Title: Yan Chen
1Network-based Botnet Detection Filtering,
Containment, and Destruction
- Yan Chen
- Northwestern Lab for Internet and Security
Technology (LIST) - Dept. of Electrical Engineering and Computer
Science - Northwestern University
- http//list.cs.northwestern.edu
Motorola Liaisons Z. Judy Fu and Philip R.
Roberts Motorola Labs
2New Internet Attack Paradigm
- Botnets have become the major attack force
- Symantec identified an average of about 10,000
bot infected computers per day - of Botnets - increasing
- Bots per Botnet - decreasing
- Used to be 80k-140k, now 1000s
- More firepower
- Broadband (1Mbps Up) x 100s OC3
- More stealthy
- Polymorphic, metamorphic, etc.
- Residential users, e.g., cable modem users, are
particularly susceptible due to poor maintenance
3Birth of a Bot
- Bots are born from program binaries that infect
your PC - Various vulnerabilities can be used
- E-mail viruses
- Shellcode (scripts)
4Botnet Distribution
5Project Goal
- Understand the trend of vulnerabilities and
exploits used by the botnets in the wild - Design vulnerability based botnet detection and
filtering system - Deployed at routers/base stations w/o patching
the end users - Complementary to the existing intrusion
detection/prevention systems - Can also contain the botnets from infecting
inside machines - Find the command control (CC) of botnets and
destroy it
6Limitations of Exploit Based Signature
Signature 10.01
Traffic Filtering
Internet
Our network
X
X
Polymorphism!
Polymorphic worm might not have exact exploit
based signature
7Vulnerability Signature
Vulnerability signature traffic filtering
Internet
X
X
Our network
X
X
Vulnerability
- Work for polymorphic worms
- Work for all the worms which target the
- same vulnerability
8Emerging Botnet Vulnerability and Exploit Analysis
- Large operational honeynet dataset
- Massive dataset on the botnet scan with payload
- Preliminary analysis show that the number of new
exploits outpace the of new vulnerabilities.
9Vulnerability based Botnet Filtering/Containment
- Vulnerability Signature IDS/IPS framework
- Detect and filter incoming botnet
- Contain inside bots and quarantine infected
customer machines
10Residential Access Cable Modems
Diagram http//www.cabledatacomnews.com/cmic/diag
ram.html
Introduction
1-10
11Snort Rule Data Mining
- Exploit Signature to Vulnerability Signature
reduction ratio
PSS means Protocol Semantic Signature NetBios
rules include the rules from WINRPC, SMB and
NetBIOS protocols
12Preliminary Results
- Experiment Setting
- PC XEON 3.8GHz with 4GB memory
- Real traffic after TCP reassembly preload to
memory - Experiment Results