22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

401<br />

Finally, bot herders can use digital signatures on updates <strong>and</strong> C 2 messages<br />

to ensure that only the owner of a specific private key, i.e. the bot herder itself,<br />

can assert control or roll out applications in the botnet. Without authentication,<br />

an attacker with an underst<strong>and</strong>ing of the botnet’s protocol may issue comm<strong>and</strong>s<br />

or roll out updates on a bot, e.g. to install a software it would otherwise have to pay<br />

the bot herder to run on infected machines, thwarting the bot herder’s business<br />

model. Authenticated messages <strong>and</strong>/or updates have are used by several botnets<br />

at this time, including Duqu, but also Sality [18] or Miner [19].<br />

D. Conclusions<br />

Our analysis suggests that while changes to protocols below the application<br />

layer are labour intensive, they provide little potential for benefit to a bot herder<br />

with regard to avoiding network intrusion detection. Steganographic approaches<br />

that require changes in these layers suffer from the same drawback given that obfuscation<br />

in one domain results in anomalies in a different domain <strong>and</strong> are thus<br />

equally unlikely to prevail. We do however expect steganography in the sense that<br />

botnet protocol messages will resemble or be encapsulated in legitimate protocol<br />

messages. This is already the case with both Miner <strong>and</strong> Duqu, which encapsulate<br />

their messages in an apparent HTTP-session.<br />

Cryptography will play a major role in both rendering a botnet’s traffic invisible<br />

<strong>and</strong> asserting the bot herder’s control over it. Most botnets we are aware<br />

of encrypt their protocol messages, obstructing payload based network intrusion<br />

detection, <strong>and</strong> at least some use digital signatures to prevent unauthorised access<br />

to their comm<strong>and</strong> <strong>and</strong> control channels. Concepts <strong>and</strong> implementations however<br />

display weaknesses that reduce the effectiveness of these safeguards. Symmetric<br />

encryption often uses custom algorithms <strong>and</strong> fixed shared keys without any initialisation<br />

vector instead of generating session keys. While the RSA algorithm<br />

often used for generating signatures is considered secure, implementation details<br />

such as key lengths, selected hash functions or data to authenticate limit their<br />

effectiveness.<br />

We can only guess why malware authors prefer custom but often imperfect<br />

designs over st<strong>and</strong>ardised approaches, but botnet operators have proven that they<br />

are capable of evolving their designs, particularly when their botnet’s vulnerabilities<br />

have been exploited to interfere with their businesses. Thus, botnets will not only<br />

increasingly rely on tunnelling all of their C 2 traffic through legitimate protocols such<br />

as HTTP <strong>and</strong> HTTPS, but will also make a better use of cryptography. The payload<br />

of packets transmitted or received by these botnet clients will therefore no longer<br />

carry any features that could be exploited for deep packet inspection, motivating<br />

a need for approaches that can detect botnet communication without relying on<br />

any immediate properties of the payload.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!