首页> 外文会议>Association for Computing Machinery Conference on Computer and Communications Security >Dispatcher; Enabling Active Botnet Infiltration using Automatic Protocol Rewerse-Engineering
【24h】

Dispatcher; Enabling Active Botnet Infiltration using Automatic Protocol Rewerse-Engineering

机译:调度员; 使用自动协议逆向工程实现有效僵尸网络渗透

获取原文

摘要

Automatic protocol reverse-engineering is important for many security applications, including the analysis and defense against bot-nets. Understanding the command-and-control (C&C) protocol used by a botnet is crucial for anticipating its repertoire of nefarious activity and to enable active botnet infiltration. Frequently, security analysts need to rewrite messages sent and received by a bot in order to contain malicious activity and to provide the botmaster with an illusion of successful and unhampered operation. To enable such rewriting, we need detailed information about the intent and structure of the messages in both directions of the communication despite the fact that we generally only have access to the implementation of one endpoint, namely the bot binary. Current techniques cannot enable such rewriting. In this paper, we propose techniques to extract the format of protocol messages sent by an application that implements a protocol specification, and to infer the field semantics for messages both sent and received by the application. Our techniques enable applications such as rewriting the C&C messages for active botnet infiltration. We implement our techniques into Dispatcher, a tool to extract the message format and field semantics of both received and sent messages. We use Dispatcher to analyze MegaD, a prevalent spam botnet employing a hitherto undocumented C&C protocol, and show that the protocol information extracted by Dispatcher can be used to rewrite the C&C messages.
机译:自动协议反向工程对于许多安全应用是重要的,包括对BOT网的分析和防御。了解僵尸网络使用的命令和控制(C&C)协议对于预期其repRoive活动的reptoire并启用主动僵尸网络渗透至关重要。通常,安全分析师需要重写机器人发送和接收的消息,以便包含恶意活动,并提供具有成功和无私操作的幻想。要启用此类重写,我们需要有关沟通方向中消息的意图和结构的详细信息,尽管我们通常只能访问一个端点的实现,即BOT二进制。当前技术无法启用此类重写。在本文中,我们提出了提取由实现协议规范的应用程序发送的应用程序格式的技术,并通过应用程序发送和接收的消息来推断出邮件的字段语义。我们的技术启用应用程序,例如重写C&C消息以进行活动僵尸网络渗透。我们将技术实施到Dispatcher中,该工具可以提取收到和发送消息的消息格式和字段语义。我们使用Dispatcher来分析Megad,采用迄今未记录的C&C协议的普遍存在的垃圾邮件僵尸网络,并显示由调度程序提取的协议信息可用于重写C&C消息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号