Title: Modeling and Measuring Botnets
1Modeling and Measuring Botnets
- David Dagon, Wenke Lee
- Georgia Institute of Technology
- Cliff C. Zou
- Univ. of Central Florida
- Funded by NSF CyberTrust Program, 2006
2Outline
- Motivation
- Diurnal modeling of botnet propagation
- Botnet population estimation
- Botnet threat assessment
3Motivation
- Botnet becomes a serious threat
- Not much research on botnet yet
- Empirical analysis of captured botnets
- Mainly based on honeypot spying
- Need understanding of the network of botnet
- Botnet growth dynamics
- Botnet (on-line) population, threat level
- Well prepared for next generation botnet
4Outline
- Motivation
- Diurnal modeling of botnet propagation
- Botnet population estimation
- Botnet threat assessment
5Botnet Monitor Gatech KarstNet
attacker
- A lot bots use Dyn-DNS name to find CC
CC
CC
cc1.com
- KarstNet informs DNS provider of cc1.com
- Detect cc1.com by its abnormal DNS queries
bot
bot
bot
- DNS provider maps cc1.com to Gatech sinkhole (DNS
hijack)
- All/most bots attempt to connect the sinkhole
6Diurnal Pattern in Monitored Botnets
- Diurnal pattern affects botnet propagation rate
- Diurnal pattern affects botnet attack strength
7Botnet Diurnal Propagation Model
- Model botnet propagation via vulnerability
exploit - Same as worm propagation
- Extension of epidemic models
- Model diurnal pattern
- Computers in one time zone ? same diurnal pattern
- Diurnal shaping function ?i(t) of time zone i
- Percentage of online hosts in time zone i
- Derived based on the continuously connection
attempts by bots in time zone i to Gatech
KarstNet
8Modeling Propagation Single Time Zone
of online infected
of infected
of vulnerable
of online vulnerable
Diurnal pattern means
removal
Epidemic model
Diurnal model
9Modeling Propagation K Multiple Time Zones
(Internet)
- Limited ability to model
- non-uniform scan
10Validation Fitting model to botnet data
- Diurnal model is more accurate than traditional
epidemic model
11Applications of diurnal model
- Predict future botnet growth with monitored ones
- Use same vulnerability? ? have similar ?(t)
- Improve response priority
Released at different time
12Outline
- Motivation
- Diurnal modeling of botnet propagation
- Botnet population estimation
- Botnet threat assessment
13Population estimation I Capture-recapture
of observed (two samples)
Botnet population
of observed in both samples
- How to obtain two independent samples?
- KarstNet monitors two CC for one botnet
- Need to verify independence with more data
- Study how to get good estimation when two samples
are not independent - KarstNet honeypot spying
- Guaranteed independence?
14Population estimation II DNS cache snooping
- Estimate of bots in each domain via DNS queries
of CC to its local DNS server - Non-recursive query will not change DNS cache
Cache TTL
.
Time
If queries inter-arrival time is exponentially
distributed, then Ti follows the same exp.
distr. (memoryless)
Query rate/bot
15Outline
- Motivation
- Diurnal modeling of botnet propagation
- Botnet population estimation
- Botnet threat assessment
16Basic threat assessment
- Botnet size (population estimation)
- Active/online population when attack (diurnal
model) - IP addresses of bots in botnets
- Basis for effective filtering/defense
- KarstNet is a good monitor for this
- Honeypot spying is not good at this
- Botnet control structure (easy to disrupt?)
- IPs and of CC for a botnet?
- P2P botnets?
17Botnet attack bandwidth
- Bot bandwidth Heavy-tailed distribution
- Filtering 32 of bots cut off 70 of attack
traffic - How about bots bandwidth in term of ASes?
- If yes, then contacting top x of ASes is enough
for a victim to defend against botnet DDoS attack