Survey of Peer-To-Peer Botnets and Detection Frameworks
Total Page:16
File Type:pdf, Size:1020Kb
International Journal of Network Security, Vol.20, No.3, PP.547-557, May 2018 (DOI: 10.6633/IJNS.201805.20(3).18) 547 Survey of Peer-to-Peer Botnets and Detection Frameworks Ramesh Singh Rawat1;2, Emmanuel S. Pilli3 and R. C. Joshi1 (Corresponding author: Emmanuel S. Pilli) Department of Computer Science and Engineering, Graphic Era University, Dehradun, India1 Department of Computer Science and Engineering, Uttarakhand Technical University, Dehradun, India2 Department of Computer Science and Engineering, Malaviya National Institute of Technology, Jaipur, India3 (Email: [email protected]) (Received Feb. 18, 2017; revised and accepted June 25, 2017) Abstract launch attacks at global scale. Botnets are the largest threat to the cyber security of government, industries, Botnet is a network of compromised computers controlled academia and critical infrastructure etc. [4]. These pro- by the attacker(s) from remote locations via Command vide large distributed platform to perform various ma- and Control (C&C) channels. The botnets are one of the licious activities such as distributed denial-of- service largest global threats to the Internet-based commercial (DDoS), spamming, phishing, spying, click-fraud, bitcoin and social world. The decentralized Peer-to-Peer (P2P) mining, brute force password attacks and compromising botnets have appeared in the recent past and are grow- social media service [10]. ing at a faster pace. These P2P botnets are continu- Many papers have surveyed the research literature of ously evolving from diverse C&C protocols using hybrid botnets [13, 18, 20, 26], but to the best of our knowl- structures and are turning to be more complicated and edge, there is no schematic, analytical & comprehensive stealthy. In this paper, we present a comprehensive sur- survey on the emerging P2P botnets and the detection vey of the evolution, functionalities, modelling and the methods. In this paper, we exclusively discuss various development life cycle of P2P botnets. Further, we in- aspects of P2P botnets including: evolution, character- vestigate the various P2P botnet detection approaches. istics, C&C architecture and various detections methods. Finally, discuss the key research challenges useful for the The paper is useful in understanding the characteristics of research initiatives. This paper is useful in understanding P2P botnets and the classification of the various detection the P2P botnets and gives an insight into the usefulness techniques. It has the following important contributions: and limitations of the various P2P botnet detection tech- niques proposed by the researchers. The study will enable • The timeline of evolution and development life cycle the researchers toward proposing the more useful detec- of P2P botnets is presented; tion techniques. • The characteristics, architecture and functionalities Keywords: Botnet Architecture; Detection Frameworks; of P2P botnets are described; Hybrid Botnets; Peer-to-Peer Botnets; Traffic Analysis • The taxonomy and analytical survey of the various 1 Introduction detection frameworks and models is presented; • A discussion of the research challenges in detection Botnet is a network of compromised computers that are and defence of these botnets is also included. illicitly controlled and secretly used by attackers for var- ious malicious operations. The attacker controlling the The remainder of the paper is organized from Section 2 botnet is called bot master or bot herder. The compro- to Section 7. Section 2 covers the background and related mised computers in a botnet are called drones or zombies surveys. The botnet architecture and C&C protocols are and the malicious software running on them is known as discussed in Section 3. In Section 4, we have categorized bot. The term "bot" is derived from the word "robot" the various detection frameworks. Further, the detection and it is a program used to automate tasks [8]. techniques are investigated in Section 5. In Section 6, we Botnets comprise of large pool of thousand to millions have presented the identified research challenges. Finally, of compromised computers which empower the attackers Section 7 presents the summary and directions for future with huge computational power and large band-width to research work. International Journal of Network Security, Vol.20, No.3, PP.547-557, May 2018 (DOI: 10.6633/IJNS.201805.20(3).18) 548 2 Background Unstructured Botnet: Use P2P overlay links established arbitrarily and maintain neighboring peers list to Attackers exploit number of vulnerabilities and use social ensure connectivity. This architecture is inherently engineering techniques to infect more and more comput- flexible in the selection of neighboring peers and rout- ers, network/IoT devices with the malware to build the ing mechanisms. The unstructured botnets are diffi- botnet [4]. Many robust or stealthy botnets have evolved cult to be crawled and probe, since there is no specific which wrecked havoc on the cyber security. During the structure that can be exploited. onset of botnets the centralized architecture was popular. This architecture is easy to implement and monitor, but Superpeer Overlay Botnets: Select some of the globally suffers from the limitation of easy detection of the central- accessible compromised systems to form the C&C ar- ized servers. Therefore, attackers adopt the decentralized chitecture. The compromised peers behind NAT are or hybrid botnet architectures to overcome the limitations the normal peer bots and connect to any of the su- of the centralized architecture. perpeers to pull published commands. Although the The decentralized P2P or hybrid botnets belong to the design is more scalable, but the superpeers are vul- third generation. In P2P botnets attackers can directly nerable to be detected. Further, the detection and communicate the commands to any peer bot; who further removal of a superpeer does not have any significant communicate the commands to other neighboring peers. impact on the botnet, since communication can be These botnets have many robust features and stay re- redirected to the new super-peers. silient, i.e., even if a significant part of the botnet is taken Hybrid P2P Botnets: Overcame the limitations of cen- down, remaining botnet works under control of bot mas- tralized and decentralized architectures. Many of the ters [6, 34]. P2P botnets are the most prevalent in the real botnets discovered in the wild have multi-layered cyber world since they have many merits in comparison hybrid P2P architecture. This structure employs top to centralized (IRC or HTTP) botnets. layer bots as master C&C servers. The P2P network serves as relay bots at the second layer communicat- ing with the top servers and the bottom client as peer 3 Peer-to-Peer Botnets bots. Many large P2P botnets have been discovered in the wild. This clearly show a tendency towards the decentralized 3.2 Command and Control Mechanisms P2P botnets. These botnets use P2P networks as a vector The command and control (C&C) channels are used to for infestation and the peer nodes as C&C channels [1]. command the bots from remote system. The C&C layer The P2P botnets form complex overlay networks using forms the multi-tier architecture of the botnets and dif- either customized or standard P2P protocols [1]. Figure 1 ferentiate them from other malware. The various C&C shows the timeline of the P2P botnets' evolution. Table 1 architectures are based on different C&C protocols in- lists the characteristics and applications of the well-known cluding IRC, HTTP, P2P, DNS, Bluetooth, email, social P2P botnets developed over a period of time. networks and/or other custom protocols [26, 10]. The bot- nets can select either P2P protocols or non-P2P protocols 3.1 Botnet Architecture for C&C communication. The C&C operations of the botnets are categorized into Botnets are usually characterized on the basis of C&C - pull and push mechanisms. In pull mechanism bot- architecture. The model of a typical botnet can be un- masters publish commands at certain specific locations derstood by the analysis of its architecture, C&C mech- for which the peer bots subscribe and actively receive the anism and its development life-cycle. The various phases commands. The bots execute the commands and also of the botnets are shown in Figure 2. Cooke et al. [8] pre- forward to other peers in their list [24]. In push mech- sented three different botnet communication topologies: anism C&C servers push/forward the commands to peer centralized (IRC-based and HTTP-based), decentralized bots for execution. The peer bots passively wait for the (P2P-based) and random. Grizzard et al. [13] classified commands and also forward the received commands to the architecture of decentralized P2P botnets as: struc- neighboring peer bots. The bots can receive commands tured, unstructured, super-peers and hybrid. to execute using either a push or pull mechanism. The C&C activities can be detected by active moni- Structured P2P Botnets: Use the overlay structured P2P toring of the hosts connecting to the external suspected network and thus employ a globally consistent proto- hosts. Identification of botnet C&C traffic is an important col for efficient routing and search. Storm uses Over- approach to botnet defense, but identification of C&C net structured P2P overlay network protocol to build traffic is difficult since botnets use standard protocols for its C&C infrastructure. Most of the P2P botnets are communications. Moreover, the malicious traffic is simi- based on structured overlays such as Kademlia. The lar to legitimate traffic and is fused with the benign P2P botnets using public protocols let them mix the C&C communication traffic of the legitimate P2P applications traffic with the standards P2P applications. (eg, Skype); Trojan.Peacomm botnet and Stormnet are International Journal of Network Security, Vol.20, No.3, PP.547-557, May 2018 (DOI: 10.6633/IJNS.201805.20(3).18) 549 Table 1: P2P botnets and their characteristics Botnet Name Discovered Architecture a/ Functionalities b Comments Protocols Sinit Sep.