22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

413<br />

While our prototype implementation does not cover all aspects of our approach<br />

yet <strong>and</strong> some issues remain open for further research, we were able to verify<br />

that the suggested features were affected by the Miner botnet client in the predicted<br />

manner. Single measurements will however not provide the level of certainty traditional<br />

payload signatures can provide for today’s botnets. Thus, detection has to<br />

be carried out as an iterative process, taking into account a series of measurements<br />

for each observed system. Similar problems have been studied in the field<br />

of sensor data fusion <strong>and</strong> thus our current <strong>and</strong> future research is part of a joint<br />

effort to migrate the methods <strong>and</strong> algorithms developed in that field into network<br />

intrusion detection.<br />

Acknowledgment<br />

We would like to thank our colleagues at the FKIE Cyber Defense <strong>and</strong> Sensor<br />

Data <strong>and</strong> <strong>Information</strong> Fusion departments, the University of Bonn Computer Science<br />

Department 4 <strong>and</strong> the Singapore DSO National Laboratories for our fruitful<br />

discussions <strong>and</strong> their advice. Our special thanks go to Daniel Plohmann of FKIE<br />

Cyber Defense for providing a reverse engineered implementation of the Miner C 2<br />

protocol <strong>and</strong> his support in setting up our evaluation environment.<br />

References<br />

[1] D. Plohmann, E. Gerhards-Padilla, <strong>and</strong> F. Leder, “Botnets: Measurement, detection,<br />

disinfection <strong>and</strong> defence.” Technical Report published by the European Network <strong>and</strong><br />

<strong>Information</strong> Security Agency (ENISA). Editor: Giles Hogben, 2011.<br />

[2] N. Falliere, L.O. Murchu, <strong>and</strong> E. Chien, “W.32 Stuxnet dossier,” Technical Report<br />

published by Symantec, 2011.<br />

[3] V. Paxson, “Bro: A system for detecting network intruders in real-time,” in Proceedings<br />

of the 7 th USENIX Security Symposium, 1998.<br />

[4] “Snort Official Website.” Available: www.snort.org<br />

[5] K. Rieck, G. Schwenk, T. Limmer, T. Holz, <strong>and</strong> P. Laskov, “Botzilla: Detecting<br />

the ‘phoning home’ of malicious software,” in Proceedings of the 2010 ACM Symposium<br />

on Applied Computing, 2012.<br />

[6] G. Gu, R. Perdisci, J. Zhang, <strong>and</strong> W. Lee, “BotMiner: Clustering analysis of network<br />

traffic for protocol- <strong>and</strong> structure-independent botnet detection,” in Proceedings<br />

of the 17 th USENIX Security Symposium, 2008.<br />

[7] M. Celenk, T. Conley, J. Willis, <strong>and</strong> J. Graham, “Predictive network anomaly<br />

detection <strong>and</strong> visualization,” in IEEE Transactions on <strong>Information</strong> Forensics <strong>and</strong><br />

Security, vol. 5, no. 2, 2010.<br />

[8] T. Karagiannis, K. Papagiannaki, <strong>and</strong> M. Faloutsos, “BLINC: Multilevel traffic<br />

classification in the dark,” in Proceedings of the 2005 ACM Conference on Applications,<br />

Technologies, Architectures, <strong>and</strong> Protocols for Computer <strong>Communications</strong>, 2005.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!