botnets,detectionandmitigationdns-basedtechniques:僵尸网络的基础技术,检测和缓解dns

上传人:tian****1990 文档编号:81496792 上传时间:2019-02-21 格式:PPT 页数:23 大小:259.31KB
返回 下载 相关 举报
botnets,detectionandmitigationdns-basedtechniques:僵尸网络的基础技术,检测和缓解dns_第1页
第1页 / 共23页
botnets,detectionandmitigationdns-basedtechniques:僵尸网络的基础技术,检测和缓解dns_第2页
第2页 / 共23页
botnets,detectionandmitigationdns-basedtechniques:僵尸网络的基础技术,检测和缓解dns_第3页
第3页 / 共23页
botnets,detectionandmitigationdns-basedtechniques:僵尸网络的基础技术,检测和缓解dns_第4页
第4页 / 共23页
botnets,detectionandmitigationdns-basedtechniques:僵尸网络的基础技术,检测和缓解dns_第5页
第5页 / 共23页
点击查看更多>>
资源描述

《botnets,detectionandmitigationdns-basedtechniques:僵尸网络的基础技术,检测和缓解dns》由会员分享,可在线阅读,更多相关《botnets,detectionandmitigationdns-basedtechniques:僵尸网络的基础技术,检测和缓解dns(23页珍藏版)》请在金锄头文库上搜索。

1、Botnets, detection and mitigation: DNS-based techniques,John Kristoff jtknorthwestern.edu http:/aharp.ittns.northwestern.edu +1 847 467-5878 Northwestern University Evanston, IL 60208,What is a botnet?,An army of compromised hosts (bots) Under a common command and control (c&c): commonly IRC-based T

2、he purpose: DoS, id theft, spam for fun and profit,Typical command and control,c&c functions mostly centralized one or more IRC servers DNS name(s) used for rendezvous vanity web pages for malware updates Nothing really new CERTs October 2001 Trends in DoS paper,Whats wrong with this picture?,Welcom

3、e to irc.whitehouse.gov Your host is h4x0r.0wnz.j00 There are 9556 users and 9542 invisible on 1 server 5 :channels formed 1 :operators online Channel Users Topic #help 1 #oldb0ts 5 .download http:/w4r3z.example.org/r00t.exe End of /LIST,Botnet info is everywhere,http:/www.honeynet.org/papers/bots/

4、http:/cert.uni-stuttgart.de/files/tf/botnets.pdf http:/www.educause.edu/ir/library/pdf/SPC0568.pdf http:/www.internet2.edu/presentations/jtsaltlake/ 20050214-Botnets-Moody.pdf http:/www.nanog.org/mtg-0410/kristoff.html,Some typical detection strategies,Up-to-date anti-virus software IDS signatures f

5、or IRC/botnet traffic Traffic flow monitoring (for known C&Cs?) email alerts To: securityexample.org Subject: Bot detected on your network,Some typical mitigation strategies,TCP port 6667 filtering C&C IP address (& port?) filtering Intrusion prevention systems (IDS+) Secure systems and applications

6、 Careful and smart users,What about DNS traffic?,Repetitive A queries may indicate bot/controller MX queries may indicate spam bot in-addr.arpa queries may indicate a server Usually 3 level hostname.subdomain.TLD (www|mxd+|nsd+)w+.w+.w+ Names and subdomains that just look rogue Something .edus cant

7、be blamed for! :-),Note: synchronization problem,If name doesnt resolve, but controller is up connected bots instructed to update DNS If controller(s) is(are) gone, but name resolves DNS changed to point to new controller(s) Synchronizing the closure of both is difficult,Name-based sink holes with B

8、IND,zone ““ type master; file “/etc/db.badname“; ; - $TTL 30D IN SOA . root ( 2004101700 3H 15M 1W 1D ) IN NS . IN A 192.0.2.1,Finding DNS,Someone you trust tells you Packet capture during C&C connection Bot malware analysis DNS RR and C&C address correlation Algorithmic techniques,NU DNS bot detect

9、ion overview,Maintain blacklist of botnet c&c host names Watch DNS query logs in real-time Use sampling function to reduce false positives Note: will miss stable, active botnets Import suspect querier into NUSA,Enabling DNS query logs,BIND: logging category queries logfile; ; ; Space and privacy con

10、siderations We log about 10-20 million queries/day 1-2 GB uncompressed/day Could setup logfile as a FIFO named pipe,querywatch,Get a list of known bad names no decent public list available that I know of normalize name list for querywatch config tail -f DNS log files and pipe to querywatch pipe quer

11、ywatch output to an action script http:/aharp.ittns.northwestern.edu/software/,simplified process view,tail -f $LOG|qw -c $DNSRRs| query2db # qw = querywatch init_list(); # read in DNS RRs while (defined (my $line = ) next if ($loop+ % sample); # get lc(RR) and assign to $query print $line if ($list

12、$query); ,query2db design considerations,Use logfile timestamp and a DB insert_time Create whitelist (e.g. DNS/NetPass servers) If log=Dec & systime=Jan, rollback year sanity check everything make every regex very explicit (e.g. avoid .*) note: this script is not publicly available,NU DNS bot detect

13、ion in review,Im not aware of any false positives to date Dozens of NUSA entries at any one time many duplicates due to transient addresses Mostly neutered bots, not imminent an threat Can we not sample and avoid false positives?,DNS-based detection thoughts,What names are used for rendezvous? How d

14、o bots query for the DNS RR? Is a local recursive/caching server used? What happens if the query/connection fails? When do they query for the DNS RR? Do all the bots query at once? What does the authoritative server see?,DNS thoughts. continued,What does the query answer look like? What is the TTL?

15、If an A RR, what address(es) is given? How has this answer changed over time? Related. what about whois information? Is it valid, does it change? What other RRs does the contact have?,Current DNS-related tools/research,Kristoffs anomalous name watcher correlate with known baddies, put into NUSA Mood

16、ys anomalous name watcher correlate with known baddies, put into DB Musashias mass mailing worm detection find unusual MX/PTR query spikes,DNS tools/research cont.,Whytes DNS-based detection of worms/scans correlate DNS query and traffic flows Dagons authoritative anomaly algorithms capture c&c by redirecting anomalous DNS RUS-CERTs passive DNS replic

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 高等教育 > 大学课件

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号