An Analysis of Botnet Vulnerabilities
Total Page:16
File Type:pdf, Size:1020Kb
Air Force Institute of Technology AFIT Scholar Theses and Dissertations Student Graduate Works 6-8-2008 An Analysis of Botnet Vulnerabilities Sean W. Hudson Follow this and additional works at: https://scholar.afit.edu/etd Part of the Digital Communications and Networking Commons, and the Information Security Commons Recommended Citation Hudson, Sean W., "An Analysis of Botnet Vulnerabilities" (2008). Theses and Dissertations. 3101. https://scholar.afit.edu/etd/3101 This Thesis is brought to you for free and open access by the Student Graduate Works at AFIT Scholar. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of AFIT Scholar. For more information, please contact [email protected]. AN ANALYSIS OF BOTNET VULNERABILITIES THESIS Sean W. Hudson, Captain, USAF AFIT/GCE/ENG/07-05 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED The views expressed in this thesis are those of the author and do not reflect the official policy or position of the United States Air Force, Department of Defense, or the U.S. Government. AFIT/GCE/ENG/07-05 AN ANALYSIS OF BOTNET VULNERABILITIES THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate School of Engineering and Management Air Force Institute of Technology Air University Air Education and Training Command In Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Engineering Sean W. Hudson, BS Captain, USAF June 2007 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED AFIT/GCE/ENG/07-05 AN ANALYSIS OF BOTNET VULNERABILITIES Sean W. Hudson, BS Captain, USAF Approved: _______/signed/_____________________ 06/08/2007 Rusty O. Baldwin, Ph.D. (Chairman) Date ____/signed/________________________ 06/08/2007 Barry E. Mullins, Ph.D. (Member) Date ____/signed/__________________________ 06/08/2007 Robert F. Mills, Ph.D. (Member) Date AFIT/GCE/ENG/07-05 Abstract Botnets are a significant threat to computer networks and data stored on networked computers. The ability to inhibit communication between servers controlling the botnet and individual hosts would be an effective countermeasure. The objective of this research was to find vulnerabilities in Unreal IRCd that could be used to shut down the server. Analysis revealed that Unreal IRCd is a very mature and stable IRC server and no significant vulnerabilities were found. While this research does not eliminate the possibility that a critical vulnerability is present in the Unreal IRCd software, none were identified during this effort. AFITiv For my wife, for her caring and support throughout the course of this thesis effort v Acknowledgments I would like to express my sincere appreciation to my faculty advisor, Dr. Rusty O. Baldwin, for his unwavering support and encouragement throughout the course of this thesis effort. Sean W. Hudson vi Table of Contents Acknowledgments.............................................................................................................. vi Table of Contents.............................................................................................................. vii List of Figures.................................................................................................................... ix List of Tables .......................................................................................................................x Abstract.............................................................................................................................. iv I. Introduction .....................................................................................................................1 1.1 Background.............................................................................................................1 1.2 Problem Statement..................................................................................................1 1.3 Research Objectives ...............................................................................................2 1.4 About this Document..............................................................................................2 II. Literature Review............................................................................................................3 2.1 Introduction ............................................................................................................3 2.2 Bots.........................................................................................................................3 2.3 Internet Relay Chat.................................................................................................4 2.4 Unreal IRC..............................................................................................................5 2.5 Dynamic DNS ........................................................................................................7 2.6 Detection Methods..................................................................................................7 2.7 Infiltration...............................................................................................................8 2.8 Vulnerability Identification ....................................................................................9 2.9 Related Research ..................................................................................................11 2.10 Summary.............................................................................................................14 III. Methodology................................................................................................................15 3.1 Problem Definition ...............................................................................................15 vii 3.2 Static Analysis......................................................................................................16 3.3 Dynamic Analysis ................................................................................................22 3.4 System Boundaries ...............................................................................................23 3.5 System Services....................................................................................................24 3.6 Workload ..............................................................................................................24 3.7 Performance Metrics ............................................................................................24 3.8 Parameters ............................................................................................................25 3.9 Factors ..................................................................................................................26 3.10 Evaluation Technique.........................................................................................26 3.11 Experimentation Design .....................................................................................27 3.12 Summary.............................................................................................................27 IV. Analysis and Results....................................................................................................28 4.1 Results and Analysis of Individual Measures ......................................................28 4.2 Summary...............................................................................................................33 V. Conclusions and Recommendations ............................................................................34 5.1 Overview and Conclusions...................................................................................34 5.2 Recommendations for Future Research................................................................34 Bibliography ......................................................................................................................36 Vita ………………………………………………………………………………………39 viii List of Figures Page Figure 1: System Under Test ............................................................................................ 23 Figure 2: Memory Utilization 10,000 Closed Connections.............................................. 28 Figure 3: Memory Utilization 50,000 Closed Connections.............................................. 29 Figure 4: Memory Utilization 100,000 Closed Connections............................................ 30 Figure 5: Memory Utilization 10,000 Attempted Connections ........................................ 31 Figure 6: Memory Utilization 50,000 Attempted Connections ........................................ 32 Figure 7: Memory Utilization 100,000 Attempted Connections ...................................... 32 ix List of Tables Page Table 1: Unreal IRCd Hardware Specifications ............................................................... 25 Table 2: Factors and their levels....................................................................................... 26 x An Analysis of Botnet Vulnerabilities I. Introduction 1.1 Background Bots are software agents designed to automatically perform tasks. Examples include web-spiders that catalog the Internet and bots found in popular online games. Hackers use bots to infect and control large numbers of computers called a botnet [BSA07]. An expert recently called botnets the “No.1 emerging Internet threat [Sie07].” Botnets are responsible for