61
Data Capture and Analysis C-DAC Mohali

Data Capture and Analysis C-DAC Mohali. Overview Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Embed Size (px)

Citation preview

Page 1: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Data Capture and AnalysisC-DAC Mohali

Page 2: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Overview Honeynet/Honeypot Technology

◦ Honeypot/Honeynet Backgroud◦ Type of Honeypots◦ Deployment of Honeypots

Data Collection Data Control Data Analysis

Page 3: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Honeypot/Honeynet concepts

◦ A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource

◦ Has no production value, anything going to or from a honeypot is likely a probe, attack or compromise

◦ A highly controlled network where every packet entering or leaving the honeypot system and related system activities are monitored, captured and analyzed.

◦ Primary value to most organizations is information”

Page 4: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Advantages Fidelity – Information of high value Reduced false positives Reduced false negatives Simple concept Not resource intensive

Page 5: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

04/19/23

CDAC-Mohali "NETWORK PACKET CAPTURING &

ANALYSIS"

Attack Detection Techniques

Detection Techniques

Proactive Techniques Defensive Techniques

Anomaly-based Signature-basedHoneynets

Page 6: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

04/19/23

CDAC-Mohali "NETWORK PACKET CAPTURING &

ANALYSIS"

HoneyPot A

Gateway

Attackers

Attack Data

How it works

MonitorDetect

Response

Page 7: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

04/19/23

CDAC-Mohali "NETWORK PACKET CAPTURING &

ANALYSIS"

Honeynet Requirements & Standards Data Control: Contain the attack activity and ensure

that the compromised honeypots do not further harm other systems.Out bound control without blackhats detecting control activities.

Data Capture: Capture all activity within the Honeynet and the information that enters and leaves the Honeynet, without blackhats knowing they are being watched.

Data Collection: captured data is to be Securely forwarded to a centralized data collection point for analysis and archiving.

Attacker Luring: Generating interest of attacker to attack the honeynet

Static : web server deployment, making it vulnerable

Dynamic : IRC, Chat servers,Hackers forums

Page 8: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

04/19/23

CDAC-Mohali "NETWORK PACKET CAPTURING &

ANALYSIS"

Classification

By level of interaction High Low Middle?

By Implementation Virtual Physical

By purpose Production Research

Page 9: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Types of Honeypots Low-interaction

◦ Emulates services and operating systems.◦ Easy to deploy, minimal risk◦ Captures limited information

High Interaction◦ Provide real operating systems and services, no

emulation.◦ Complex to deploy, greater risk.◦ Capture extensive information.

Page 10: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Virtual Honeynet

Page 11: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

04/19/23

CDAC-Mohali "NETWORK PACKET CAPTURING &

ANALYSIS"

What Honeynet Achieves Diverts attacker’s attention from the real

network in a way that the main information resources are not compromised.

Captures samples of new viruses and worms for future study

Helps to build attacker’s profile in order to identify their preferred attack targets, methods.

Page 12: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

04/19/23

CDAC-Mohali "NETWORK PACKET CAPTURING &

ANALYSIS"

What value Honeynet adds

Prevention of attacks through deception and deterrence

Detection of attacks By acting as a alarm

Response of attacks By collecting data and evidence of an

attacker’s activity

Page 13: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

04/19/23

CDAC-Mohali "NETWORK PACKET CAPTURING &

ANALYSIS"

A highly controlled network where every packet entering or leaving is monitored, captured, and analyzed.

Data CaptureData ControlData Analysis

GEN III

Page 14: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

04/19/23

CDAC-Mohali "NETWORK PACKET CAPTURING &

ANALYSIS"

Honeynet Gen III

Page 15: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

04/19/23

CDAC-Mohali "NETWORK PACKET CAPTURING &

ANALYSIS"

IPTABLES

ARGUS

SNORT

POF

SEBEKD

TCPDUMP

HFLOWDHFLOW

DB

WALLEYE

PCAP DATA

ETH0

SEBEK CLIENT

HONEYPOT

ETH1(0.0.0.0)

ETH2

GUIWEB INTERFACE

(192.168.2.2)

CONVERT INTO UNIFIED FORMAT

(203.100.79.122)

Data Capture Mechanism

SYS LOGSSYS LOGS

AISDAISD

HIDS HIDS

APP LOGS APP LOGS

Page 16: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

HONEYPOTHONEYWALL

Raw Packet Capture

Analyzed PacketCapture

System LogsKernel Level

Logs

Tcpdump

P0F

Snort

Argus Syslogd Sebek Client-Server

Network Level Data Capture System Level Data Capture

DATA CAPTURE TOOLS IN GEN 3 HONEYNET

Page 17: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

04/19/23

CDAC-Mohali "NETWORK PACKET CAPTURING &

ANALYSIS"

Data Control

Internet

Honeywall

Honeypot

Honeypot

No Restrictions

Connections Limited Packet Scrubbed

Page 18: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

PURPOSE:Mitigate risk of COMPROMISED Honeypot being used to harm non-honeynet systems

Count outbound connections (Reverse Firewall)IPS (Snort-Inline)Bandwidth Throttling (Reverse Firewall)

DATA CONTROL

Page 19: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

IPTABLES packet handling

IPTABLES FIREWALL

OUTPUTCHAIN

INPUTCHAIN

FORWARDCHAIN

Page 20: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Data Control### Set the connection outbound limits for different protocols.

SCALE="day"TCPRATE=“20"UDPRATE="20"ICMPRATE="50"OTHERRATE="5“

iptables -A FORWARD -p tcp -i $LAN_IFACE -m state --state NEW -m limit --limit ${TCPRATE}/${SCALE} --limit-burst ${TCPRATE} -s ${host} -j tcpHandler

iptables -A FORWARD -p tcp -i $LAN_IFACE -m state --state NEW -m limit --limit 1/${SCALE} --limit-burst 1 -s ${host} -j LOG --log-prefix "Drop TCP after ${TCPRATE} attempts“

iptables -A FORWARD -p tcp -i $LAN_IFACE -m state --state NEW -s ${host} -j DROP

Page 21: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Distributed Honeynet System Distributed sensor Honeynet

◦ Configuration/reconfiguration

◦ Central Logging & Alerting◦ Honeypot management & analysis (forensics take

time!)

Page 22: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Central Database Server

Router

Router

Router

HoneywallHoneywall

Virtual Switch

Honeypot1

Nepenthes

Software BridgeHoneypot1 Honeypot2

Software Bridge

Nepenthes

Software Bridge

Honeywall

Software Bridge

Host machine

Honeywall

NepenthesHost machine

In t e r n e t

Honeypot1 Honeypot2

Virtual Switch

Honeypot1 Honeypot2

Host machineVirtual Switch

Host machine

Honeypot2

Network Diagram of Distributed Honeynet System

Virtual Switch

Nepenthes

BSNL N/W /28 CONNECT N/W /27

STPI N/W /28Airtel N/W /29

Router

Router

Large Enterprise Network (STPI) /27 Broadband Providers (BSNL,CONNECT,AIRTEL) /28,/28/29

Page 23: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Life Cycle of Distributed HoneyNet System

Page 24: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Remote Node Architecture

Page 25: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots
Page 26: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Malware Analysis

Page 27: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Malware Collection Module

Malware Analysis Module Botnet Tracking

Low-Interaction Honeypot

High Interaction Honeynet

Remote Node of DHS

Sandbox (Bot

Execution)

Bot Detection

Engine

1 2 3

Malware collection Data Base

Antivirus

Bot hunter

Bot Binary databaseBotnet Tracking

database

Central server

Botnet Tracking engine

Page 28: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots
Page 29: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots
Page 30: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

IPTABLES

ARGUS

SNORT

POF

SEBEKD

TCPDUMP

HFLOWDHFLOW

DB

WALLEYE

PCAP DATA

ETH0

SEBEK CLIENT

HONEYPOT

ETH1(0.0.0.0)

REVERSE FIREWALL RULES(CONTROL OUTBOUND TRAFFIC)

ETH2

GUIWEB INTERFACE

CONVERT INTO UNIFIED FORMAT

HONEYWALL

DATA ANALYSIS STEPS

Collect & Merge

Page 31: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Walleye Web Interface “Eye on the Honeywall” is a web based

interface for Honeywall Configuration, Administration and Data analysis

Page 32: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Honeywall Roo Logical Design

Page 33: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots
Page 34: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Walleye Analysis Interface

Page 35: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Botnet Detection

Page 36: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Introduction

Botnet Problem Typical Botnet Life Cycle How Botnet Grows Challenges for Botnet detection Roadmap to Detection system Botnet Detection Approaches Our Implemented Approach Experiments and results

Page 37: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

What Is a Bot/Botnet? Bot

A malware instance that runs autonomously and automatically on a compromised computer (zombie) without owner’s consent

Profit-driven, professionally written, widely propagated

Botnet (Bot Army): network of bots controlled by criminals Definition: “A coordinated group of malware

instances that are controlled by a botmaster via some C&C channel”

Architecture: centralized (e.g., IRC,HTTP), distributed (e.g., P2P)

Page 38: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Botnets are used for …

All DDoS attacks Spam Click fraud Information theft Phishing attacks Distributing other malware, e.g., spywarePCs

are part of a botnet!”

Page 39: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Typical Botnet Life Cycle

Page 40: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

How the Botnet Grows

Page 41: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

How the Botnet Grows

Page 42: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

How the Botnet Grows

Page 43: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

How the Botnet Grows

Page 44: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

IRC Botnet Life Cycle

Page 45: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Challenges for Botnet Detection

Bots are stealthy on the infected machines –We focus on a network-based solution Bot infection is usually a multi-faceted and

multiphase process – Only looking at one specific aspect likely to fail Bots are dynamically evolving Botnets can have very flexible design of C&C channels –A solution very specific to a botnet instance is not desirable

Page 46: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Related Work

Network Level ◦ G. Gu, J. Zhang, andW. Lee. BotSniffer: Detecting

botnet command and control channels in network traffic

◦ J. R. Binkley and S. Singh. An algorithm for anomaly-based botnet detection

◦ J. Goebel and T. Holz. Rishi: Identify bot contaminated hosts by irc nickname evaluation

◦ C. Livadas, R. Walsh, D. Lapsley, and W. Strayer. Using machine learning technliques to identify botnet traffic

Page 47: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Related Work

Host Level◦ E. Kirda, C. Kruegel, G. Banks, G. Vigna, and R.

Kemmerer. Behavior-based spyware detection◦ R. Sekar, M. Bendre, P. Bollineni, and D. Dhurjati. A

fast automaton-based method for detecting anomalous program behaviors.

Hybrid ◦ BotMiner: Clustering analysis of network traffic for

protocol- and structure independent botnet detection

Page 48: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Botnet Detection Approaches

Setting up Honeynets (Honeynet Based Solutions) Network Traffic Monitoring:

– Signature Based

– Anomaly Based

– DNS Based

– Mining Based

Page 49: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Honeynet Based Solution

It enable us to isolate the bot from network and monitor its traffic in more controlled way, instead of waiting to be infected and then monitor the t traffic

– Bot execution in Honeynet test bed

– Monitor the traffic generated by bots Open Analysis :

– Provides connection to Internet

– More flexible than closed analysis. l

Page 50: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Our Implemented Approach

• Honeynet Based Solution– Achievements

• Approach Implemented• Honeynet Based Bot Analysis

Architecture• Payload Parser • Web GUI and report generation

Page 51: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Flowchart

Page 52: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots
Page 53: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Features

Systematically collect and analyze bot traffic over internet Provides controlled connection to Internet: rate limit the outbound connections. It uses network-based anomaly detection to identify C & C command sequences

Page 54: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Principal Mechanism for Botnet Detection

Bot Execution

- Bot Execution in Honeynet Based Environment

- Collection of Execution traces to extract C & C server information.

- Complete payload sent to central server. Payload Parser

- Extraction of IRC,HTTP command signatures Botnet Observation

- extraction of attack,propagation scan or other attack

commands

- extraction of specific network patterns,secondary

injections attempts Output

- List of unique C & C server

- Command exchanged between bot client & bot server

Page 55: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Experimental Result

Botname : B14 , MD5 : a4dde6f9e4feb8a539974022cff5f92c

Symantec : W32.IRCBot, Microsoft : Backdoor:Win32/Poebot

PASS 146751dhzx

:ftpelite.mine.nu

NICK kcrbhf8wlzo

USER XPUSA6059014236 0 0 :o4dfmj2ctyc

:ftpelite.mine.nu

PING :AE645AF3

PONG AE645AF3

:ftpelite.mine.nu 332 kcrbhf8wlzo #100+ :| .vscan netapi 50 5 9999 216.x.x.x | .sbk windows-krb.exe | .sbk crscs.exe | .sbk msdrive32.exe | .sbk woot.exe | .sbk dn.exe | .sbk Zsnkstm.exe | .sbk cndrive32.exe |

PRIVMSG #100+ :.4[SC]: Random Port Scan started on 216.x.x.x:445 with a delay of 5 seconds for 9999 minutes using 50 threads.

Page 56: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Experimental Results: IRC

Page 57: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Bot Family Number of Samples Percentage

Rbot 70 6.28%

Poebot.gen 32 2.87

Rbot.gen 30 2.69

IRCbot.genK 22 1.99

Poebot.BT 12 1.08

IRCbot 8 0.71

Poebot.BI 6 0.54

IRCbot.genS 4 0.35

Poebot 4 0.35

Poebot.T 4 0.35

Page 58: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

In total we could identify 99 IRC-based bot binaries ,a rate of 8.25% of the overall binaries in 12 months

Page 59: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Botnet C&C Server Info

Page 60: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots

Sno Source IP count123456789

10

122.160.115.76122.160.76.92122.160.42.85122.160.1.248

122.160.74.18061.142.12.86

122.160.136.220122.160.154.222

122.161.16.82122.160.75.115

191917966605449484848

Sno Ports count123456789

445135

14341398025

3306705161

2571139111423512761

Page 61: Data Capture and Analysis C-DAC Mohali. Overview  Honeynet/Honeypot Technology ◦ Honeypot/Honeynet Backgroud ◦ Type of Honeypots ◦ Deployment of Honeypots