22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

399<br />

A. Custom network or transport layer implementations<br />

Bot herders may <strong>and</strong> have in fact already written their own implementations<br />

for network or transport layer protocols (cf. e.g. [12]) to avoid detection.<br />

Since packets sent by these implementations have to traverse networks consisting<br />

mostly or only of non-infected systems, the design space for these implementations<br />

is however strongly limited. With IPv4 <strong>and</strong> IPv6 dominating wide area networking,<br />

a layer 3 implementation has to be compatible with these protocols, where IPv4<br />

is predominant in most regions <strong>and</strong> end-user systems are often not configured to<br />

permit using IPv6 in a second stack.<br />

This comes with a second side-effect, a non-representative study [13] revealed<br />

that 90% of a large European carrier’s DSL users were connected to the Internet via<br />

a NAT gateway. NAT rewrites transport layer headers to provide Internet access<br />

for several hosts which have to share a single public IPv4 address. Thus, unless<br />

a bot herder considers the inability of a significant portion of potential clients<br />

to access the C 2 channel acceptable, a custom transport layer protocol has to<br />

survive forward <strong>and</strong> backward translation by a NAT gateway. Effectively, this<br />

leaves little options other than tweaking the TCP or UDP protocols at this time.<br />

In fact, the malware described in [12] used a st<strong>and</strong>ard-conform implementation<br />

of the TCP protocol only to bypass firewalls <strong>and</strong> intrusion detection mechanisms<br />

installed on the infected host.<br />

A manipulation not yet addressed above is the spoofing of layer 3 addresses.<br />

Spoofing destination addresses makes little sense unless the sender does not care<br />

whether the recipient will actually receive a packet or can ensure that the intended<br />

destination can be reached through a given address – which would however no<br />

longer meet our underst<strong>and</strong>ing of the term “spoofed”. Spoofed source addresses<br />

have on the other h<strong>and</strong> been observed in the wild <strong>and</strong> may actually hinder attribution<br />

efforts. However, the analysis presented in [14], the only wide-scale effort to<br />

detect filtering of spoofed addresses we are aware of, concluded that only about one<br />

quarter of the autonomous systems observed in 2005 were vulnerable to spoofing.<br />

Thus, relying solely on a communication mechanism that uses spoofed addresses<br />

may again deny a bot herder access to a significant fraction of its infected systems.<br />

In addition to that, when an infected system is behind a NAT gateway, the gateway<br />

will simply follow its mode of operation <strong>and</strong> translate the packet, writing the legitimate<br />

address to the packet sent through the wide area network.<br />

B. Steganography<br />

Steganography is the art of hiding communication channels. Since the observation<br />

of C 2 channels is a prominent part of detection <strong>and</strong> takedown efforts,<br />

a bot herder may be tempted to use techniques developed in this field to hide<br />

its botnet’s C 2 channel. Approaches such as the one described in [15] use fields

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!