Prototype Software Sniffs Out, Disrupts Botnets 51
coondoggie writes "Earlier this week researchers unveiled
a system to identify and eradicate botnets in the wild. While currently only a prototype, Georgia Tech's BotSniffer would use network-based anomaly detection to identify botnet command and control channels in a LAN. The system wouldn't require any prior knowledge of signatures or server addresses. 'The researchers said their prototype, which was presented at the Internet Society's Network and Distributed System Security Symposium this week, is based on the fact that botnets engage in coordinated communication, propagation, and attack and fraudulent activities.'"
Does it detect torrents? (Score:3, Interesting)
Prior art ... (Score:4, Funny)
Won't happen ... From the summary:
The RIAA / MPAA / Congresscritters / Lobbyists / Subprime Lenders ? BushCheneyHalliburtonCo all claim prior art ...
way easier idea (Score:3, Informative)
Re: (Score:1, Interesting)
Re: (Score:1)
Useful but fundamentally flawed.... (Score:4, Interesting)
While this is a step in the right direction it will be out maneuvered quickly.
Re:Useful but fundamentally flawed.... (Score:4, Informative)
Re:Useful but fundamentally flawed.... (Score:5, Interesting)
What happens if a new host, or several new hosts are added to the network?
What happens if this is a public wifi where new hosts are added and dropped all the time?
If the functionality is as described in the article summary and it looks for coordinated communications, how will it interpret bittorrent style communications where a lot of different computers, some possibly infected, most not, transferring data to and from a single host trying to download?
It sounds like swarming algorithms are the kind of behavior it would be looking for.
Just thinking out loud...
Re: (Score:1)
Say that this technology is tricked into believing that uninvolved host "X" is part of a botnet; now host "X" is effectively
Re:Useful but fundamentally flawed.... (Score:5, Insightful)
Unfortunately, it wouldn't be much of a challenge to institute a randomized delay between receiving commands, executing them, and reporting back to the C&C. The C&C could even change the randomization factor depending on how many bots are in that specific subnet of IPs. More bots = more time delay to thwart the sniffer.
Re:Useful but fundamentally flawed.... (Score:5, Informative)
Re: (Score:3, Interesting)
You can't DDOS a website with randomly-delayed attacks from each host, because then it wouldn't be a DDOS, just a slower increase in traffic.
On average, Botnets are no longer hundreds or thousands strong, they've grown into the tens of thousands...
As an exceptional case, F-Secure claims Storm is a million strong [networkworld.com].
Do you really need tens/hundreds of thousands of bots attacking all at once? Even if the answer to that question is yes, the bots are still polled for status & told to fetch updates. Introducing a randomized delay will certainly help hide non-attack behavior, which will undoubtedly prolong the life of the botnet.
However, with a mill
Re: (Score:2)
and simply schedule your attack in advance. Think CronBot(tm).
Re: (Score:1)
Re: (Score:3, Interesting)
Or Achord [thalassocracy.org] for that matter. If the botnet is based on a peer to peer structure and the author has added public-key encryption, all he has to do is connect to an arbitrary bot host and insert the (signed) command which propagates through the network to all the other nodes; there'll be no fixed master server to home in on.
Re: (Score:2)
Really though, I don't think they're just grepping for
Re: (Score:3, Funny)
Re: (Score:3, Interesting)
Unless, of course, they got their instructions in an e-mail. Spam is already semi-randomized to get past filters, so it wouldn't be hard to have it carry encoded instructions too.
Or have them use instant messaging. The zombie worm should detect which IM program the user uses, and send a message to the control (or one of various f
applications of abstract theory you say? (Score:2)
Even easier way ... . (Score:5, Interesting)
index.php?main=xxx
and then watch the attempts that come in for xxx, they will
all be scripts that trigger the botnets. grab the scripts
and you have the irc server, the channel, etc.
A recent one that I saw was one katana.webchat.org in channel
#msdos -- no idea if it is still running (ironic since webchat
is supposed to have a security team). I reported it, but never
heard anything back).
Here are a bunch of other ones, access to botnets, free of
charge.
http://www.forestfamily.org/garc/.php/meifase.txt [forestfamily.org]
http://bialoka123.fileave.com/script9.txt [fileave.com]
http://raptortx.googlepages.com/inc3.txt [googlepages.com]
http://snock.host.sk/spread.txt [snock.host.sk]
http://bialoka123.fileave.com/script9.txt [fileave.com]
http://members.lycos.co.uk/enviescraps/pbot.txt [lycos.co.uk]
http://gikowns.googlepages.com/BOTNET-GIKO.txt [googlepages.com]
http://www.ligseg.com.br/Etc/24.gif [ligseg.com.br]
http://76.162.170.34/Photos/pbot [76.162.170.34]
http://www.hotjazz.xpg.com.br/ty.txt [xpg.com.br]
Use at your own risk, and maybe, these folks will get off their rear ends and shut these things down.
Re: (Score:3, Interesting)
I just took over a bot net. Read the source code and figured out what's going on how to login to them. Man these things are semi-complex.
I just took over one and killed it. Dude was none to happy:
16:20 macacao> l3
16:21 macacao> SE EU TE PEGO
16:21 macacao> EU VO CUMER
16:21 macacao> TEU CU
16:21 macacao> FILHO DA PUTA
Re: (Score:2)
Re: (Score:3, Interesting)
All the ones I was messing with were the php ones that had a config file like this:
--
var $config = array("server"=>"katana.webchat.org",
"port"=>6667,
"pass"=
Comment removed (Score:4, Interesting)
Re: (Score:3, Informative)
And all these idiots did was ban my *!user@host. I reconnected via irssi after changing my username and I got back in. I'm trying to script up something entertaining but sadly the IRC server masks host names
Re: (Score:2)
Re: (Score:1)
I'm now in one particular channel on Quakenet, and it'll only let you issue the
I tried to login to his Quakenet account, but alas, the password doesn't match the one he chose for his bot's authpass
The channel had about 7 bots anyhow, so either he's moved them along or just isn't very luck
They need to think about this... (Score:1)
BotSniffer, can capture network command and control protocols and utilize statistical algorithms to detect botnets.
So it uses signatures.
identify botnet command and control channels in a local area network.
so you can't have a 10,000 botnet on a LAN.... Not that I would like some ISP to use this. Now some guy at Comcast will "fight the evil botnets". BotSniffer sounds like a kill the massage-girl thing.
has a very low false positive rate
So, what about when BotSniffer shutdowns things that are not an "evil botnet"? (IRC, ...)
Normal network activities are unlikely to demonstrate such a synchronized or correlated behavior.
A lot of automatic network activities are vary correlated.
I know complaining over nothing.
Will it stop BitTorrent? (Score:5, Insightful)
So would this kill BitTorrent? I've heard network security people explain how peer-to-peer technologies are a dead end because they're impossible to run on a secure network since they do look like botnets. How does this deal with that?
Botnets are easy to detect and control (Score:5, Informative)
1. Deny IRC traffic at your firewalls. If there is a business need for IRC then setup a IRC proxy, or inline authentication. This simple step will stop many of the bots out there from phoning home.
2. Enable reverse path detection on your network devices. This forces your internal routers to check whether the source ip address that the bot is sending, is available out the interface that your comprimised host exists on.
3. Enable DHCP snooping on your edge switches. By configuring this feature the switchport that your host plugs into passively observes what IP address was given to your computer. If traffic is spoofed (a common occurrence for botnets) the switchport effectively shuts your host down.
4. Monitor your network. There many free and commercial products that will make it clear that your traffic profiles have changed. Some good free tools for this are Cacti - http://www.cacti.net/ [cacti.net], Nagios - http://www.nagios.org/ [nagios.org] and NTOP - http://www.ntop.org/ [ntop.org]
5. Utilize update antivirus technology, hopefully one that reports to a central console. These are simple steps, that frankly most people do not use in their networks. If they would the botnet issue would be greatly minimized.
It Has To Be Said (Score:1)
Re: (Score:1)
It's an arms race (Score:4, Insightful)
The system as described shows promise. The current crop of botnet software all exhibit a behavior pattern that can be detected.
Of course there's been other attempts at botnet detection software, but network deployment has been sparse. Deployment is key. Maybe Georgia Tech's good name will help get it deployed. It has be be proved useful to the large network operators or it will never spread beyond a few test systems.
The network operators have to want this detection software enough to deploy and maintain it. It has to help their bottom line. Then it can be developed beyond a university research prototype.
Will the bad guys update the botnet software to out maneuver the good guys? You can bet on it. But keep in mind that the the people who developed the botnet software generally are generally not the same ones who operate the largest botnets. The botnet operators will be greatly impacted until they can get updated software and then get it deployed.
This system will cause a botnot disruption that will take time to rebuild. Then, the botnet detection software will need to be updated. And the arms race will continue...
Re: (Score:1)
It does help the bottom line of last-hop ISPs. If 50% of your network traffic is from virus-infected computers, you can double your effective capacity with perfect virus detection and quarantine. It also provides a pretty strong encouragement for users to get their computers fixed, since a virus means "no internet
Better takedown, not DPI (Score:2, Insightful)
Make your network Botnet resistant (Score:1)
Time for a Paradigm Shift? (Score:1)
The more I watch this issue, the more it seems clear to me that a losing battle is being fought. I picture an analogous world where, by default, houses are constructed with multiple doors that open to the outside world. And also by default, the doors are not locked. To make matters worse, the locks on the doors aren't visible. So even after a door has been secured,