290 likes | 299 Views
This paper presents an in-depth analysis of Hajime, a peer-to-peer IoT botnet, exploring its structural variants, characteristics, and impact. The study focuses on the use of BitTorrent-based Distributed Hash Tables in bot discovery, hosting, and downloading activities of Hajime. Through extensive measurements over 4 months, the research provides insights into botnet size, geographical distribution, architectural patterns, vulnerabilities, and attack methods employed by Hajime. Additionally, the paper discusses novel approaches for botnet measurement and highlights the need for architecture-specific honeypots to effectively combat evolving botnets. For more details on Hajime's internals, device fingerprinting, and geographic distribution based on DNS backscatter, this paper offers valuable information for understanding and combating modern IoT botnets. Datasets from the study are available at http://iot.umd.edu.
E N D
Measurement and Analysis of Hajime:a Peer-to-peer IoT Botnet by Stephen Herwig (UMD), KaturaHarvey (MPI), George Hughey (UMD), Richard Roberts (MPI), Dave Levin (UMD) Presented by Himanshu Gandhi (2015ANZ7550)
Important “Problems” for a Botnet Controller? Hajime uses BitTorrent based Distributed Hash Tables for both questions.
Bot Discovery announce hash(F) announce bot(F) announce hash(.i) Hosting file F lookup hash(F) lookup bot (F) lookup file (.i) Downloading file F
Lookup Hosting KeyExchange UTP Keys provide long-lived IDs Downloading
Thus: • Resilient BitTorrent Based Discovery • Difficult to take down Hajime without bringing down BT !! • P2P • Difficult to centrally monitor and control
Measurement Every 16 minutes for 4 months - 5.4M IP addresses - 10.5M keys Datasets available at http://iot.umd.edu • Botnet Size • List all peers exhaustively • Used unique keys to get botnet size • Why not IP • NAT undercounts • IP reassignments and multi-homed devices => overcount • Code RE • 47 modules – 34 .atk, 13 .i
Hajime Geo-Distribution MaxMind IP Geolocation DB used
Hajime Architectural Distribution • Based on .atk files usage • Censys Database (IP-uTP key used for device fingerprinting)
What’s New ? • Novel way of measuring and analyzing botnet • Insights about botnets’ ability to evolve • Honeypots need to be architecture specific
What’s more in the paper ? • More details on the botnet internals • Insights about device fingerprinting and bot lifetime • CWMP DNS backscatter based geographical distribution