SinkMiner: Mining Botnet Sinkholes for Fun and Profit

نویسندگان

  • Babak Rahbarinia
  • Roberto Perdisci
  • Manos Antonakakis
  • David Dagon
چکیده

Botnets continue to pose a significant threat to Internet security, and their detection remains a focus of academic and industry research. Some of the most successful botnet measurement and remediation efforts rely heavily on sinkholing the botnet’s command and control (C&C) domains [1]. Essentially, sinkholing consists of re-writing the DNS resource records of C&C domains to point to one or more sinkhole IP addresses, thus directing victim C&C communications to the sinkhole operator (e.g., law enforcement). Sinkholes are typically managed in collaboration with domain registrars and/or registries, and the owner of the network range where the botnet C&C is sinkholed. Registrars often play a critical role in remediating abusive domains (e.g., by invoking rapid take-down terms commonly found in domain registration contracts, such as the “Uniform Rapid Suspension System” [3]). Collaboration with the sinkhole network range owners is needed to endure the possible IP reputation damage to their IP space, since sinkholes may appear as real C&Cs to others. While some sinkhole IPs are publicly known or can be easily discovered (see Section 2.1), most are jealously kept as trade secrets by their operators, to protect proprietary black lists of remediated domains. Therefore, third-party researchers are often unable to distinguish between malicious C&C sites and remediated domains pointed to sinkholes. In some cases, this stove-piping of sinkhole information can cause “friendly fire”, whereby security operators or law enforcement may take down an already sinkholed C&C. This results in disrupting remediation efforts, and may in some cases bring more harm to the botnet victims (whose infected clients may turn to secondary or backup C&C domains not being remediated). It is therefore useful to build technologies capable of identifying whether or not a C&C domain and/or IP are part of a sinkholing effort. In this paper, we present SinkMiner, a novel forensics system that enables the discovery of previously unknown sinkhole IPs and the related sinkholed domains by efficiently mining large passive DNS databases. Being able to discover “secretive” sinkhole operations has both benign and not-so-benign implications. On a purely benign side, labeling previously unknown sinkhole IPs may prevent “friendly fire,” as mentioned above. Also, the discovery of sinkhole IPs may enable a much more precise measurement of the effective lifetime of C&C domains. On the other hand, the ability to identify sinkhole IPs may allow less-than-honest researchers to collect all related sinkholed domains, which could then be re-sold to thirdparties as part of a domain blacklist, thus unfairly taking advantage of the often very meticulous and costly work done by the sinkhole operator. Our system’s ability to detect previously unknown sinkhole IPs is based on a somewhat surprising empirical observation: sinkhole operators often relocate C&C domains from a sinkhole IP to another (see Section 2.2). Therefore, given a small seed of known sinkhole IPs, we can leverage passive DNS databases to monitor the “behavior” or their sinkholed domains to track where they relocate — effectively discovering “by association” previously unknown sinkholes. This is in stark contrast with what common knowledge may suggest, namely that once a C&C domain falls into a sinkhole it will never escape until it expires or is “retired” by the sinkhole operator, making

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bitcoin Mining based Botnet Analysis

Bitcoin, a decentralized P2P currency in recent years has gained a tremendous attention due to its ability to create anonymous financial transactions. This leads to bitcoins being the choice of currency for users having privacy as a important issue. Bitcoin mining, a process resulting in the generation of new bitcoins, is performed by miner operators for reception of incentives in the form of B...

متن کامل

Botnet Economics: Uncertainty Matters

Botnets have become an increasing security concern in today’s Internet. Thus far the mitigation to botnet attacks is a never ending arms race focusing on technical approaches. In this paper, we model botnet-related cybercrimes as a result of profit-maximizing decision-making from the perspectives of both botnet masters and renters/attackers. From this economic model, we can understand the effec...

متن کامل

Master of Puppets: Analyzing And Attacking A Botnet For Fun And Profit

A botnet is a network of compromised machines (bots), under the control of an attacker. Many of these machines are infected without their owners’ knowledge, and botnets are the driving force behind several misuses and criminal activities on the Internet (for example spam emails). Depending on its topology, a botnet can have zero or more command and control (C&C) servers, which are centralized m...

متن کامل

BotOnus: an online unsupervised method for Botnet detection

Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...

متن کامل

Http Botnet Detection Using Frequent Patternset Mining

Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyberattacks. A botnet is a group of compromised computers which are remotely controlled by hackers to launch various network attacks, such as DDoS attack, spam, click fraud, identity theft and information phishing. The defining characteristic of botnets is the use of command an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013