Detecting the Behavioral Relationships of Malware Connections

(positional paper)

 

Sebastian Garcia & Michal Pechoucek

 

sebastian.garcia@agents.fel.cvut.cz

@eldracote

Live: bit.ly/praise2016

  • Privacy and surveillance. The MasterMind program. 

    • We should know how to deal with this, and use it.

  • Behavior of malware, how to detect it.

The origin

The Problem

  • False positives: You detect malicious when is not.

    • Detection of what?

      • Packets?

      • Flows?

      • Web logs?

      • Unique computers?

  • Differentiating normal from malicious

    • ​We may detect malicious alone. But when it is mixed with normal, it's far more difficult.

Stratosphere IPS Project

  • Model network behaviors as a string of letters.

  • 1 flow        3 features         1 letter

  • 1 connection (srcIP, dstIP, dstPort, Proto)      String

The Problem of Stratosphere

  • Usually working, but some behaviors are very similar.

  • Normal Radio Streaming

    • 88,h,h,h,h,h,h,H,H,h,h,h,h,H,H,h,H,H,h,H,h,H,H,H,h,

  • Botnet C&C server 23.247.5.27 port 25000/tcp

    • 88,H,H,h,H,H,h,h,h,h,h,H,h,H,H,H

A better differentiation

  • We are looking too closely.

  • Analyze the behavior of the Host, instead of a connection.

A New type of Graph

  • A graph to show the relationships of flow sequences.

  • Made by Daniel Šmolík, from the Stratosphere team.

    • A graph per client (source IP).

    • A node is the combination of dst IP, dst port, protocol.

    • An edge is a flow sequence as seen in the network.

  • The more times the edge is found, the thicker.

  • The more times the node is repeated, the larger.

  • The more times the node looped, the color changes.

Normal Graph

  • 1 client

Normal Graph

  • Same 1 client, not DNS servers.

Geodo Botnet complete graph

Geodo Botnet filtered graph

  • No DNS, icmp, ipv6, arp or multicast.

Mixed Normal and Adware

  • Before Infection. No DNS

Mixed Normal and Adware

  • After Infection. No DNS

Mixed Normal and Adware

  • After Infection. No DNS

Analyzing the Behavior of a Host

  • Now

    • Amount of times a [dst ip, dst port and protocol] is accessed (node).

    • Amount of times a node comes after other node in sequence (edge). 

    • Amount of times a node loops with itself.

  • Work in progress

    • Loops

      • Find loops in the graph structure.

      • Complex loops, double loops (Geodo).

    • Type of nodes.

    • Type of nodes connecting to each node (relation).

    • Stratosphere Behaviors

Conclusion and Thanks!

  • The behavior of a host may be modeled looking at its actions, relationships and loops.

    • These are the differentiable features of malware.

  • More experiments, evaluation and comparison. 

 

Thank you for staying! And thanks Daniel Smolík for his work.

Sebastian Garcia

sebastian.garcia@agents.fel.cvut.cz

@eldracote

Detecting the Behavioral Relationships of Malware Connections

By eldraco

Detecting the Behavioral Relationships of Malware Connections

  • 1,555