170 likes | 273 Views
Protecting Web 2.0 Services from Botnet Exploitations. Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department of Computing, Macquarie University, Australia. Reporter: 游明軒. Outline . Introduction API Verifier Security analysis
E N D
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department of Computing, Macquarie University, Australia Reporter: 游明軒
Outline • Introduction • API Verifier • Security analysis • Conclusion & discussion
Introduction • Web 2.0 • Blog, RSS, Social networking sites, etc. • Web based bots • Use web 2.0 service as a C&C channel • Instead of traditional bots sitting on IRC channel, the connections between web based bots are not permanent • The authors implement a tool, API Verifier, to detect web based bots
Botnet detection methods • Analysis of network traffic flows • Network traceback • Honeypots • These techniques do not cover web based botnet because the bot activities are indistinguishable and legitimate users and websites
API Verifier • Motivation • Because a web based bot must use Web 2.0 service APIs, API Verifier is implemented to verify whether a user is a person or a bot • Approach • Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) • MAC address as identifier
API Verifier - architecture • Components • API Verifier Client • API Verifier Server
API Verifier - functionality • Authentication • User profile • Session key • Encrypt MAC address • Be generated independently each time when an API call is made • Permanent MAC address • CAPTCHA verification
Security analysis • Spoofing MAC address • API Verifier Client fraud • DDoSattack • By-passing CAPTCHA verification
Spoofing MAC address • Change MAC address (1a) • Hijacking OS kernel and modifying the OS communication with NIC is expensive • Cause the high risk of being detection • Change the encrypted MAC address (1b) • session key is generated each API call and is a combinationof the secret key and a time token
API Verifier Client fraud • It is hard to recover the secret key of the API Verifier Client • AES 128-bit • it is hard to disassemble the API Verifier Client • Obfuscation technique
DDoS attack • Set limit on the number of verification attempts • Finite times to solve CAPTCHA • A time interval for next MAC address verification
By-passing CAPTCHA verification • Analyze the picture and extract characters on the image • send the image to attacker to solve it
System short coming • API Verifier cannot get permanent MAC address on virtual machine
Conclusion & discussion • Propose a novel approach against web based botnet. The main concept is to identify whether a user is a person or a bot • Implement a system, API Verifier, to detect the bots before they access to web service API • For security, the authors consider all possible attacks and defend • DDoS attack issue still exists • Lack for a convincing proof of statistics in real world