22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

398 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

At this point, we want to leave the field of traditional intrusion detection<br />

<strong>and</strong> take a look at a small set of approaches from the field of traffic classification.<br />

The first is BLINC [8], which tries to infer the applications running on a particular<br />

host only from basic properties of netflows, describing the behaviour of applications<br />

with graphlets. These graphs describe for a specific IP address the volume<br />

of destination IP addresses, source <strong>and</strong> destination ports <strong>and</strong> transport protocol<br />

expected for a given type of application. Graphlets can also be combined to characterise<br />

a host running several applications at the same time. While the authors<br />

present examples for some attacks, they do not provide general models for malicious<br />

activities. Also, often the graphlets provided refer to a coarse class of application<br />

rather than a specific protocol, indicating that the feature set may be too small to<br />

provide more accurate discrimination.<br />

Bernaille et al. [9] demonstrated that with only considering the size <strong>and</strong> direction<br />

of the first few packets of a flow with application payload, you can achieve<br />

a significant level of accuracy with regard to which protocol the flow’s payload<br />

belongs to. A similar approach by Crotti et al. [10] uses a superset of features that<br />

do not require access to the payload <strong>and</strong> are aggregated for a complete flow to<br />

reliably assign one of four classes, including an “other” class, to a particular flow.<br />

They later extended their method to detect tunnelling through other protocols [11].<br />

Instead of manually designed application signatures, these approaches rely on<br />

correctly preclassified training sets that allow them to determine the distribution<br />

functions of the observed features for each of the applications they are designed<br />

to discriminate.<br />

The selection of features to observe is a critical part in some of the above but<br />

also our own approach. An essential part of identifying the most promising features<br />

is to analyse the behaviour of the applications we want to detect <strong>and</strong> how it will<br />

differ from other applications. Thus, our starting point is the bot herder’s intent<br />

of hiding <strong>and</strong> securing their botnets’ C 2 channel <strong>and</strong> we explore the design which<br />

is likely to emerge from this intent in section IV. This, together with an analysis<br />

of the relation between observations on the network layer <strong>and</strong> the application that<br />

generated it in section V, provides a background for identifying the features we<br />

want to observe for detecting future botnets.<br />

IV. Future botnets<br />

Bot herders generally aim for improving the resilience of their botnets against<br />

takedown, takeover <strong>and</strong> detection efforts. Thus, we expect more sophisticated approaches<br />

for protection <strong>and</strong> obfuscation, in particular in regard to the C 2 channel.<br />

These approaches may include measures in the three domains we discuss in this<br />

section, custom protocols or protocol implementations (section IV.A), steganography<br />

<strong>and</strong> cryptography (sections IV.B <strong>and</strong> IV.C <strong>and</strong>, respectively). Section IV.D<br />

summarises the conclusions implied by our analysis.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!