360 likes | 553 Views
Dr. Steven Gianvecchio. Bots, Zombies, and Botnets: Malicious Automated Programs in Online Games, Social Networks, and the Internet. Recent Headlines. Internet of Things botnet Includes TV and refrigerator Flashback hits Mac OS X 800K Macs infected Explosion of Android threats 6x growth
E N D
Dr. Steven Gianvecchio Bots, Zombies, and Botnets: Malicious Automated Programs in Online Games, Social Networks, and the Internet
Recent Headlines • Internet of Things botnet • Includes TV and refrigerator • Flashback hits Mac OS X • 800K Macs infected • Explosion of Android threats • 6x growth • LinkedIn, Dropbox, and other leaks • 6.5 million LinkedIn passwords hashes leaked • Java 0-days • 30% of computers vulnerable • Brazil DSL hacks • 4.5 million modems hacked
Statistics • 99 billion spam emails/day • 68% of all email traffic • US banks flooded with >150Gbps of traffic • 37 million phishing attempts • Password theft up 3x • What connects all of these problems?
Bots • What is a bot? • Short for “robot” • An automated program that operates an application normally used by humans • e.g., Web bot, Twitter bot • Bots are not always bad • e.g., Google uses bots to build its search results (these bots are also called spiders)
Zombies!!! • What are zombies? • Computers infected with malicious bot software allowing them to be remotely controlled • Zombie (n) 2.a.3. “in West Indian voodoo, a supernatural power through which a corpse supposedly is brought to a state of trancelike animation and made to obey the commands of the person exercising the power” [Merriam-Webster] • Typically someone’s home or office computer (unknown to them)
Botnets • What are botnets? • Botnets are networks of zombie- or bot-infected computers • Thousands or even millions of bots • 1-5% of Internet-connected computers [Arbor10] • Controlled by independent hackers or criminal organizations (or military)
ZeroAccess botnet: • ~2-3 million infections • ~$100K/day in profits • through Click Fraud ZeroAccess botnet - Europe infections [Fsecure12]
Botnet Lifecycle • 1. Propagation – computer is infected with malicious bot software • 2. Communication - bot “phones home”, i.e., contacts its controller and awaits orders • 3. Attack - bot responds to commands
Botnet Propagation • The first step is “recruiting” bots • Infect computers and install bot software • Many infection methods • Infect as many computers as possible • Bigger is usually better • More bots = faster propagation (rate can be exponential)
Botnet Propagation (cont.) Infection Methods From Security Intelligence Report ‘12 [Microsoft12]
Botnet Communication • How bots receive commands • What if a node is lost? Centralized Peer-to-Peer X X
Botnet Attacks • Spam (about 80% is from botnets) • Distributed Denial of Service, aka DDoS(floods host with traffic) • Click Fraud (fake traffic or “clicks”) • Phishing (steal passwords using fake sites) • Identity or Data Theft • Keylogging • Spying
Financial Motivation $$ $ $$ $ $$$ $
Bots vsHumans • The Turing Test • A human judge chats with two unknown participants: a human and computer • Judge guesses which is human
Bots vs Humans • Human Interactive Proofs • Ideal Proof: hard for computers, easy for humans • e.g., CAPTCHA • Like Turing Test, but judge also a computer • CAPTCHAs are hard for humans and computers (or maybe I’m a computer?) • Are they still effective?
Bots vsHumans • Behavioral Detection • Humans • Biological • Highly complex (many systems within systems) • Bots • Automated (good at repeating things) • Limited complexity (does whatever is in the code) • Can we tell them apart?
Bot Types • Types • Web • Email • Social Network • Online Game • And Others • Bots use these applications for propagation or communication, or target them for attack • Bots are modular • Could propagate via Email and communicate via Web
Bots in Social Networks • Bots are on Twitter and Facebook • Friend or follow you • Send spam or phishing links (via Tweet or direct message) • Send links to malicious code (also via Tweet or direct message)
Twitter Bot Analysis • Live Twitter bots • https://twitter.com/lizzycin • https://twitter.com/JustinQBarbee • https://twitter.com/bluelyndia • https://twitter.com/trekkerdeb • https://twitter.com/wingsaquino • …
Twitter Bot Analysis (cont.) • Live Twitter bots • https://twitter.com/lizzycin - created 7-28-2013 • https://twitter.com/JustinQBarbee created 7-28-2013 • https://twitter.com/bluelyndia created 7-28-2013 • https://twitter.com/trekkerdeb created 7-28-2013 • https://twitter.com/wingsaquino created 7-28-2013 • Likely created by the same person?
Bots in Online Games • Bots play games • Gambling • Online Poker • Gold farming • World of Warcraft • Guild Wars 2 • Rift Online • Star Wars: The Old Republic • … $$$ $$$
Gold Farming Bots • Bot plays endlessly • Gathers gold 24 hours a day • Sells on virtual black market for real currency • Bot plays like a human • “Presses” keys (changes key state) • “Moves” mouse (changes mouse x, y coordinates) • “Views” screen (reads color values of pixels) • Can we tell them apart from how they play?
Gold Farming Study • Setup • World of Warcraft • Collect user-input recordings • Log mouse and keyboard events • Compute statistics • 10 bots for 40 hours • 30 humans for 55 hours
Gold Farming Bot Analysis • Bot vs Human • 82% of bot mouse movements are 1.0 move efficiency • i.e., a straight line • 14% of human movements are 1.0 move efficiency bot move efficiency human move efficiency
Gold Farming Bot Analysis bot mouse speed • Bot vsHuman • Bot moves mouse at random speeds in different directions • Human moves faster on diagonals human mouse speed
Click Fraud Bots • Advertisers often are paid per click • Bots can click things! • Advertiser pays botmaster for clicks • Thousands of bots click on the ads • Client pays advertiser (and gets ripped off) • ZeroAccess (mentioned earlier) makes about $100,000/day on Click Fraud • Click Fraud Study • Setup web page and collect clicks and mouse movements for bots and human users [Spider.io13]
Click Fraud Bot Analysis • Bot vs Human • Bot clicks and mouse movements are randomly distributed • Human clicks and movements are focused on key areas
Botnet Analysis • Focus on the Botnet Lifecycle • 1. Propagation / 2. Communication / 3. Attack • Detecting Botnet Propagation • Look for attempts to infect other machines • Exploits change regularly • Very hard • If we could reliably detect exploits, we wouldn’t have the botnet problem
Botnet Analysis • Detecting Botnet Communication • Look for communication with command and control server • Bots often contact their controller at regular intervals, e.g., every 5 minutes • Clustering works well • Lots of computers doing the same thing • Identify the bots and command and control servers
Botnet Analysis • Detecting Botnet Attacks • Look for bots attacking or targeting systems • Only identifies the bots involved in the attack • Lots of different techniques needed to detect attacks • Spam, DDoS, Click Fraud, Phishing, etc.
HoneyNets • Setup a network of unpatched computers • Must be isolated from primary network • Get infected • Monitor the network • Collect logs • Learn about the bots
Disrupting Botnets • Can monitor individual bots to discover their controller • Target the controller, not the bots • Take down or take over the botnet • Symantec recently disabled 500,000 bots from ZeroAccessusing this approach
Conclusions • Bots are a major security problem • Botnets are the source of most cyber attacks • Can detect them in various ways • Bot vs human behavior • Also, propagation / communication / attack • Can disrupt them by taking down or taking over parts of the botnet
Questions? • Interested students (or faculty) that want to get involved in bot, online game, or social network research can contact Dr. Gianvecchio, steven.gianvecchio@cnu.edu.
References (1/2) • [Arbor10] “Analyzing and understanding botnets.” Jose Nazario. • [AFJ08] “Carpet bombing in cyberspace: Why America needs a military botnet.” Charles Williamson. • [Kaspersky13] “The evolution of phishing attacks: 2011-2013.” Kaspersky Labs. • [Pingdom13] “Internet 2012 in numbers.”Pingdom. • [ZDnet12] “10 Security stories that shaped 2012.” Ryan Naraine.
References (2/2) • [Symantec13] “Grappling with the ZeroAccess botnet.” Ross Gibb and Vikram Thakur. • [Gianvecchio09] “Battle of Botcraft: Fighting Bots in Online Games using Human Observational Proofs.” Steven Gianvecchio, Zhenyu Wu, MengjunXie, and Haining Wang.