Early Detection Of In-The-Wild Botnet Attacks By Exploiting Network Communication Uniformity: An Empirical Study

2017 IFIP NETWORKING CONFERENCE (IFIP NETWORKING) AND WORKSHOPS(2017)

引用 8|浏览10
暂无评分
摘要
Distributed attacks originating from botnet-infected machines (bots) such as large-scale malware propagation campaigns orchestrated via spam emails can quickly affect other network infrastructures. As these attacks are made successful only by the fact that hundreds of infected machines engage in them collectively, their damage can be avoided if machines infected with a common botnet can be detected early rather than after an attack is launched. Prior studies have suggested that outgoing bot attacks are often preceded by other "tell-tale" malicious behaviour, such as communication with botnet controllers (C&C servers) that command botnets to carry out attacks. We postulate that observing similar behaviour occuring in a synchronised manner across multiple machines is an early indicator of a widespread infection of a single botnet, leading potentially to a large-scale, distributed attack. Intuitively, if we can detect such synchronised behaviour early enough on a few machines in the network, we can quickly contain the threat before an attack does any serious damage. In this work we present a measurement-driven analysis to validate this intuition. We empirically analyse the various stages of malicious behaviour that are observed in real botnet traffic, and carry out the first systematic study of the network behaviour that typically precedes outgoing bot attacks and is synchronised across multiple infected machines. We then implement as a proof-of-concept a set of analysers that monitor synchronisation in botnet communication to generate early infection and attack alerts. We show that with this approach, we can quickly detect nearly 80% of real-world spamming and port scanning attacks, and even demonstrate a novel capability of preventing these attacks altogether by predicting them before they are launched.
更多
查看译文
关键词
early detection,in-the-wild botnet attacks,network communication uniformity,distributed attack,botnet-infected machines,large-scale malware propagation campaigns,outgoing bot attacks,malicious behaviour,botnet controllers,command botnets,widespread infection,synchronised behaviour,botnet traffic,network behaviour,multiple infected machines,botnet communication,early infection,real-world spamming,port scanning attacks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要