IRC networks, and these
servers would be located throughout the world in
various locations for users to connect to and
communicate. The channels would be administered
by channel operators and these operators held the
abilities to block or eject disorderly users from
discussion forums. To expand beyond the basic
functions of IRC, some channel operators developed
automated scripts, or IRC bots, to assist in logging
channel statistics, running games, and coordinating
file transfers. As IRC networks became more
popular, the number of users attending discussion
forums increased, as well as the number of conflicts
between users. The growing conflict between users
Once malicious attackers began targeting
specific users the IRC bots developed one step
further into a class of bots that are considered
Command and Control (C&C) bots today. These
C&C bots are first implanted on a user’s system by
means of malware [9, 26]. Once active on the users
system, the C&C bot secretly connects to a remote
IRC server using its integrated client program and
waits for instructions. The malicious attacker serving
as channel operator can then command the bots to
collect information from their victims’ computers.
This information can include operating system
information and latest patching versions, the
computers name, the users sign-in names, email
addresses, nicknames, and dial-up user names and
passwords [9]. With time this C&C technology was
enhanced by users and lead to the development of
more sophisticated bots with additional attack
methods. The original IRC-based C&C functions are
still seen in a majority of the current generation of
IRC-based bots in operation today, and are still quite
3
the point where they’ll attempts to steal computers
from competing botnets. In obtaining as many
computers as possible, these larger botnets will
continue to patch their controlled computers to
defend them from being taken over by other botnet
competitors. Because of the huge popularity with
social networking sites, those sites will become the
command points for botnets in the future. Programs
similar to SETI@HOME will be developed where
users can opt-in personal computing resources to take
part in politically-based botnet activity. And even the
smaller botnets will become more effective, as they
will be harder to detect as users continue to improve
upon current open source botnets [20].
effective. Another reason botnets have become so
attractive to cybercriminals is because they provide
an effective mechanism for covering all traces of the
bot herder. Trying to trace the origin of an attack will
just lead you right back to the compromised
computer of an innocent user for the most part; this
problem makes it hard for investigators to proceed
any further. Organizations like Damballa Inc.,
however, pioneer in the fight against cybercrime.
Damballa currently develops and deploys new C&C
detection technologies that increase their ability to
detect additional categories of stealthy botnet
deployments [6]. As referenced above, the second
half of 2010 saw a rapid expansion in the overall total
number of unique botnet victims. This arose out of
the rapid evolution of many popular botnet Do It
Yourself (DIY) construction kits and the increased
availability of feature-rich browser exploit packs.
And cyber criminals providing specialized malware
distribution services became more proficient at
installing bot agents on behalf of their customers (i.e.
botnet operators) [6].
4.
In a paper presented at the most recent USENIX
Symposium, by several researchers at the University
of Washington, a new proposed use for friendly
botnets arose. Some could compare this idea to how
the military operates detached from the Internet,
while still filtering sought after intelligence moving
across the Internet. The idea proposed at this
Symposium was one that would use friendly
computers in a botnet structure to protect servers and
websites from outside threats. This phalanx as it is
called would place a swarm of friendly computing
systems in front of Web sites and servers [16]. All
communications intended for these sites and servers
would pass through this cluster of systems, and the
data would only be passed onto the server at the
server’s request.
Botnets around the world today are said to be
divided between two families. The first family of bots
are those that are closely controlled by individual
groups of attackers. And the second family of bots
are produced by malware kits. These malware kits
can range from being freely available open source
kits to others being developed by individual groups
and sold like legitimate commercial software
products that even come with support agreements [9].
The existence of botnet kits makes it difficult for
security researchers to estimate the exact number and
size of botnets currently in operation. Because of
these botnet kits, one variant of botnets may not be
controlled by one individual, or group, but instead by
an unidentified number of separate botnets controlled
by different people altogether, some of which might
only encompass just a handful of computers. Because
of this it is hard for security professionals to pinpoint
the exact core of the problem and attempt to remove
the operator from these IRC-based botnets [9, 26].
3.
Proposed Uses
With the phalanx in place, the idea is that the
phalanx would stop most of the traffic from an
attempted DoS or DDoS, and only a very small
amount of traffic would reach the main server,
leaving it capable of maintaining its operational
status. The paper goes on to suggest that the
computational power needed to fend off an attack
would not have to originate from systems that the
friendly server had to force into its own botnet, but
instead from the vast amounts of computing
resources at the disposal of the giant content delivery
networks. Another avenue for obtaining the
computational resources would be from volunteers
much like those of the SETI@HOME program, or
even use networks like BitTorrent to build good
phalanx botnets to stop evil botnets.
Future Trends
Tim Wilson from Information Week predicts the
following trends for botnets to take in the near future.
Concurring with the information developed from
Damballa, overall botnet activity picked up in the
latter part of 2010 and because of the recent surge in
DIY botnet kits, botnets are only predicted to
increase in their size and severity. Large botnets will
become more aggressive in their attempts to capture
more computers to command at their will, and
because of this, Wilson predicts Botnets will get to
When it comes to DDoS attacks, the best way to
fend off the attack is to fight back with greater
computational
power.
Several
cybercriminal
organizations today make vast sums of money from
online gambling sites by holding them hostage under
4
a DDoS botnet attack. There have been a few that
have come to the aid of these victims and fought back
victoriously, but without an integrated system of
good botnet computing power, the evil botnet
cybercriminals will just come back again for ransom
at another time when you cannot obtain the leased
computational power required to fend them off.
dissimilate botnet kits freely available online that are
only intended for destructive purposes, as well as the
paid for use kits. New standards for securing social
networking site should be evaluated and implemented
to fend off against the spread of botnets. And lastly,
security should become common place in ever home
at an early age, because we are all so interconnected
with the entire world today, we cannot afford to not
educate the next generation.
It would appear that the phalanx idea is exactly
what the Armed Forces has been using for years to
protect themselves from outside threats, but for how
long will even the untouchable remain free from this
rapid expansion of new botnets being developed?
Good botnets can and should be used whenever
possible to combat against evil botnets, but that is
just the start. Before our push to IPv6 there should be
a complete reworking of certain protocols and
features to prevent future IRC like botnets and others
from ever arising under this new protocol.
References
[1] Miniwatts Marketing Group. (2011). Internet
World Stats: Usage and Population Statistics.
Retrieved from http://www.internetworldstats.
com/am/us.htm
[2] U.S. Census Bureau, Population Division.
(2010). U.S. & World Population Clocks.
Retrieved from http://www.census.gov/main/ww
w/popclock.html
[3] Miniwatts Marketing Group. (2011). Internet
World Stats: The Internet Big Picture. Retrieved
from http://www.internetworldstats.com/stats.ht
m
[4] CERT Software Engineering Institute. (2011).
CERT Statistics (Historical). Retrieved from
http://www.cert.org/stats/
[5] Dictionary.com. (2011). Retrieved from http://
Dictionary.reference.com/browser/cyberwarfare?
O=100074
[6] Damballa Inc. (2011). Top 10 Botnet Threat
Report - 2010. Retrieved from http://www.
damballa.com/downloads/r_pubs/Damballa
_2010_Top_10_Botnets_Report.pdf
[7] TechTarget. (2011). Retrieved from http://
Searchsecurity.techtarget.com/sDefinition/0,,sid
_gci1405599,00.html
[8] The Free Dictionary. (2011). Retrieved from http
://www.thefreedictionary.com/cyberwar
[9] Microsoft. (2010). Microsoft Security
Intelligence Report: Volume 9. Retrieved from
http://download.microsoft.com/download/8/1/B/
81B3A25C-95A1-4BCD-88A4-2D3D0406CDE
F/Microsoft_Security_Intelligence_Report
_volume_9_Jan-June2010_ English.pdf
[10] Gehling, B., Stankard, D. (2005). eCommerce
Security. Information Security Curriculem
Development Conference ’05, ACM, 1-59593261-5/05/0009
[11] Tuutti, C., The New New Internet: The Cyber
Frontier. (2011). CACI’s Dr. Jack London on
WikiLeaks, the Insider Threat and Defining
Cyber War. Retrieved from http://www.thenew
newinternet.com/2011/02/11/cacis-dr-jacklondon-on-wikileaks-the-insider-threat-anddefining-cyber-war/
Conclusion / Future Work
Security in the future cannot be fought as it has
been today, man against programs, but instead
security should be fought with the very programs that
are used to compromise our systems. Familiarity with
the programs and tools at the disposal of our enemies
will only aid us in our future attempts to defend
ourselves against them. But in the field of security,
our stance should not always be one of defense, it
should also be one of offence at times, when it is
required. The task to take back the cyberspace which
is rightfully everyone’s, may be a task too great for
our Armed Forces, fought under current conditions.
We must learn to multiply our forces with what little
we have, and work together in this fight against evil.
The day may come that we no longer have to worry
about security because our enemies are so cut throat
with each other that they’ll implement every known
strategy at their disposal to keep their bots in their
botnets protected from competitors, but if that day
actually comes, we should all be ashamed as
professionals in the field of security. In our rapidly
expanding cyberspace, if security is not demanded
from everyone, then it is guaranteed to no one.
We should all strive in the field of security to
achieve beyond what we already have accomplished.
Research into the idea of implementing a phalanx of
friendly botnets should be furthered, or similar Bot
Security Networks (BSN’s) where the security is
controled outside vulnerable systems, and the
primary systems are seperated from external threats.
New ways to detect and overthrow botnet C&C
servers should be pursued as well as ways to
5
[12] Wikipedia. (2011). Referenced from http://en.
wikipedia .org/wiki/Web_crawler
[13] SETI. (2011). Retrieved from setiathome.
berkeley.edu/
[14] Stamm, S., Sterne, B., Markham, G. (2010).
Reining in the Web with Content Security Policy.
WWW 2010, ACM, 978-1-60558-799-8/10/04
[15] Reynolds, G. (2010). Ethics in Information
Technology 3rd Edition. Chapter 3: Computer and
Internet Crime
[16] Rapoza, J. EWeek.com. (2008). Botnets vs.
botnets: Understanding and use the tools of the
enemies to catch them.
[17] U.S. Census Bureau, Population Division.
(2010). U.S. & World Population Clocks.
Retrieved from http://www.census.gov/popest/
States/NST-ann-est2006.html
[18] U.S. Census Bureau, Population Division.
(2010). U.S. & World Population Clocks.
Retrieved from http://www.census.gov/ipc/www/
region.php
[19] WorldBank. (2011). Retrieved from http://data.
worldbank.org/indicator/IT.NET.USER/
countries?display=graph
[20] Wilson, T. Information Week. (2011). Retrieved
from http://itauditsecurity.wordpress.com/2011
/02/21/bot-net-trends/
[21] Lewis, B. (2008). Information Warfare.
Retrieved from http://www.fas.org/irp/eprint/
snyder/infowarfare.htm
[22] IWS- The Information Warfare Site. (2011).
Retrived from http://www.iwar.org.uk/
[23] Dictionary.com. (2011). Retrieved from http://
dictionary.references.com/browser/information
+warfare
[24] WordNet Search – 3.0. (2011). Retrieved from
http://wordnetweb.princeton.edu/perl/webwn?s=
information warfare
[25] Wikipedia. (2011). Retrieved from http://en.
wikipedia.org/wiki/Cyber_warfare
[26] Microsoft. (2010). Microsoft Security
Intelligence Report: Volume 8. Retrieved from
http://download.microsoft.com/download/8/1/B/
81B3A25C-95A1-4BCD-88A4-2D3D0406CDE
F/Microsoft_Security_Intelligence_Report
_volume8_July-Dec2009_ English.pdf
6
Download