• No results found

A General-purpose Laboratory for Large-scale Botnet Experiments

N/A
N/A
Protected

Academic year: 2021

Share "A General-purpose Laboratory for Large-scale Botnet Experiments"

Copied!
44
0
0

Loading.... (view fulltext now)

Full text

(1)

© Fraunhofer FKIE

A General-purpose Laboratory for

Large-scale Botnet Experiments

Cyber Defense

Thomas Barabosch, Sebastian Eschweiler, Mohammad Qasem, Daniel

(2)

© Cyber Defense Research Group, Fraunhofer FKIE

2

http://images.techhive.com/images/article/2013/04/botnet-100034898-orig.jpg

(3)

© Cyber Defense Research Group, Fraunhofer FKIE

3

http://michaelhyatt.com/wp-content/uploads/2009/06/the-wow-is-in-the-details1.jpg

(4)

© Cyber Defense Research Group, Fraunhofer FKIE

4

http://www.doc.govt.nz/pagefiles/58827/big-picture-223.jpg

(5)

© Cyber Defense Research Group, Fraunhofer FKIE

5

Botnet Analysis Approaches

Mathematical modelling

Stochastic simulation

Real world data analysis

(6)

© Cyber Defense Research Group, Fraunhofer FKIE

6

Reasons for us to design a new laboratory

Previous work already exists, e.g. Deter or SecSI/LHS labs

Need for own laboratory due to confidentiality requirements

Complementary analysis to our in-house reverse engineering process

(7)

© Cyber Defense Research Group, Fraunhofer FKIE

7

Design of our Botnet Analysis Laboratory

(8)

© Cyber Defense Research Group, Fraunhofer FKIE

8

Design Criteria

Design criteria based on Calvet et. Al, “Isolated virtualised clusters:

testbeds for high-risk security experimentation and training

Security

Scale

Realism

Flexibility

Sterilizability

(9)

© Cyber Defense Research Group, Fraunhofer FKIE

9

Architectural key aspects

Realistic simulation of selected parts of the Internet

Total isolation of the laboratory

(10)

© Cyber Defense Research Group, Fraunhofer FKIE

(11)

© Cyber Defense Research Group, Fraunhofer FKIE

(12)

© Cyber Defense Research Group, Fraunhofer FKIE

(13)

© Cyber Defense Research Group, Fraunhofer FKIE

(14)

© Cyber Defense Research Group, Fraunhofer FKIE

14

Network nodes

(15)

© Cyber Defense Research Group, Fraunhofer FKIE

16

(16)

© Cyber Defense Research Group, Fraunhofer FKIE

17

Architectural key aspects

Realistic simulation of selected parts of the Internet

Total isolation of the laboratory

(17)

© Cyber Defense Research Group, Fraunhofer FKIE

18

(18)

© Cyber Defense Research Group, Fraunhofer FKIE

19

(19)

© Cyber Defense Research Group, Fraunhofer FKIE

20

(20)

© Cyber Defense Research Group, Fraunhofer FKIE

21

(21)

© Cyber Defense Research Group, Fraunhofer FKIE

22

(22)

© Cyber Defense Research Group, Fraunhofer FKIE

23

(23)

© Cyber Defense Research Group, Fraunhofer FKIE

24

Architectural key aspects

Realistic simulation of selected parts of the Internet

Total isolation of the laboratory

(24)

© Cyber Defense Research Group, Fraunhofer FKIE

25

Using our Botnet Analysis Labratory

(25)

© Cyber Defense Research Group, Fraunhofer FKIE

26

Setting up an experiment: infrastructure

Select network-template and VM templates

Experimenter can also provide his own templates

In case additional infrastructure is needed

Provide entities

(26)

© Cyber Defense Research Group, Fraunhofer FKIE

27

Setting up an experiment: information gathering

Network-based sensors

Choose routers that should capture network traffic

Easy adjustment using BPF syntax

Host-based sensors

(27)

© Cyber Defense Research Group, Fraunhofer FKIE

28

Setting up an experiment: roll out

Once properly configured: roll it out!

Initial setup time

32 VMs ~ 50 minutes

512 VMs ~ 7 hours

(28)

© Cyber Defense Research Group, Fraunhofer FKIE

(29)

© Cyber Defense Research Group, Fraunhofer FKIE

30

(30)

© Cyber Defense Research Group, Fraunhofer FKIE

31

What is Citadel?

Zeus

(31)

© Cyber Defense Research Group, Fraunhofer FKIE

32

Communication with C&C server

DNS

1

Citadel bot

2

3

4

CnC server

11.22.33.44

(32)

© Cyber Defense Research Group, Fraunhofer FKIE

33

Countermeasure

Takedown via domain replacement

DNS

CnC server

2

Citadel bot

3

55.66.77.88

4

DNS entry

citadel-cnc.com ->

11.22.33.44

Sinkhole

1

citadel-cnc.com ->

55.66.77.88

11.22.33.44

What shall I do?

(33)

© Cyber Defense Research Group, Fraunhofer FKIE

34

(34)

© Cyber Defense Research Group, Fraunhofer FKIE

35

(35)

© Cyber Defense Research Group, Fraunhofer FKIE

36

(36)

© Cyber Defense Research Group, Fraunhofer FKIE

(37)

© Cyber Defense Research Group, Fraunhofer FKIE

38

Architectural key aspects

Realistic simulation of selected parts of the Internet

Total isolation of the laboratory

Total observability within the laboratory

secure analysis of malware

(38)

© Cyber Defense Research Group, Fraunhofer FKIE

39

(39)

© Cyber Defense Research Group, Fraunhofer FKIE

40

Countermeasure

Takedown via domain replacement

DNS entry

citadel-cnc.com ->

11.22.33.44

citadel-cnc.com ->

55.66.77.88

Malicious DNS entry is replaced by benign DNS entry at certain point in

time

(40)

© Cyber Defense Research Group, Fraunhofer FKIE

(41)

© Cyber Defense Research Group, Fraunhofer FKIE

42

Architectural key aspects

Realistic simulation of selected parts of the Internet

Total isolation of the laboratory

Total observability within the laboratory

secure analysis of malware

(42)

© Cyber Defense Research Group, Fraunhofer FKIE

43

(43)

© Cyber Defense Research Group, Fraunhofer FKIE

44

Conclusion & Outlook

Presentation of a general-purpose laboratory for large-scale botnet

experiments

Realistic simulation of selected parts of the Internet

Total isolation of the laboratory

Total observability within the laboratory

Future work

Integration of bare-metal machines

(44)

© Cyber Defense Research Group, Fraunhofer FKIE

References

Related documents

Значительная часть рНк, в том числе длинные некодирующие рНк (long non-coding RNA; lncRNA), выступают в роли сигнальных молекул, навигационных систем и

Consider what John in Doing what the judge orders would find were he to look at the Code of Ethics of the National Association of Social Workers to help him determine what he ought

Serial visual field testing also showed progression of visual field defects bilaterally despite a stable optic nerve head appearance on examination (Figure 2B).. On the 4 th day

occurs after the corrosion products having filled the porous zone and results in the cracks of structures.. model presumed that before the internal tensile

These physical accounts as well as our work aim at integrating the structure and function of the financial economy (as described by the national IO tables) with other