Skip to main content
Top
Published in: Information Systems and e-Business Management 4/2012

01-12-2012 | Original Article

Behavioral analysis of botnets for threat intelligence

Authors: Alper Caglayan, Mike Toothaker, Dan Drapeau, Dustin Burke, Gerry Eaton

Published in: Information Systems and e-Business Management | Issue 4/2012

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper examines the behavioral patterns of fast-flux botnets for threat intelligence. The Threat Intelligence infrastructure, which we have specifically developed for fast-flux botnet detection and monitoring, enables this analysis. Cyber criminals and attackers use botnets to conduct a wide range of operations including spam campaigns, phishing scams, malware delivery, denial of service attacks, and click fraud. The most advanced botnet operators use fast-flux infrastructure and DNS record manipulation techniques to make their networks more stealthy, scalable, and resilient. Our analysis shows that such networks share common lifecycle characteristics, and form clusters based on size, growth and type of malicious behavior. We introduce a social network connectivity metric, and show that command and control and malware botnets have similar scores with this metric while spam and phishing botnets have similar scores. We describe how a Guilt-by-Association approach and connectivity metric can be used to predict membership in particular botnet families. Finally, we discuss the intelligence utility of fast-flux botnet behavior analysis as a cyber defense tool against advanced persistent threats.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Anti-Phishing Working Group (APWG) (2009) An APWG industry advisory—global phishing survey: trends and domain name use in 1H2009, October 2009 Anti-Phishing Working Group (APWG) (2009) An APWG industry advisory—global phishing survey: trends and domain name use in 1H2009, October 2009
go back to reference Caglayan A, Toothaker M (2010) FastFluxMonitor vs. Darknet traffic, SIE Workshop, 3 October 2010. Atlanta, GA Caglayan A, Toothaker M (2010) FastFluxMonitor vs. Darknet traffic, SIE Workshop, 3 October 2010. Atlanta, GA
go back to reference Caglayan A, Toothaker M, Drapeau D, Burke D, Eaton G (2009) Behavioral analysis of fast-flux service networks. Cyber security and information intelligence research workshop (CSIIRW-09), 13–15 April 2009, Oak Ridge, TN Caglayan A, Toothaker M, Drapeau D, Burke D, Eaton G (2009) Behavioral analysis of fast-flux service networks. Cyber security and information intelligence research workshop (CSIIRW-09), 13–15 April 2009, Oak Ridge, TN
go back to reference Caglayan A, Toothaker M, Drapeau D, Burke D, Eaton G (2009) Real-time detection and classification of fast-flux service networks. Cybersecurity Applications and Technology Conference for Homeland Security (CATCH), 3–4 March 2009, Washington, DC Caglayan A, Toothaker M, Drapeau D, Burke D, Eaton G (2009) Real-time detection and classification of fast-flux service networks. Cybersecurity Applications and Technology Conference for Homeland Security (CATCH), 3–4 March 2009, Washington, DC
go back to reference Caglayan A, Toothaker M, Drapeau D, Burke D, Eaton G (2010) Behavioral patterns of fast-flux service networks. Hawaii international conference on system sciences (HICSS-43) cyber security and information intelligence research Minitrack. Koloa, Kauai, Hawaii, 5–8 Jan 2010 Caglayan A, Toothaker M, Drapeau D, Burke D, Eaton G (2010) Behavioral patterns of fast-flux service networks. Hawaii international conference on system sciences (HICSS-43) cyber security and information intelligence research Minitrack. Koloa, Kauai, Hawaii, 5–8 Jan 2010
go back to reference Cox A, Golomb G (2010) The Kneber botnet. NetWitness Corporation, Herndon, VA, 17 Feb 2010 Cox A, Golomb G (2010) The Kneber botnet. NetWitness Corporation, Herndon, VA, 17 Feb 2010
go back to reference Caglayan A, Toothaker M, Drapeau D, Burke D, Eaton, G (2010) Guilt-by-association based discovery of botnet footprints NATO research and technology organization workshop on information security and defense. Antalya, Turkey, 26–30 Apr Caglayan A, Toothaker M, Drapeau D, Burke D, Eaton, G (2010) Guilt-by-association based discovery of botnet footprints NATO research and technology organization workshop on information security and defense. Antalya, Turkey, 26–30 Apr
go back to reference Holz T, Gorecki C, Rieck C, Freiling F (2008) Measuring and detecting fast-flux service networks. Presented at NDSS Symposium Holz T, Gorecki C, Rieck C, Freiling F (2008) Measuring and detecting fast-flux service networks. Presented at NDSS Symposium
go back to reference ICANN (2008) GNSO issues report on fast-flux hosting, March 2008 ICANN (2008) GNSO issues report on fast-flux hosting, March 2008
go back to reference ICANN (2008) Security and stability advisory committee. SAC 025: SSA advisory on fast-flux hosting and DNS, March 2008 ICANN (2008) Security and stability advisory committee. SAC 025: SSA advisory on fast-flux hosting and DNS, March 2008
go back to reference iDefense (2008) An iDefense topical research report: 2009 cyber threats and trends. 12 Dec 2008 iDefense (2008) An iDefense topical research report: 2009 cyber threats and trends. 12 Dec 2008
go back to reference Kanich C, Kreibich C, Levchenko K, Enright B, Voelker G, Paxson V, Savage S (2008) Spamalytics: an empirical analysis of spam marketing conversion. In: Proceedings of 15th ACM conference on computer and communication security Kanich C, Kreibich C, Levchenko K, Enright B, Voelker G, Paxson V, Savage S (2008) Spamalytics: an empirical analysis of spam marketing conversion. In: Proceedings of 15th ACM conference on computer and communication security
go back to reference Konte M, Feamster N, Jung J (2009) Dynamics of online scam hosting infrastructure. Proceedings of passive and active measurement conference (PAM), Seoul, Korea, April 2009 Konte M, Feamster N, Jung J (2009) Dynamics of online scam hosting infrastructure. Proceedings of passive and active measurement conference (PAM), Seoul, Korea, April 2009
go back to reference Liu J, Xiao Y, Ghaboosi K, Deng H, Zhang J (2009) Botnet: classification, attacks, detection, tracing, and preventive measures. EURASIP J Wirel Commun Netw 9 (February 2009) Liu J, Xiao Y, Ghaboosi K, Deng H, Zhang J (2009) Botnet: classification, attacks, detection, tracing, and preventive measures. EURASIP J Wirel Commun Netw 9 (February 2009)
go back to reference McGrath DK, Gupta M (2008) Behind phishing: an examination of phisher modi operandi. In: Proceedings of the USENIX workshop on large-scale exploits and emergent threats McGrath DK, Gupta M (2008) Behind phishing: an examination of phisher modi operandi. In: Proceedings of the USENIX workshop on large-scale exploits and emergent threats
go back to reference McGrath DK, Kalafut A, Gupta M (2009) Phishing infrastructure fluxes all the way. IEEE Security and Privacy Magazine Special Issue on Securing the Domain Name System, September/October 2009 McGrath DK, Kalafut A, Gupta M (2009) Phishing infrastructure fluxes all the way. IEEE Security and Privacy Magazine Special Issue on Securing the Domain Name System, September/October 2009
go back to reference Moore T, Clayton R (2007) Examining the impact of website take-down on phishing. In: Proceedings of anti-phishing working group ecrime researcher’s summit (APWG eCrime), ACM Moore T, Clayton R (2007) Examining the impact of website take-down on phishing. In: Proceedings of anti-phishing working group ecrime researcher’s summit (APWG eCrime), ACM
go back to reference Namestnikov Y (2009) The economics of botnets, Kapersky Labs Namestnikov Y (2009) The economics of botnets, Kapersky Labs
go back to reference National Research Council of the National Academies (2009) Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities. Oct 2009, pp 117–121 (154–155, 230–231) National Research Council of the National Academies (2009) Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities. Oct 2009, pp 117–121 (154–155, 230–231)
go back to reference Passerini E, Paleari R, Martignoni L, Bruschi D (2008) FluXOR: detecting and monitoring fast-flux service networks. Detection of intrusions and malware, and vulnerability assessment, pp 186–206 Passerini E, Paleari R, Martignoni L, Bruschi D (2008) FluXOR: detecting and monitoring fast-flux service networks. Detection of intrusions and malware, and vulnerability assessment, pp 186–206
go back to reference Ramachandran A, Feamster N, Dagon D (2006) Revealing botnet membership using DNSBL counter-intelligence. In: USENIX 2nd workshop on steps to reducing unwanted traffic on the internet (SRUTI ‘06), July 2006 Ramachandran A, Feamster N, Dagon D (2006) Revealing botnet membership using DNSBL counter-intelligence. In: USENIX 2nd workshop on steps to reducing unwanted traffic on the internet (SRUTI ‘06), July 2006
go back to reference Stamos A (2010) Aurora response recommendations, iSEC Partners, 17 Feb 2010 Stamos A (2010) Aurora response recommendations, iSEC Partners, 17 Feb 2010
go back to reference Tufte ER (2006) Beautiful Evidence. Graphics Press, Cheshire Tufte ER (2006) Beautiful Evidence. Graphics Press, Cheshire
go back to reference WOMBAT (Worldwide Observatory of Malicious Behaviors and Attack Threats) (2010) D15 (D4.5) intermediate report on contextual features. Eur Commun Seventh Frame Prog, 13, 32 (9 Feb 2010) WOMBAT (Worldwide Observatory of Malicious Behaviors and Attack Threats) (2010) D15 (D4.5) intermediate report on contextual features. Eur Commun Seventh Frame Prog, 13, 32 (9 Feb 2010)
go back to reference Zdrnja B, Brownlee N, Wessels D (2007) Passive monitoring of DNS anomalies. In: Hammerli BM, Sommer R (eds) DIMVA 2007. LNCS, vol. 4579. Springer, Heidelberg, pp 129–139 Zdrnja B, Brownlee N, Wessels D (2007) Passive monitoring of DNS anomalies. In: Hammerli BM, Sommer R (eds) DIMVA 2007. LNCS, vol. 4579. Springer, Heidelberg, pp 129–139
go back to reference Zhou CV, Leckie C, Karunasekera S (2009) Collaborative detection of fast flux phishing domains. J Netw 4(1) Zhou CV, Leckie C, Karunasekera S (2009) Collaborative detection of fast flux phishing domains. J Netw 4(1)
Metadata
Title
Behavioral analysis of botnets for threat intelligence
Authors
Alper Caglayan
Mike Toothaker
Dan Drapeau
Dustin Burke
Gerry Eaton
Publication date
01-12-2012
Publisher
Springer-Verlag
Published in
Information Systems and e-Business Management / Issue 4/2012
Print ISSN: 1617-9846
Electronic ISSN: 1617-9854
DOI
https://doi.org/10.1007/s10257-011-0171-7

Other articles of this Issue 4/2012

Information Systems and e-Business Management 4/2012 Go to the issue