Garlic: A Distributed Botnets Suppression System

6 downloads 45188 Views 661KB Size Report
Email: {hfy10, xhf10, ly10}@mails.tsinghua.edu.cn. Zhen Chen. Research Institute ... This system can automatically collect network traffic resulted from the botnet ...
Garlic: A Distributed Botnets Suppression System Fuye Han, HongFeng Xu and Yong Liang

Zhen Chen

Department of Computer Science and Technologies

Research Institute of Information Technology (RIIT)

Tsinghua University

Tsinghua University

Beijing, China

Beijing, China

Email: {hfy10, xhf10, ly10}@mails.tsinghua.edu.cn

Email: [email protected]

Abstract-Botnets are extremely versatile and can be used for

Thirdly, we use comprehensive collection of feedback to

many functions, for example, sending huge volumes of spam or

determine the validity of the rules.

launching Distributed Denial-of-Service (DDoS) attacks. What’s

II. GARLIC

more terrible is, with the development of network technology, suppressing botnets become more and more difficult. In this

The garlic system, as its name suggested, it is distributed

poster, we present an automatic and distributed botnets

and consists of multiple terminal nodes and one control node

suppressing system called “Garlic”. The reason that we call this

as show in Figure 1.

system “Garlic” is its structure is very similar to that of garlic, whose cloves is also distributed, and also , Garlic is very effective against zombies in mystery, whatever comes from film or the

Firewall module Terminal node 1

Terminal node 2

Terminal node 3

Terminal node 4

Protocol filter module Recording module

Internet. This system can automatically collect network traffic

Conmmunication module

Terminal node4

resulted from the botnet controlled network in a distributed mode, and then process these huge data using cloud computing technology,

by

which

when

botnets

are

detected

and

Feedback modual

Detection module

Communication module

countermeasure rules are generated and disseminated into Garlic node. Finally, Garlic targets to gather the feedback events

Central control node Figure 1. system components

resulted from the deployed rules, process, and regenerate countermeasure rules to further suppress the new variant

In Figure 1, we can see the garlic system has a central control node, central control node has three modules, in

botnets. Keywords-botnet; network security; collaboration; forensics;

addition, it also has four terminal nodes, and it has four functional modules, the firewall module, the protocol filter

I.

INTRODUCTION

In this poster, we present an automatic and distributed

module, the recording module and the communication module. Central control node is a server that has three functional

botnets suppressing system “Garlic”. This system can be

modules,

feedback

module,

detection

module

and

automatic and distributed collect network traffic that comes

communication module. Generally, when botnets are detected,

from the controlled network, and then process these huge data

it’s result is based on IP address and port, according to these

using cloud computing technology, which when detecting

information, the detection module will produce the rules. Then

botnets generates rules and upload them, finally, Garlic gather

central control node distributes generate rules to all the

feedback of rules and process them, regenerate rules to

terminals. After distribution of rules, Garlic checks whether

completely suppress botnets.

the rules have feedback indicating the rules are effective or not.

The contribution of our work has three major points.

Garlic system will be uninterrupted collection of feedback for

Firstly, we implemented the distributed garlic system, which

each rule, according to these, it can regenerate rules and

can simultaneously control multiple subnets. Secondly, we

distribute them, and these second-generation rules also can

combine firewalls and protocol filtering, so that much work

produce feedbacks, forming a recursive process.

about botnet detection can be integrated into our System.

of which is composed of three parts, ESX servers, users and

3

Central Control node

2

the terminal nodes. This division is intended not only to simulate a very real network environment, but also to bring real bots into test. In this experiment, the A group gets 46

Internet

4

different rules, and the B group gets 14 different rules. By comprehensive comparison of the results of A and B, there are

1

54 different rules, we distribute these rules to the two terminal nodes, and then gather feedback of these, the result of experimental is to be expected, for each group, the actual

Internal Network 1

Internal network 2

Internal network 3

Internal network 4

Figure 2. The workflow of Garlic.

number of rules in effect more than the number of rules obtained above, which means that within each group has lost a

In Figure 2, we show the workflow of Garlic. Step 1

number of bots that do exist, and our garlic system can

indicates terminal node transfers traffic data to central control

compensate for this shortcoming. In addition, we consider that

node, traffic data is recorded by terminal node. Step 2 is very

the “Garlic” system can detect botnets more quickly when it

important step, where the control node processes huge traffic

has more composite data can be provided.

which is collected in Step 1. Due to the burst nature of network traffic and the fact that most networks can produce thousands

IV.

CONCLUSION AND FUTURE WORK

and even millions of packets in every second, it is very

Garlic systems emphasize collaboration and feedback;

challenging task to process the data in real time, which is

collaboration will enable botnet information sharing, and

solved by LARX [7]. LARX is a cloud computing platform

making users more comprehensive to detect the botnet.

that can process multiple tasks in parallel. The third step is to

Feedback is a very important resource to evaluate the accuracy

load the rules to each terminal node, so the advantage of this

of rule. In the future work, we will further study the feedback

approach is to prevention and control together sharing rules.

resources. For exempla, we will use feedback to build botnet

After rules are loaded into the terminal node, we get to the

model, through model matching to identify false positives.

final and crucial step, which is to check if the rule is valid or not, whether the botnet changes the C&C server or not. We can get the answer from the feedback. In our study, we found that, when some firewalls loaded new rules, they will not check the established links, that means, once bots and C&C server establish a link, no matter how precise the rules are, the link will not be intercepted, which is very dangerous, so we improve this point by checking all the rules about established links when firewall load new rules. III.

PERFORMANCE EVALUATION

We conduct performance tests on our garlic system, from which we can see the distributed system performance benefits and the importance of feedback. We used five physical machines, one machine used as the central control node, two machines used as the terminal node to enforce rules, the rest used as the ESX servers, On this ESX server, we installed four virtual machines, whose operating system is Windows XP sp2 and loaded bots. In our experiment, we build two groups each

REFERENCES [1] C. Kreibich, N. Weaver, C. Kanich, W. Cui and V. Paxson. GQ: Practical Containment for Measuring Modern Malware Systems. In: ACM IMC’2011. [2] G. Gu, J. Zhang and W. Lee. BotSniffer: Detecting botnet command and control channels in network raffic. In:NDSS 2008. [3] H. Choi, H. Lee, H. Lee and H. Kim. Botnet detection by monitoring group activities in dns traffic. In:CIT 2007. [4] Jun Li, Shuai Ding, Ming Xu, Fuye Han and Zhen Chen. TIFA: Enabling Real-Time Querying and Storage of Massive Stream Data. In:ICNDC 2011. [5] Ying Zhang, Fachao Deng, Zhen Chen, Yibo Xue and Chuang Lin. UTM-CM: A Practical Control Mechanism Solution for UTM System. In:CMC 2010. [6] Beipeng Mu, Xinming Chen and Zhen Chen. A Collaborative Network Security Management System in Metropolitan Area Network. In:CMC 2011. [7] Tianyang Li, Fuye Han, Shuai Ding and Zhen Chen. LARX: Large-Scale Anti-Phishing by Retrospective Data-Exploring Based on a Cloud Computing Platform. In: ICCCN’2011. [8] G. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Paxson and F. Schneider, Enriching Network Security Analysis with Time Travel, In: SIGCOMM 2008.