A Collaborative Botnets Suppression System Based on Overlay Network

1 downloads 61779 Views 1MB Size Report
+Research Institute of Information Technology (RIIT). #Department of ... His research interests on the network security and distributed system. ... network security. He is currently working toward the Bachelor degree at the Department.
A Collaborative Botnets Suppression System Based on Overlay Network Fuye Han*, and Zhen Chen+ HongFeng Xu*, Haopei Wang# and Yong Liang* *Department of Computer Science and Technologies +

Research Institute of Information Technology (RIIT)

#

Department of Automation

Tsinghua National Laboratory for Information Science and Technology (TNList) Tsinghua University, Beijing, China Email: [email protected] Abstract: Botnets are extremely versatile and are used in many network attacks, like sending huge volumes of spam or launching Distributed Denial-of-Service (DDoS) attacks. Botnets can switch their command and control server automatically, so completely suppressing botnets is a big challenge. In this paper, we present a collaborative botnets suppression system based on overlay network, which has one control center node and several suppression nodes. The suppression nodes can automatically collect network traffic and deploy suppression rules, the control center node can gather all collected data, and process these traffic data by using botnet detection algorithm. Once botnets are detected, the control center node will generate and distribute suppression rules. In order to prevent the excessive growth of the rule set, the system can automatically identify and remove invalid rules according to effective feedback. Keywords:botnet; network security; collaboration; forensics; Biographical notes: Fuye Han, Beijing, China. Birthdate: July, 1986. Graduated from PLA information Engineering University, HeNan Province, China, in 2008. Major in Information Engineering. His research interests on the network security and distributed system. He is currently working toward the Master degree at Department of Computer Science and Technology, Tsinghua University, Beijing, China. Zhen Chen,ZheJiang, Province, China. Birthdate: November, 1976. Graduated from Xidian University, Xi‘an, China, in 1998. Major in Communication and Information System. And research interests on the next generation computer network architecture. He is currently an assistant professor at Research Institute of Information Technology, Tsinghua University, Beijing, China.

Haopei Wang, Anhui Province, China. Birthdate: February, 1990. Major in Automation. And research interests on the next generation computer network architecture and network security. He is currently working toward the Bachelor degree at the Department of Automation, Tsinghua University, Beijing, China. Hongfeng Xu, GuangDong Province, China. Birthdate: January, 1987. Graduated from Beihang University, Beijing, China, in 2010. Major in Computer and Science. And research interests on the next generation computer network architecture. He is currently working toward the Master degree at the Department of Computer Science and Technology, Tsinghua University, Beijing, China. Yong Liang, AnHui Province, China. Birthdate: July, 1983. Major in Network Engineering B.E., graduated from Dept. Computer Science and Technology, PLA University of Science and Technology, Nanjing, China, in 2005. And research interests on the next generation computer network architecture, network and information security. He is currently working toward the Master degree at the Dept. Computer Science and Technology, Tsinghua University, Beijing, China.

Sun Tzu said in the Art of War, know yourself and your

1

Introduction

enemies then you will never be defeated. First of all, let’s know more about botnet.

The term 'botnet' denotes a collection of infected

There are three different types of botnets architecture,

computers connected to the Internet (also known as 'bots').

which could be centralized, distributed and hybrid. The

When a computer has been infected by Trojans or malware,

centralized botnets have one or several C&C servers, each

it becomes a member of a botnet, and will receive

bot can receive command messages from the C&C server

commands from manager of this botnet named Botmaster.

immediately, and this type is widely used in early botnets

Most of the Botmasters don’t use PC to control botnet,

because of speedy and consistent reason. However, with the

because that would be very unsafe. Instead, they find a

detection technology being increasingly accurate, the

public server to transfer commands to every bot. This server

centralized botnets encounter a deadly problem: when the

is called command and control server (C&C).

C&C server is detected and suppressed, the whole botnet

Botnets are extremely versatile and can be used in many

will be collapsed. The distributed architecture is a better

attacks, like sending huge volumes of spam or launching

choice, because it doesn’t have C&C server, every node act s

Distributed Denial-of-Service (DDoS) attacks. Especially in

as both bots and C&C server, for example, the Peer-to-Peer

China, according to the report of the CECERT/CC, about

botnet is a typical distributed botnet, which brings resiliency

47,000 IP addresses were involved as C&C server in

to botnet, and also can make researchers confused on the

controlling Chinese host and 890 million Chinese IP

really size of botnet(Evan Cooke et al. 2005). The hybrid

addresses were infected as bot in 2011. More seriously, in

architecture is widely used in advanced botnet, and has some

the same year, the DDoS attack occurs about 365 times daily,

good features, for example, the Botmaster can easily

and attacks which had less than 1Gb traffic are not counted.

monitor the entire botnet and can reorganize the entire

So we have to design a powerful and effective botnet

botnet for robust connectivity. The hybrid architecture is

suppression system.

hard to deploy and implement. In the area of communication protocol of botnet, although there are many protocols that can be used for

communication of botnet, there are two protocols be

In this paper, we present a collaborative botnets

extensively used, one is the Internet Relay Chat (IRC)

suppression system based on overlay network, which

protocol, and another is Hypertext Transport Protocol

contains a control center and a lot of suppression nodes. We

(HTTP). IRC is widely used as botnets protocol, because

use overlay technology to connect each suppression node

IRC servers are extremely popular, the Botmaster can easily

and the control center, the suppression node originally is a

find a public IRC server and use it as C&C server (Evan

Unified Threat Management (UTM) device (Ying Zhang et

Cooke et al. 2005). However, the disadvantage of IRC is

al. 2010), and we develop them to make them work together,

also obvious, once the botnet is detected, the IRC server can

and to implement collaborative botnet suppression system.

be easily found and taken down, in addition, the port of the

The control center and the suppression nodes can share

IRC protocol always run on 6667/TCP and nearby port

resource and exchange information. The suppression nodes

numbers, for example TCP ports 6660-6669, more important,

can filter packet base on rule set, and collect suspect traffic

the firewall is always very concerned with this port range. A

sending to the control center. The control center can process

better option for the Botmaster is to use HTTP for botnet

these traffic data by using botnet detection algorithm, and

protocol, because the port of HTTP is always permitted by

can also analyze rule effectiveness according to feedback.

most firewalls. A normal web server has huge HTTP traffic,

The contribution of our work has three major points.

which means that finding illegal traffic in this large data is

Firstly, we implement a botnet suppression system based on

very difficult. A typical instance that using HTTP for

overly network, which can be deployed easily and be able to

communication is ZeuS crime ware toolkit, which is a tool

simultaneously

for the construction of binaries and a graphical user interface

Secondly, we design a botnet detection algorithm which

situated on the C&C server. This allows the botnet to be

depends on network behaviors, the system is able to detect

managed with a low amount of technical skill.

botnet no matter it is in silence period or has encrypted

protect

multiple

subnets

effectively.

Some botnets detecting systems, like BotMiner, BotGrep

channel. Thirdly, we design a rule set optimization strategy

and BotMagnifier, own availability and effectiveness.

based on rule effectiveness, the control center can

However, we think detecting botnets is not enough, after the

comprehensive collect feedback to analyze and find out the

botnets have already broken out. We consider a better choice

invalid rule, it can reduce the processing pressure of

is to implement a botnet suppression system, which should

suppression nodes.

have following features.

The rest of this paper is organized as follows: related

1. The System can detect botnets, especially botnets in

work is described in Section II; Section III describes the

their silence period and botnets using encrypted channel,

architecture and workflow of the suppression system. We

which means detection algorithm must depend on botnet

describe botnet detection algorithm in Section IV.

behaviors and can infer to identify botnet.

Evaluation of system is presented in Section V. Finally, we

2. The System not only can control a local network, but

present our conclusions and future work in Section VI.

also can monitor overall network to implement collaborative defend and control. 3. The System should have flexible suppression strategy, and can both block communication channel and record suspect traffic.

2

Related Work Prior work indicates that detecting and suppressing

botnets is the key and difficult problem. There are many new

4. The System can adapt to botnet flexibly and

methods and systems implemented for the detection and

short-lived feature, and clean up rule set of system

suppression of botnets. These methods can be categorized

automatically to ensure good performance.

into two classes.

One is Honeynet-based method, and the other is based

Log based detection techniques are also effective

on passive traffic monitoring. The former, as its name

alternative. This technique focuses on log information, such

suggests, generally has many vulnerable hosts, and it is

as system log of Client, DNS query log of DNS server,

trying to attract botnet infection, and collect traffic data to

registration and operation log of mail server. Yao Zhao et al.

analyze. For example, Paule Baecher et al. present the

designed and implemented the BotGraph system (2009). The

nepenthes platform (2006). The nepenthes platform is a new

BotGraph system is based on log analysis technology, and it

kind of honeypot-based system, which is able to collect

collects account registration log and sending log from mail

large-scale

present

server. It has two main detection bases. The first is that if

HoneyBow (2007) which is based on the nepenthes platform.

one IP address has many registration behaviors, and it must

The

be bot. The second is that if one mail account login in many

malware.

HoneyBow

uses

Jianwei

Zhuge

high-interaction

et

al.

honeypots

to

implement automatic malware collection.

IP address, and it must be a SPAM account. Experiments

The latter approach is using powerful gateways to

show the BotGraph system has good accuracy and

monitor the traffic for detecting botnet. These detection

performance. However, this system needs to load into server,

methods can be further classified as signature based,

so it is relatively hard to deploy.

abnormal behavior based and log based.

In addition, there are also many heuristic works about

Signature based detection techniques need to understand

botnets suppression. Chris Kanich et al. use purchase pair

and analyze a certain botnet deeply, and then figure out its

technique to estimate SPAM revenue and demand (2010).

signature. Jan Goebel et al. designed and implemented the

This literature explains to us that why the SPAM is so

Rishi system (2007), the detection technique of Rishi system

rampant, because it can bring huge profits. Suppressing

is signature based method. Rishi can monitor IRC traffic and

botnet is hard to achieve just using technical power, it also

extract certain information, such as timestamp, source IP

need law to help. The BotMagnifier system (Gianluca

address, destination IP address and nickname. The Rishi

Stringhini et al. 2011) has a novel technique to support to

system compares that information and finds out which

identify and track botnet, they use an initial set of IP

traffic is botnet traffic. The most important problem of this

addresses that are known to be associated with bots, and use

method is the detection must be after signature generation.

these data to train sample of bots, and then this system will

Abnormal network behavior based detection techniques

find out botnet which is similar to sample. The GQ system

are widely used because they can detect unknown botnets in

(Christian Kreibich et al. 2011) is a malware execution farm,

advance. Abnormal network behavior means some special

which can analyze botnet in a safely, iteratively and

network behavior, which occurs rarely in normal network

naturally environmental. More surprising is that Brett

environment, such as port scanning, DDoS attack and so on.

Stone-Gross et al. hijack C&C server and then take over a

Guofei Gu et al. designed the BotMiner system (2008),

real botnet (2009).

which is based on their prior work the BotHunter (Guofei

The above mentioned works are very excellent and

Gu et al. 2007) system and BotSniffer (Guofei Gu et al.

valuable so that many points of our work are inspired by

2008). The BotMiner system uses two layers to process

them.

network traffic. One layer is used to monitor some abnormal behavior by processing activity log, such as port scanning, SPAM, binary downloading and exploitation. Another layer

3

System Design and Implementation

is to record traffic. Finally, the BotMiner system will

The architecture of our system is distributed and consists

process these data comprehensively. Experiments show that

of one central control node and several suppression nodes, as

the system is able to detect unknown botnet effectively,

illustrated in Figure 1.

including the IRC-based and HTTP-based botnet.

The control center module is the brain of this system,

Suppression node 1

Suppression node 2

Suppression node 3

Suppression node 4

Security module

and it has three functional modules, the feedback module,

Recording module

the detection module and the communication module. The

Conmmunication module

communication module of the control center is different

Suppression node 4

from the suppression nodes, it can collect traffic from all suppression nodes and distribute rules to all the suppression nodes. The detection module is used for processing traffic, we develop a botnet detection algorithm based on network

Feedback module

Detection module

Communication module

Control center Figure 1. The system architecture

behavior, and we will describe this algorithm in section IV. When a botnet is detected, the detection module will generate rules to suppress this botnet, and the rule is based on IP address and communication port. The feedback module can monitor rule set of system, and find out invalid

In Figure 1, we can see our system has a control center,

rules to remove them. Because botnets are not available all

which has three modules. The control center connects with

the time, they also have their life time (Jianwei Zhuge et al.

four suppression nodes. The suppression node is based on

2007). The suppression system will accumulate super

the UTM system (Ying Zhang et al. 2010), which can cover

abundant rules and some of them are invalid in fact, the

many bases, for example, anti-virus, anti-spyware, intrusion

feedback module can resolve this problem. It collects rule

prevention, content filtering, application blocking and so on,

effectiveness feedback from all suppression nodes, and uses

we call these function modules security modules. As a

these feedbacks to find out invalid rules.

suppression node, it has two new functional modules which is the recording module and the communication module, and they are developed based on some high quality open source

Control center node

3

applications, for example, TIFA (Jun Li et al. 2011) and

2

Internet

JXTA (Daniel Brookshier, et al. 2002). The security module

4

is use to filter and block network traffic, most of them are based on rule set, for example, firewall and protocol filter. The control center will generate and distribute new rules,

5 Suppression Nod 1

SN 4

SN 2

SN 3

1

and the security module will execute them. The recording module is used to record traffic and forwards them to the control center. It can be configured to record all of the traffic or partial traffic of each session, this module uses

Internal Network 1

Internal network 2

Internal network 3

Internal network 4

Figure 2. The workflow of botnet suppression system.

technology of TIFA (Jun Li et al. 2011). TIFA is a real-time

Figure 2 is the workflow of botnet suppression system.

querying and storage of massive stream data system, which

There are four major steps in workflow. The step 1 indicates

is implemented by integrating the Time Machine application

the suppression node sending traffic data to control center

and the FastBit database (Jun Li et al. 2011). The

node. This step has a very serious problem, which is when

communication module makes suppression node exchange

the suppression node continuously sends data to the control

information and update with each other, the most important

center, and it will affect the quality of service (QoS) of the

function is that it makes suppression node send traffic to the

entire network. By observing the real network, we found that

control center.

the traffic load of real network has certain regularity, which is shown in Figure 3.

Field Name

Example

TrafficBlocker

1 or 0

Protocol

TCP UDP or any

SrcAddress

192.168.1.2/192.168.*.* or any

DstAddress

22.11.33.44 22.11.33.1-254

Figure 3. The traffic load of real network

SrcPort

80 or any

The Figure 3 shows an office network traffic load

DstPort

6667 or any

Description

This is a bot

situation, we can see the traffic load always be heavy from 8:00 until 18:00, and it will turn to light in the middle night.

The format of rules has seven fields, TrafficBlocker field

We set our system to send traffic data in the middle night,

means that the rule is used to block and records the matched

and the QoS will not be impacted. The traffic recording

traffic or only records it. Protocol field can classify the

module has two record modes can be set by manual, and it

traffic into three kinds: TCP, UDP or any. The following

depends on the network load situation. When the traffic load

four fields specify the details of the packets, the source and

is light, the recording module can be set to record all the

destination addresses, the source port and destination port.

traffic; when the load of network is heavy, it can be set to

The final field is used to mark the rules, this description will

just record the first 10-20 KB of each connection. However,

facilitate administer to read them.

this header should contain the essential information (Gregor Maier et al. 2008).

The fourth step is collecting feedback, and it is about the effectiveness of rules. According to these feedbacks we load

The step 2 means the control center is processing data.

a property to every rule of the rule set, which is lifetime. If

There are two modules can process data, one module is used

one rule takes effect and system will refresh its lifetime,

for botnet detecting and another is used for filtering out

contrary if one rule does not take effect, its lifetime will

invalid rules. The algorithm of botnet detection will be

decreasing. When lifetime of one rule is expired, it will be

described in section IV. The part of filtering out invalid rules

regarded as invalid rules by system, and then it will be

is very innovative, and we will explain it combined with the

removed. The purpose of this way is to reduce the number of

step 4 in the next. When botnet detection module finds out

rule set and makes suppression node achieve good

botnet, it will generate a suppression rule. In addition, we

performance. The feedback is a series of messages about

have known that traffic data must be huge (Chris Kanich et

suppression rule in action, as illustrated in Table 2.

al. 2008), and it is very challenging to process the data in real time. We resolve this problem using our previous work which is LARX (Tianyang Li et al. 2010). LARX is a cloud computing platform that can process multiple tasks in parallel. Based on LARX platform, our system is able to process huge data. The step 3 is distributing suppression rules. When the control center detects the existence of a botnet, it will produce a rule to suppress it. The suppression rule is formatted by the JavaScript Object Notation (JSON), as illustrated in Table 1. TABLE 1. THE FORMAT OF THE RULES

TABLE 2. A FEEDBACK MESSAGE OF A SUPPRESSION RULE Field Name

Example

Timestamp

2012-02-01 22:10:12:456

Protocol

TCP or UDP

SrcAddress

192.168.1.2

DstAddress

59.77.172.20

SrcPort

80 or any

DstPort

6667 or any

Description

Describe of rule

LogID

Name of rule

Type

Firewall/protocol filter

The feedback is constructed like the format of a

Figure 4 show the suppression node A wants to establish

suppression rule, except for time stamp field. The feedback

connection with the suppression node B, node A sends

can show which rule has indeed taken effect. The system can

request to node B, this request contains certificate of node A,

analyze these information, expect for invalid rules, this

and then node B asks control center to identify this

information can help us to understand botnet.

certificate, after identification succeeds node A will establish

At the fifth step, the suppression nodes update data with

connection with node B.

each other using P2P technology. In general, the UTM devices have many data need to update, such as virus database of anti-virus, the feature database of intrusion

4

The Botnet Detection Algorithm

prevention. Using traditional mode, which is one server

Our botnet detection algorithm is based on the feature

distributes to all nodes, will causes serious transmission

of botnet behavior. Generally, botnet's behavior can be

delay. We choose using P2P technology so that all

divided into three types, which contain propagation

suppression nodes served as both data distributor and data

behavior, control behavior and aggressive behavior.

subscriber. The implementation is each suppression node

Propagation behavior has an obvious feature, early botnet

broadcasts updating request regularly. The updating request

spread bot mainly by host vulnerability scanning described

contains a rule set version, when some node received older

by literature (Jan Goebel et al. 2007). This behavior can be

version request, it will request to establish connection with

very accurately detected through detecting scanning

this older version owner. In this way, system can update a

behavior. The latest botnet has become more advanced

new version rule set quickly.

means of propagation, such as using e-mail attachment with

In order to ensure the safety and reliability of

malicious software, or using social engineering techniques to

transmission channel we design a secure transport protocol

push out malicious web site and malicious mails, this mode

for our system based on collaborative network security

of propagation is hard to be detected. Aggressive behavior

management system (Beipeng Mu et al. 2011) and

mostly have more significant feature, and it will cause

UTM-CM system (Ying Zhang et al. 2010). The protocol is

network load suddenly change, such as DDOS attack and

based on certificate. When administrator deploys a new

SPAM, most of network security systems can alarm such

suppression node, this suppression node will send public key

behavior accurately.

as registration request to control center node firstly, the

Control behavior is relatively covert, because this

control center node responses a certificate. Establishing

behavior needn’t execute repeatedly, and it will not cause

transmission channel need authentication, which is shown in

network load. When the botnet is in silence period, it only

Figure 4.

has control behavior, and almost no aggressive behavior and propagation behavior. Traditional detection algorithms Control Center

based on behavior mostly focus on obvious feature, which

sy

Suppression Node A

4、connection established 1、request

y tif en te id fica 2、 erti c



fo in n a- tio et a m oniz 3 、 ch r n sy

3 n c me hr ta o n -i iza nfo tio n

contains aggressive behavior and propagation behavior. We think traditional detection algorithm will miss some botnets, which are in silence period. In this paper, we present a new botnet detection Suppression Node B

algorithm based on network behavior. This algorithm is able to effectively detect botnets, and especially botnets are in silence period. First of all, we explain control behavior in

Figure 4. The authentication process

Figure 5.

Time

Bot

Botmaster

T Bot Target

C&C Server A

T+W

Bot

C&C Server B

Bot Figure 5. The control behavior

Figure 5 shows us a botnet sample, and there are four Bots and two C&C servers. The Botmaster transmits message to bots through C&C server. Generally, C&C

Figure 7. The sliding window model

server sends command or control message to all bots

Figure 7 shows the sliding window model, which it is

simultaneously, and all bots will also reply to C&C server

used to define the concept of simultaneity. All packets are

simultaneously. Our botnet detection algorithm focuses on

sorted as timeline firstly. Then the system sets a sliding

this communication model, which is one host communicates

window. The sliding window begins at the time T and

to multiple local hosts simultaneously and these local hosts

finishes at the time T + W. The time interval W is the width

will reply simultaneously. We regard this communication

of the window. The sliding window can slide according to

model as suspect object.

the fixed length by the end of timeline. In the same window,

The flow chart of our botnet detection algorithm is showed in Figure 6.

the system can find the suspect object. The detecting of the suspect object is shown in Figure 8. SRC_IP

DES_IP

SRC_IP

DES_IP

undecided Traffic one

Suspect compare benign

Remove Suspect Object

Suspect Object Queue Traffic two

Preprocessing

A

1

A

1

B

2

B

2

C

3

C

3

D

4

D

4

E

5

E

5

botnets

Generate rules

Traffic three

Detect Suspect Object

Figure 6. The flow chart of botnet detection algorithm

Figure 6 shows the flow chart of botnet detection

Figure 8. The sample of suspect object

algorithm, which is based on network behavior. There are

Figure 8 has two columns. The left column shows a

three major steps. The first step is data preprocessing, which

remote address sending packets to several local addresses,

is used to merge traffic data into the same timeline. In

and the right column shows several local addresses sending

addition, since this suppression system is a distribution

packets to the remote address. Because all of these packets

system, we design a clock synchronization mechanism for

are belong to the same window, we can observe some

this system. We load this clock server to the control center to

suspect objects from this behavior. Our botnet detection

ensure that each node in the system has the same clock.

algorithm extracts out all suspect objects from data, and

The second step is suspect object detecting. In this step

saves them into a suspect object queue. If a new suspect

a sliding window model is used to process data. The sliding

object is similar to an existing suspect object in the queue,

window model is illustrated as shown in Figure 7.

our algorithm will merge the two suspect objects into one

and save it into the queue. It is a purpose to ensure that all

inevitably leads some users to communicate with the server

suspect objects in the queue are completely different. Figure

at a same time. However this communication seems not so

9 provides four samples of similar suspect objects.

regular.

1

1 A

A

2

Similar to

2

A

A

2

or

3

3

1

1

2

Similar 2 to 3

A B

A

2

Similar to

2

A or

4

3

which are botnet, benign and undecided object. If the network behavior of a suspect object is regular enough, our algorithm will affirm this suspect object as a botnet. If the behavior is random enough, it will be affirmed as a benign.

1

1

B

2

3

or

3

Similar to

or

B

A

The result of suspect comparing has three categories,

1

1

B

4

If it is an undecided object, it means our algorithm needs more data for its judgment. And the suspect object will be remained in the suspect queue and waited for further processing.

Figure 9. The similar suspect objects By continuously collecting and processing the traffic data, the data of suspect objects will become more and more. Our algorithm will execute the last step, which is suspect

5

Evaluation In this section, we evaluate the performance of our

comparing. Actually, as long as a new data is saved into the

collaborative

suspect queue, the comparison module will execute. The

environment is built by using five physical machines which

suspect comparing is a series behavior comparing. We mean

have Intel Core 2 Quad Processor (CPU 3GHz, 2MB cache,

the comparing will check all of the hosts of suspect objects,

1.333GHz FSB), double channel 4GB DDR3, Intel G41 and

and calculate the similarity of the behavior of those hosts.

ICH7R chipset, and Intel 82574L NIC. One machine is used

For

communication

as the control center. Two machines are used as the

frequency and content relevancy. We call this similarity as

suppression node to execute orders. The rest are used as the

suspiciousness. Actually, most of the internet applications

ESX servers. On these ESX servers, we install four virtual

have the similar features of network behavior, but some

machines, which have the operation system as Windows XP

features of them are a little different, as shown in Figure 10.

sp2 and install many malware to act as bots. A Botmaster

example,

the

behavior

consists

malicious

botnets

suppression

system.

Our

test

controls these bots. The diagram of test bed is shown in Figure 11.

benign

users Central control node

Terminal node ESX server Group one Router users

Figure 10. The comparision of malicous and benign Terminal node

Figure 10 shows two suspect objects, the malicious one has considerably behavior similarity, and the benign one seems a little random. This is because some well-known internet applications always have a large number of users. It

ESX server Group two

Figure 11. The test bed for botnet detection

Internet

As shown above, there are two groups in our

our test bed network, we install 20 different bots on the

experiment. Each of them is composed of three components:

virtual machines of ESX server. The system is set to upload

ESX server, user and the suppression node. It is proposed to

data in every 5 minutes. Firstly, we use one ESX server, this

not only simulate a real network environment but also bring

server is in one group, and the system detects 20 bots in

the real bots into our test bed. Our test starts at 8:00 AM and

about 45 minutes. For comparison, we use two ESX servers

ends at 10:00 PM, the recording module of all suppression

and two groups in another test, each group has one ESX

nodes is set to record the entire traffic. The results are shown

server, and the system detects 20 bots in just about 30

in Table 3.

minutes. This means that with more collection of data, we can detect botnets more quickly. The detail of test is shown TABLE 3. THE RESULT OF PROCESS

in Figure 5.

Group

Data Size

Process time

Result

Group A

6845MB

124s

46

Group B

2908MB

98s

14

Group A + B

9753MB

164s

54

The results in the Table 3 shows that A group gets 46 different rules and B group gets 14 different rules. By comprehensive comparison of the results in A and B, we obtain only 54 different rules. These rules are distributed to the two suppression nodes. We continue to gather feedback Figure 13. The result of Comparing

of one day, Figure 12 shows the results of the feedback.

In Figure 5, we can see the sharing of information is very important. In other words, this means with more collection of data, our system can detect botnets faster. 6.

Conclusion and Future Work Suppressing botnets is a big challenge as the botnet

rapidly evolves into new variants, and the detection of botnet is quite difficult from the botnet conceals its behavior adaptively. In this paper we design and implement a collaborative botnets suppression system. This system is Figure 12. The feedback in one day

based on an overlay network, and it enables every security

The feedback means the effectiveness of rule. As long

node of system to share information, and provides more

as a rule takes effect, the number of feedbacks will increases

comprehensive evidence to identify botnets. Our system can

by 1. As we can see in Figure 4, for each group, the actual

use feedback mechanism to improve performance, which is

number of rules in effect is more than the number of rules

a very important advantage of our system. In addition, we

obtained above, which means that within each group, a

design a novel botnet detection algorithm which is based on

number of existing bots are lost. Our system will solve the

the network behavior, and it is able to detect silence botnet

problem by analyzing the feedback. In other words, we have

because of the use of behavior comparison in this algorithm.

compensation for the difference. In addition, we found our

In the future work, we will further improve the

system has a good speed performance of bots detection. In

performance and accuracy of this system. We will use

feedback to build botnet communication model and reduce false positives of algorithm through model matching. In addition, we will attempt to implement multiple detection methods working in parallel, it will effectively reduce false negative of algorithm.

Acknowledgment This work is supported by Ministry of Science and Technology of China under National 973 Basic Research Program

Grant

2012CB315801,

No.2011CB302805, and

China

NSFC

Grant A3

No.

Program

(No.61161140320).

References Evan Cooke, Farnam Jahanian, Danny McPherson, The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. ACM USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet SRUTI (2005), Volume 7, Pages: 39-44. Chris Kanich, Nicholas Weavery Damon McCoy, Tristan Halvorson, et al. Show Me the Money: Characterizing Spam-advertised Revenue. USENIX Association Security Symposium (2011). Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross et al.. BotMagnifier: Locating Spambots on the Internet. USENIX Association Security Symposium (2011). Christian Kreibich, Nicholas Weaver, Chris Kanich, Wedong Cui, and Vern Paxson, Practical Containment for Measuring Modern Malware Systems, the Internet Measurement Conference 2011. Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, Giovanni Vigna, Your Botnet is My Botnet: Analysis of a Botnet Takeover. The 16th ACM conference on Computer and communications security CCS 2009. Pages: 635-648. Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee, Menlo Park. Bothunter: Detecting malware infection through ids-driven dialog correlation. USENIX Association Security Symposium (2007). Guofei Gu, Junjie Zhang, Wenke Lee.BotSniffer: Detecting botnet command and control channels in network traffic.

16th Annual Network & Distributed System Security Symposium 2008, Pages: 1-24. Jan Goebel, Thorsten Holz. Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation. First Workshop on Hot Topics in Understanding Botnets 2007. Beipeng Mu, X Chen, Zhen Chen. A Collaborative Network Security Management System in Metropolitan Area Network. Communications and Mobile Computing 2011. Ying Zhang, Fachao Deng, Zhen Chen, Yibo Xue, Chuang Lin. UTM-CM: A Practical Control Mechanism Solution for UTM System. Communications and Mobile Computing 2010. Pages: 86-90. Jun. Li, Shuai Ding, Ming Xu, Fuye Han and Zhen Chen. TIFA: Enabling Real-Time Querying and Storage of Massive Stream Data. The second International Conference on Networking and Distributed Computing 2011. Gregor Maier, Robin Sommer, Holger Dreger, Vern Paxson.Enriching network security analysis with time travel. SIGCOMM 2008.Volume: 38, Issue: 4, Pages: 183-194. Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M Voelker, Stefan Savage. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. USENIX Workshop on LEET 2008. Pages: 1-9. Tianyang Li, Fuye Han, Shuai Ding and Zhen Chen. LARX: Large-Scale Anti-Phishing by Retrospective Data-Exploring Based on a Cloud Computing Platform. The International Conference on Computer Communications and Networks 2011. Daniel Brookshier, Darren Govoni, Navaneeth Krishnan, Juan Carlos Soto, JXTA:Java P2P Programming, 2002. Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou. Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. Sixth International Conference on Information Communications and Signal Processing. Pages: 438-451. Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif. The nepenthes platform: An efficient approach to collect malware. Computer Science 2006.Pages: 165-184. Guofei Gu , Roberto Perdisci , Junjie Zhang , Wenke Lee, BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection, the 17th Conference on Security Symposium 2008, Pages: 139-154. Yao Zhao, Yinglian Xie, Fang Yu, Qifa Ke, Yuan Yu, Yan Chen, Eliot Gillum, BotGraph: large scale spamming botnet detection, the 6th USENIX symposium on Networked systems design and implementation 2009, Pages: 321-334.

Suggest Documents