Modeling and Measuring Botnets - PowerPoint PPT Presentation

1 / 17
About This Presentation
Title:

Modeling and Measuring Botnets

Description:

Percentage of online hosts in time zone i. Derived based on the continuously ... K Multiple Time Zones (Internet) Limited ability to model. non-uniform scan ... – PowerPoint PPT presentation

Number of Views:75
Avg rating:3.0/5.0
Slides: 18
Provided by: csU73
Learn more at: http://www.cs.ucf.edu
Category:

less

Transcript and Presenter's Notes

Title: Modeling and Measuring Botnets


1
Modeling and Measuring Botnets
  • David Dagon, Wenke Lee
  • Georgia Institute of Technology
  • Cliff C. Zou
  • Univ. of Central Florida
  • Funded by NSF CyberTrust Program, 2006

2
Outline
  • Motivation
  • Diurnal modeling of botnet propagation
  • Botnet population estimation
  • Botnet threat assessment

3
Motivation
  • Botnet becomes a serious threat
  • Not much research on botnet yet
  • Empirical analysis of captured botnets
  • Mainly based on honeypot spying
  • Need understanding of the network of botnet
  • Botnet growth dynamics
  • Botnet (on-line) population, threat level
  • Well prepared for next generation botnet

4
Outline
  • Motivation
  • Diurnal modeling of botnet propagation
  • Botnet population estimation
  • Botnet threat assessment

5
Botnet Monitor Gatech KarstNet
attacker
  • A lot bots use Dyn-DNS name to find CC

CC
CC
cc1.com
  • KarstNet informs DNS provider of cc1.com
  • Detect cc1.com by its abnormal DNS queries

bot
bot
bot
  • DNS provider maps cc1.com to Gatech sinkhole (DNS
    hijack)
  • All/most bots attempt to connect the sinkhole

6
Diurnal Pattern in Monitored Botnets
  • Diurnal pattern affects botnet propagation rate
  • Diurnal pattern affects botnet attack strength

7
Botnet Diurnal Propagation Model
  • Model botnet propagation via vulnerability
    exploit
  • Same as worm propagation
  • Extension of epidemic models
  • Model diurnal pattern
  • Computers in one time zone ? same diurnal pattern
  • Diurnal shaping function ?i(t) of time zone i
  • Percentage of online hosts in time zone i
  • Derived based on the continuously connection
    attempts by bots in time zone i to Gatech
    KarstNet

8
Modeling Propagation Single Time Zone
of online infected
of infected
of vulnerable
of online vulnerable
Diurnal pattern means
removal
Epidemic model
Diurnal model
9
Modeling Propagation K Multiple Time Zones
(Internet)
  • Limited ability to model
  • non-uniform scan

10
Validation Fitting model to botnet data
  • Diurnal model is more accurate than traditional
    epidemic model

11
Applications of diurnal model
  • Predict future botnet growth with monitored ones
  • Use same vulnerability? ? have similar ?(t)
  • Improve response priority

Released at different time
12
Outline
  • Motivation
  • Diurnal modeling of botnet propagation
  • Botnet population estimation
  • Botnet threat assessment

13
Population estimation I Capture-recapture
of observed (two samples)
Botnet population
of observed in both samples
  • How to obtain two independent samples?
  • KarstNet monitors two CC for one botnet
  • Need to verify independence with more data
  • Study how to get good estimation when two samples
    are not independent
  • KarstNet honeypot spying
  • Guaranteed independence?

14
Population estimation II DNS cache snooping
  • Estimate of bots in each domain via DNS queries
    of CC to its local DNS server
  • Non-recursive query will not change DNS cache

Cache TTL
.
Time
If queries inter-arrival time is exponentially
distributed, then Ti follows the same exp.
distr. (memoryless)
Query rate/bot
15
Outline
  • Motivation
  • Diurnal modeling of botnet propagation
  • Botnet population estimation
  • Botnet threat assessment

16
Basic threat assessment
  • Botnet size (population estimation)
  • Active/online population when attack (diurnal
    model)
  • IP addresses of bots in botnets
  • Basis for effective filtering/defense
  • KarstNet is a good monitor for this
  • Honeypot spying is not good at this
  • Botnet control structure (easy to disrupt?)
  • IPs and of CC for a botnet?
  • P2P botnets?

17
Botnet attack bandwidth
  • Bot bandwidth Heavy-tailed distribution
  • Filtering 32 of bots cut off 70 of attack
    traffic
  • How about bots bandwidth in term of ASes?
  • If yes, then contacting top x of ASes is enough
    for a victim to defend against botnet DDoS attack
Write a Comment
User Comments (0)
About PowerShow.com