Practical Defense-in-Depth Protection against Botnets

ISSA
DEVELOPING AND CONNECTING
CYBERSECURITY LEADERS GLOBALLY
Practical Defense-in-Depth
Protection against Botnets
By Mariusz Stawowski – ISSA Senior Member, Poland Chapter
)V[UL[ZHYLHWYPTHY`YPZRMVY[OLTHQVYP[`VMJVTWHUPLZ;OL`\ZLT\S[PWSLH[[HJR]LJ[VYZHZ
^LSSHZUL^ZVWOPZ[PJH[LKL]HZPVU[LJOUPX\LZ;OPZHY[PJSL^PSSKPZJ\ZZOV^HKLMLUZLPUKLW[O
strategy can be practically adopted to build a multi-layer security system that will effectively
KLMLUK0;Z`Z[LTZHNHPUZ[IV[UL[Z
Abstract
Botnets are a primary risk for the majority of companies.
They use multiple attack vectors as well as new, sophisticated
evasion techniques. In practice no single security technology can provide efficient protection against this threat. The
safeguards and management systems have to operate in the
same areas as the botnets operate, i.e,. they should control
the malware (bots) distribution infrastructure, command
and control communications, as well as “zombie army” activities. As most of the attacks use social engineering targeted
at the company’s employees, the security awareness program
deployed in the scope of the entire company is a key element
of effective protection. This article will discuss how a defensein-depth strategy can be practically adopted to build a multilayer security system that will effectively defend IT systems
against botnets.
N
owadays everyone working in IT has heard about
botnets and understands that it is a serious threat,
one that can result in serious consequences for the
companies as well as the end users of computers and mobile
devices, one that can result in many more consequences than
any other threat before.
In the past botnets were mostly used to launch distributive
denial of service (DDoS) and click-fraud attacks against targeted websites. Nowadays it is a much more sophisticated and
flexible tool, rapidly developed by cybercriminals. For example, the GameOver Zeus (GOZ) botnet was used primarily
to capture banking credentials from infected computers, and
then use those credentials to initiate or re-direct wire trans-
28 – ISSA Journal | July 2014
fers to accounts controlled by cybercriminals.1 GOZ also distributed CryptoLocker ransomware that encrypted the files
of the victims’ computers, extorting an amount of $750 USD
or more to receive the password necessary to unlock the files.2
According to the FBI, the GOZ botnet predominately spread
through spam email or phishing messages. Botnets are built
using many infection methods, including popular social networks.3
For cybercriminals the botnets—a global network of compromised computers and mobile devices—are powerful online
tools that can be used for many purposes. Technically the
botnet can conduct the same malicious activities as hackers;
it is centrally managed by people and has the same intelligence as its operators. For companies the danger of the botnets is twofold: the company can be attacked by the botnet
(e.g., a DDoS attack can disturb IT services, money can be
stolen from e-banking accounts, computers can be blocked
by ransomware, smartphones can be used to send expensive
text messages, etc.) or the company’s computers and mobile
devices can become a part of the botnet and used by the cybercriminals to attack other companies. The danger is not
only to infected computers but also to the company’s servers
being used to distribute malware to build the botnets, e.g.,
hacked websites (watering hole attacks, for instance).
1 “GameOver Zeus Botnet Disrupted, Collaborative Effort among International
Partners,” FBI – http://www.fbi.gov/news/stories/2014/june/gameover-zeus-botnetdisrupted.
2 “International Action against Gameover Zeus Botnet and CryptoLocker
ransomware” – https://www.europol.europa.eu/content/international-action-againstgameover-zeus-botnet-and-cryptolocker-ransomware.
3 Jonell Baltazar, Joey Costoya, Ryan Flores, “The Real Face of KOOBFACE: The
Largest Web 2.0 Botnet Explained,” Trend Micro – http://www.trendmicro.com/
cloud-content/us/pdfs/security-intelligence/white-papers/wp_the-real-face-ofkoobface.pdf.
Practical Defense-in-Depth Protection against Botnets | Mariusz Stawowski
Anatomy of botnet
Planning the protections against botnets, companies should
take into consideration the principle known in the military
world, described more than two thousand years ago by Sun
Tzu in The Art of War: “If you know the enemy and know
yourself, you need not fear the result of a hundred battles. If
you know yourself but not the enemy, for every victory gained
you will also suffer a defeat. If you know neither the enemy
nor yourself, you will succumb in every battle.”
Understanding a botnet’s anatomy is key to effective defense
against it. A description of communication and main components of a botnet is presented in figure 2.
Figure 1 – Example of the botnet offer in crime-as-a-service
A list of malicious activities related to the botnets is long.
A “zombie army” consisting of thousands of infected computers (zombies) can conduct massive distributed denial of
service (DDoS) attacks against a single site or network and
generate high charges in pay-per-click online advertising, so
called click-fraud. Portions of the zombie army can also be
offered as crime-as-a-service (see figure 1).
Individual infected zombie computers can be utilized for
many activities that are dangerous to the company and its
employees:
Figure 2 – Concept of communication and botnet’s main components
‡ Email accounts to distribute malware to the the company’s customers and partners
A botnet is a distributed IT system consisting of three main
areas:4
‡ Social networks accounts to distribute hostile links to
friends as well as business partners
Bots distribution infrastructure – malware delivery system using many infection methods (e.g., Bredolab and
Pushdo/Cutwail botnets: email phishing; Koobface and
Kelihos (C version) botnets: social networks phishing;
Mariposa and Kneber botnets: trojanized applications;
Conficker and Gumblar: drive by download).
‡ Smartphones to send expensive text messages—premium messaging
‡ Steal money using the employee’s e-banking account,
e-commerce account, or credit card numbers
‡ Blackmail for regaining control of computer or data—
ransomware
‡ Blackmail for non-disclosure of private or intimate
photos—camjacking
‡ Computers used to distribute illegal content, such as
drug sale offers or child pornography
‡ Computers used to conduct attacks on other computers accessible on the network, e.g., exploits to infect
other computers
‡ Computers used to steal confidential data, e.g., intellectual property, financial data, personal data, etc.
‡ Conduct many other specific activities, depending on
the situation and the criminals’ current needs
For an efficient detection and mitigation of a cyberthreat, the
security staff has to know and understand it. This article will
analyze the anatomy of a botnet, describe how the bots distribution infrastructure operates, and discuss a security strategy that can be efficient against this threat.
Zombie army – infected computers and mobile devices
used by cybercriminals to conduct different types of malicious activities (e.g., Bredolab and Storm botnets: sending spam and data theft; Mariposa botnet: DDoS attacks;
Citadel botnet: stealing money from e-banking accounts;
Android SMS trojan botnet: premium messaging).
Command and Control (C&C) – central management
system of distributed zombie army (owner of the botnet is
called botmaster), utilizing many different network communication protocols (e.g., HTTP, Internet Relay Chat
(IRC), C&C proprietary protocols, protocols tunneling in
HTTPS, P2P, IM, DNS, etc.).
Bots distribution infrastructure
Malicious software used by the botnets has evolved to be more
and more effective. From the technical point of view current
4 Francois Begin, “BYOB: Build Your Own Botnet and Learn How to Mitigate the
Threat Posed by Botnets,” The SANS Institute – http://www.sans.org/reading-room/
whitepapers/malicious/byob-build-botnet-33729; “CERT Polska Report 2013,” NASK
2014 – http://www.cert.pl/PDF/Report_CP_2013.pdf; Botnet, Wikipedia – http://
en.wikipedia.org/wiki/Botnet.
July 2014 | ISSA Journal – 29
Practical Defense-in-Depth Protection against Botnets | Mariusz Stawowski
versions of bots are similar to advanced persistent threats
(APT). The malware utilizes a combination of advanced infection and evasion techniques and allows cybercriminals to
keep control of computers and mobile devices undetected for
a long time. Because companies are enhancing their security
posture, cybercriminals are adapting to counter these measures and use new, more sophisticated evasion techniques as
well as targeted attack methodologies, previously typical only
for spearphishing and APT.5
Security analysts distinguish APT from the botnets mostly based on their operations.6 APT is a targeted attack that
wants to remain invisible for as long as possible. APT operators conduct “low and slow” attacks, i.e., silently and slowly
moving from one compromised system to the next selected
target without generating regular or predictable network traffic to avoid detection by the security management systems.
The botnet’s main objective is to achieve high financial profits
as soon as possible. Cybercriminals have developed dedicated
crimeware tools to quickly build new botnets if the botnet
is taken down. Recently national law enforcement agencies,
ISPs, and other institutions responsible for Internet security
have been making a great effort to dismantle the botnets. The
5 Loucif Kharoun, “Cybercriminals Use What Works: Targeted Attack Methodologies
for Cybercrime,” Trend Micro – http://www.trendmicro.com/cloud-content/us/pdfs/
security-intelligence/white-papers/wp-cybercriminals-use-what-works.pdf.
6 “Advanced Persistent Threats (APTs): Take Back Command-and-Control,” Damballa
– https://www.damballa.com/downloads/r_pubs/advanced-persistent-threat.pdf.
30 – ISSA Journal | July 2014
most effective technique is called DNS Sinkhole.7 C&C servers are mostly accessible with DNS names. A sinkhole is a
specially prepared server that emulates the activity of a C&C
server. Taking over the domains used by the C&C and redirecting the traffic to the sinkhole server can result in the
cybercriminals losing control of their infected computers.
NASK in Poland has also achieved success in this field.8
Bots distribution infrastructure uses many attack vectors:
‡ Trojanized applications (backdoors) – a malicious application is added to another, harmless application and distributed using the Web, email, P2P, IM, etc.
‡ Drive-by download – the attacks carried out from websites where cybercriminals have injected malicious code
(e.g., exploits utilizing the vulnerabilities of web browsers and other client-side applications). Websites containing the exploits or redirecting to other malicious sites are
called watering holes.
‡ Phishing – social engineering attacks conducted through
email, text messages, and social networks (e.g., Facebook,
Twitter), often combined with other attack techniques like
trojanized applications and drive-by downloads.
7 Guy Bruneau, “DNS Sinkhole,” The SANS Institute – http://www.sans.org/readingroom/whitepapers/dns/dns-sinkhole-33523.
8 “NASK shuts down dangerous Virut botnet domains,” NASK – http://www.nask.pl/
newsID/id/827.
Practical Defense-in-Depth | Mariusz Stawowski
There are many factors contributing to the creation of botnets. The following significantly help cybercriminals in their
activities:
Donn’s Corner
By Donn Parker
ISSA Distinguished Fellow
Silicon Valley, USA Chapter
apter
‡ Low levels of the security awareness among employees of
the companies
‡ Large number of vulnerabilities in operating systems and
applications
‡ Easy access to professional crimeware, especially in the
Deep Web (i.e., hidden Internet sites accessible with Tor)
‡ Low effectiveness of commonly used computer safeguards
like antivirus and intrusion prevention
‡ The company’s concerns about stability of new security
solutions, i.e., companies delay deployment of next-generation firewalls and anti-malware sandboxes capable of detecting new intrusion methods as they are not sure about
stability and are afraid of disturbing legitimate network
communication
Nowadays it is very easy to have 0-day malware, especially
with publicly available tools like Rapid7 Metasploit.9 So called
exploit kits allow quick creation of PDF, MS Office, or EXE
files containing working exploits that are undetectable by
most of antivirus programs. Figure 3 shows an antivirus analyze by VirusTotal10 of a newly generated malicious EXE file
generated with Metasploit. Typically less than 10% of antivirus scanners are able to detect newly generated malicious
files. Exploit kits are available as legal commercial software
and also as crimeware sold on the hidden marketplaces.11
There are plenty of the exploit kits such as Cool Exploit Kit,
Blackhole Exploit Kit, Red Kit, and Nuclear Exploit Pack.12
Sometimes they include 0-day exploits utilizing unknown
vulnerabilities that make them very effective intrusion tools.13
Checklists
I LIKE BRANDEN WILLIAMS’ COLUMN, “Checklists Are Good for
Security Too,” (ISSA Journal, February, 2014, page 6). Checklists have
gotten a bum rap in information security. Their use in security reviews has implied amateur, shallow evaluations, e.g., that a control
might exist but nothing is said or implied about its validity and effectiveness. I saw big consulting firms send hoards of newbies into
an enterprise with review checklists in hand with one or two word
items to search for and check off vulnerabilities and security controls and practices.
I found checklists to be necessary and valuable when used as reminders to comprehensively find all vulnerabilities, assets, and
security controls and practices for evaluation and analysis. It is not
possible to remember everything to consider in doing a comprehensive security review. Checklists are required. Admittedly attackers don’t use the same checklist you do. That is why you need to
make your checklists as comprehensive as possible to incorporate
theirs as much as possible. You are in a checklist war.
The checklists must be at the right level of abstraction to be comprehensive. A checklist must be constructed by adding items not
obviously included in other items and made meaningful when
quickly read and applied. A check-off for presence or absence of
each item requires additional notations when variation from implied meaning is not enough. Here are several maxims.
19. At the right level of abstraction, detail, and comprehensiveness, security checklists are valuable aids, but only aids.
20. Remember, your adversaries use different checklists than
yours.
21. Never assume a checklist is complete.
Here are some examples of lists that I have used in doing more than
200 client reviews. At every opportunity I challenge others to discover any items I have overlooked at the level of the checklist abstraction I have chosen.
Functions of information security
Confidentiality, Possession and control, Integrity, Authenticity,
Availability, Utility
Types of controls and practices
Figure 3 – Example of analysis showing that most antivirus programs do not
detect generated malware
Evasion techniques
Botnets provide huge financial profits for the cybercriminals,
so they can invest in developing new, sophisticated evasion
Avoidance , Deterrence, Prevention, Detection , Mitigation, Investigation (forensics), Transference (of responsibility to others or
insurers), Audit and monitor, Sanctions against perpetrators , Rewards for exemplary security performance, Backup and recovery,
Correction, Motivation to support security, Security training and
awareness
Intentional information abuse and misuse
9 David Maloney, “Evading Anti Virus Solutions with Dynamic Payloads in Metasploit
Pro,” Rapid7 – http://www.youtube.com/watch?v=1LZCb4HJlkI.
10 VirusTotal online malware detection service – https://www.virustotal.com.
11 Updated: List of Hidden Marketplaces (Tor & I2P) – http://www.deepdotweb.
com/2013/10/28/updated-llist-of-hidden-marketplaces-tor-i2p/.
12 An Overview of Exploit Packs (Update 20) Jan 2014 – http://contagiodump.blogspot.
com/.
13 Chris Astacio, “New Java Zero Day Used in Exploit Kits,” Websense Security Labs
Blog – http://community.websense.com/blogs/securitylabs/archive/2013/01/10/newjava-zero-day-used-in-exploit-kits.aspx.
Destroy, Interfere with use, Use false data, Modify or replace,
Misrepresent or repudiate, Misuse or fail to use , Locate, Disclose,
Observe, Copy, Take, Endanger, Failure to support
Next month I take up our cybercrime adversaries.
Donn Parker, CISSP, Retired, Distinguished Fellow, and
information security pioneer, [email protected].
July 2014 | ISSA Journal – 31
Practical Defense-in-Depth Protection against Botnets | Mariusz Stawowski
BOTS DISTRIBUTION INFRASTRUCTURE
ZOMBIE ARMY
COMMAND & CONTROL
Social engineering (email, social networks)
Disable computer safeguards (AV, etc.)
Peer-to-peer communication model
Watering-hole hosting exploits at specific folders Redirect requests for safeguards updates (disable AV updates, etc.)
Domain name generation algorithm (DGA)
0-day exploits, 0-day malware
Sleep mode (evasion for anti-malware sandbox)
Regular malware code changes
Droppers using encrypted payload, shellcode
copied to memory (no physical files), malware
code injected into system processes
AV signature evasion: encrypted malware configuration, shellcode
encoding, self-modifying code/polymorphic code
Tor (hidden, anonymous communication)
Fast-flux: hide malware delivery sites with DNS
changes and proxies
Kernel mode rootkit
Traffic tunneling, encryption
Dynamic code generation
Valid digital certificate
Google cloud messaging
Table 1 – Summary of evasion techniques utilized by botnets
techniques that make the attacks difficult to detect. Social
engineering is a commonly used technique, especially in the
social networks attacks, which are often used because they
are difficult to control by the security systems of most companies. As mobile devices are increasingly being used for the
business purposes, bots have evolved from the computer versions to those dedicated for smartphones: computer versions
of banking trojans, e.g., Zeus, (man-in-the-browser) have
quickly evolved to mobile versions (man-in-the-mobile and
man-in-the-phone).
Often to avoid detection malware delivery is conducted with
specially crafted code called a dropper.14 The dropper itself
does not contain malicious code; instead it is more like a malware installer. The dropper is difficult to detect by antivirus
because it is not an infected file but carries the code to “drop”
the malware into a system. Its role is to install malware at the
proper time and conditions, e.g., when the user works on an
administrator account. Droppers can be delivered to computers and mobile devices with exploits and social engineering,
e.g., bundled in a game installer or codec required to play a
downloaded movie.
are a popular and effective method for delivering malware.
Many companies do not have effective safeguards against
0-day threats. A summary of evasion techniques utilized by
botnets is presented in table 1. Details about the evasion techniques can be found at many Internet sites (e.g., knowledge
bases and blogs of security vendors).
Defense-in-depth strategy
Defense-in-depth as a term is derived from the military
world. It means that there is no possibility of protecting
against a strong enemy using only one weapon type, i.e., effective armed forces should have infantry, tanks, aircrafts,
helicopters, as well as a navy if the country expects military
activities on the sea. Likewise, IT security system should have
many protections capable of protecting IT resources against
different attack methods and evasion techniques. Defense-indepth in IT security is also called layered defense. Figure 4
presents an concept of layered defense against the botnets.
Droppers use many techniques to prevent malware detection
by the computer safeguards:
‡ Encrypted payload (e.g., malicious functionality and
C&C addresses are hidden)
‡ Shellcode is copied directly to the computer memory—there are no physical files dropped into the computer file system)
‡ Malware code is injected into other, legal computer
processes (e.g., explorer.exe)
Attacks from trusted websites, known us watering-hole attacks, are becoming very sophisticated. To avoid detection,
an infected website does not automatically attack the visitors.
The exploits are located in specific directories available with
specific links sent to the victims in phishing attacks as well as
unsuspecting visitors. Still 0-day malware and 0-day exploits
14 ZACCESS/SIREFEF Arrives with New Infection Technique, Trend Micro Security
Intelligence Blog – http://blog.trendmicro.com/trendlabs-security-intelligence/
zaccesssirefef-arrives-with-new-infection-technique/; “Threat Refinement Ensues
with CryptoLocker, SHOTODOR Backdoor,” Trend Micro Security Intelligence
Blog – KWWSEORJWUHQGPLFURFRPWUHQGODEVVHFXULW\LQWHOOLJHQFHWKUHDWUHÀQHPHQW
ensues-with-crypto-locker-shotodor-backdoor/; James Wyke, “The ZeroAccess
Rootkit,” SophosLabs – http://nakedsecurity.sophos.com/zeroaccess2/.
32 – ISSA Journal | July 2014
Figure 4 – Layered defense: multi-layer security system controls malware
distribution infrastructure, zombie army activities, and C&C communication
In practice companies are not able to eliminate all IT systems
vulnerabilities. The protections should be designed and implemented in a way that intruders and malware are not able
to exploit existing vulnerabilities. Even 0-day exploits using
vulnerabilities unknown to the vendors and security providers can be mitigated. For this purpose companies should deploy a vulnerability management program using dedicated
tools as well as design and implement the safeguards of IT
Practical Defense-in-Depth Protection against Botnets | Mariusz Stawowski
systems according to recognized security principles like the
segmentation (security zones), layered defense, and least privilege. More information about the principles of secure networks designing are available in “Network Security Architecture,” published in the May 2009 ISSA Journal.15 Even if the
exploit attack is successful, the safeguards should block C&C
connections that allow an intruder to control an attacked IT
system.
Additionally, the security awareness program (i.e., trainings,
audits, motivation) should reduce user susceptibility to the
attacks utilizing social engineering such as being more aware
of links in email and social networks that could lead to malicious websites. Table 2 presents a summary of advantages
provided by proper IT security system design.
According to recent tests conducted by independent companies, next-generation firewalls provide good protection
against drive-by download attacks (e.g., NSS Labs tested
many NGFWs; also CLICO verified NGFWs in real penetration tests). Nowadays most companies are aware of this
threat and deploy or plan to deploy appropriate safeguards.
But they are less aware of the real danger to their websites,
many believing their websites do not need protection because
they contain only public data. They do not understand that
cybercriminals prey on such weakly protected websites to
distribute malware.16
A watering-hole attack, for instance, requires two types of
protections:
SEGMENTATION (SECURITY ZONES)
ADVANTAGES
LAYERED DEFENSE
ADVANTAGES
1. Safeguards against drive-by download attacks at the employee’s computer and mobile device—cybercriminals
want to infect the end user’s devices
Isolation of low-trust network areas that can
be potentially used to launch attacks against
strategic IT system resources
Response to many attack
vectors and reduction of
attack surface
2. Safeguards against specific attacks at the company’s website—cybercriminals want to infect the company’s website
and convert it to a watering hole
Limiting a security breach scope to one system Guard against failure or
weakness of one component
or network segment, as well as limiting the
of the security system
incident from spreading to other systems
Accurate network access control to IT system
resources as well as monitoring and auditing
of the resource usage
Slow down the penetration
and deter the intruders
Quick identification of IT systems security
incidents based on the events detected in the
network areas where these events should
never occur (e.g., unknown traffic from the
company’s servers)
Quick identification of
infected systems and limitation of malicious activities
Table 2 – Summary of advantages provided by proper security system design
For effective botnet detection and mitigation IT security systems should be built with appropriate defenses and should
operate in the same areas as the botnets operate, i.e., they
should control the malware (bots) distribution infrastructure
and C&C communication, as well as zombie army activities.
It means that multi-layer security systems should protect
employee computers and mobile devices against malware
distribution infrastructure (e.g., drive-by download, phishing); protect the company’s websites and email servers from
being compromised to distribute malware; detect and block
malicious activities conducted by the zombie army (e.g., detect DDoS and exploit attacks conducted from the company’s
computers), as well as detect and block communications with
the botnet central management system (C&C).
New safeguards
New kinds of safeguards provide effective protection against
attacks and evasion methods used by the botnets. For example, next-generation firewalls (NGFW) restrict employee
access only to those Internet applications that are approved
and necessary. All other applications are blocked. In this way
the NGFW reduces the risk of malware infection as well as
increase employee productivity.
15 Mariusz Stawowski, “Network Security Architecture,” ISSA Journal, May 2009.
New types of anti-malware solutions based on sandboxing
technology are capable of detecting malware without signatures. Unknown files that can potentially include malicious
code (e.g., PDF, EXE, Microsoft Office) are opened in virtualized environments and analyzed to detect malicious activities
(e.g., access to registries, system file changes, shellcode download). In this way 0-day malware can be detected.
Another new security technology, database firewalls are capable of protecting a company’s business data from specific
database attacks as well as privileged users, e.g., database administrators, in case they attempt to commit fraud or their
workstations are infected by malware and controlled by cybercriminals.
Website safeguards
Using web-specific attacks like SQL-Injection17 or Stored
XSS,18 cybercriminals can lay traps on websites with exploits
to conduct drive-by download attacks that infect the computers of people visiting the site such as customers, business partners, employees. According to Gartner’s report, “Web Application Firewalls Are Worth the Investment for Enterprises,”19
firewalls and intrusion prevention systems (IPS) do not provide sufficient protections for most public-facing websites or
internal business-critical and custom web applications.
Network firewalls and IPSs are essential for building the
network security architecture, along with security zones, as
well as defending against numerous network attacks such
as exploits against network services, operating systems, and
16 On-line service tracking websites delivering malware – http://www.
malwaredomainlist.com.
17 More information about SQL-injection attacks can be found at Open Web
Application Security Project – https://www.owasp.org/index.php/SQL_Injection.
18 More information about Cross-site Scripting attacks can be found at Open Web
Application Security Project – https://www.owasp.org/index.php/Cross-site_
Scripting_(XSS).
19 Jeremy D'Hoinne, Adam Hils, “Web Application Firewalls Are Worth the Investment
for Enterprises,” Gartner 2014 – https://www.gartner.com/doc/2673820/webDSSOLFDWLRQÀUHZDOOVZRUWKLQYHVWPHQW.
July 2014 | ISSA Journal – 33
Practical Defense-in-Depth Protection against Botnets | Mariusz Stawowski
network worm distributions, etc. However, in reality it is not
possible to ensure the safety of web applications using only
conventional firewall and IPS protections. These protections
deploy techniques based on known signatures, i.e., attack patterns. Web applications, which are usually developed on business request, contain unique vulnerabilities not known to the
vendors of IPS protections. For this reason they are unable to
create adequate signatures. Moreover, other techniques used
in conventional IPS solutions, such as heuristics and protocol
anomaly detection, are also ineffective for web application
protection as most of the attacks are conducted through legitimate HTTP traffic.
An effective protection for web applications is provided by the
dedicated web application firewall (WAF). WAF protections
are mainly based on the automatically created and updated
profile of the protected web application. A WAF “learns” the
application’s structure, URLs, parameters, cookies, etc. The
purpose for creating the profile is to define the expected and
proper user activity as observed when a web application is accessed. The main difference between an IPS and a WAF is the
approach to network traffic control. An IPS uses the blacklist
approach, accepting whole network traffic except the pack-
BOTNET AREA
Bots distribution
infrastructure
Bots central
management
Zombie army
ets identified as illegitimate. As a consequence all traffic not
blocked by the IPS reaches the web application. WAF, on the
other hand, uses the whitelist approach, accepting only the
network traffic identified as legitimate, based on the generated web application profile. Thus, traffic not identified as legitimate is blocked by the WAF, and the attacks cannot reach
the web application. The Payment Card Security Standard
Data Security Standard (PCI-DSS) states the need to deploy
WAF.20
Nowadays one of the most difficult security challenges is defense against botnet DDoS attacks. Most security experts21
believe that effective DDoS protection should combine onpremise dedicated DDoS mitigation controls and ISP- or
cloud provider-based DDoS scrubbing. Many DDoS attacks
combine brute force attacks with targeted application-level
DDoS. There is no single security solution that in the case of
such attack is able to maintain network bandwidth, handle
high-volume attacks, and ensure business applications avail20 Requirements and Security Assessment Procedures, Payment Card Industry (PCI)
Data Security Standard – https://www.pcisecuritystandards.org/documents/PCI_
DSS_v3.pdf.
21 John Pescatore, “DDoS Attacks Advancing and Enduring: A SANS Survey,” SANS
Institute – http://www.sans.org/reading-room/whitepapers/analyst/ddos-attacksadvancing-enduring-survey-34700.
ATTACK VECTORS, EVASION TECHNIQUES,
COMMUNICATION PROTOCOLS
WHAT PROTECTIONS ARE IN PLACE?
Social engineering in emails and text messages
t Does our security awareness program cover all employees?
t How often have all employees had security awareness training?
Social engineering in social networks
t Do our safeguards control employee use of social networks from their computers
and mobile devices?
t What safeguards do we have that prevent employees from using unnecessary
Internet services and particularly social networks applications?
Watering holes (drive-by download)
t Have we tested our safeguards’ effectiveness against client-side threats and particularly drive-by download attacks?
t Do our safeguards control encrypted traffic from untrusted Internet sites?
t How are our websites protected against specific web attacks (e.g., SQL-Injection,
XSS)?
Trojanized applications distributed by Web,
email, P2P, IM, Tor, Skype, etc.
t Do our safeguards inspect popular protocols like HTTP, FTP, and SMTP against
malware?
t Do our safeguards recognize and control applications tunneling in other traffic like
P2P, IM, Tor, and Skype?
0-day malware
t What safeguards do we have that are capable of detecting and blocking 0-day
malware?
Infected computers, smartphones, and tablets
communicate with C&C
t Do our safeguards detect infected computers communicating with a C&C?
t Do our safeguards detect infected mobile devices communicating with a C&C?
Infected computers and mobile devices
conduct malicious activities
t What safeguards do we have that control illegal content being distributed from the
company’s computers and mobile devices?
t What safeguards do we have that control the attacks conducted (e.g., exploits,
DDoS) from the company’s computers and mobile devices?
t What safeguards do we have that control confidential data theft from the company’s computers and mobile devices?
t What safeguards do we have that control the attacks conducted from the company’s
websites, i.e., detecting watering holes?
t What technical and operational protections do we have to mitigate DDoS attacks
against our IT systems?
Table 3 – Simple botnet protection self-assessment questionnaire
34 – ISSA Journal | July 2014
Practical Defense-in-Depth Protection against Botnets | Mariusz Stawowski
ability. DDoS protection and mitigation is the shared responsibility of personnel from both security and IT/network operations. Efficient DDoS mitigation requires a flexible security
architecture that combines on-site and upstream detection
and mitigation with regular testing of capabilities.
The main objective of the safeguards is to provide so-called
virtual patches that protect IT systems from exploiting their
vulnerabilities and reduce the risk of the company’s computers and mobile devices become part of the botnet or being
compromised by other cybercriminal activities (e.g., APT).
Companies should not assume that their IT systems will
never be infected. Instead, they should implement security
management tools to quickly identify IT systems controlled
by cybercriminals, such as, security information and events
management (SIEM) and network behavior anomaly detection (NBAD). It is also important to remember that the security awareness program—employee education, auditing, and
motivation—operating in the scope of the entire company is
a key element of the company’s security strategy. Nowadays
most attacks conducted by cybercriminals utilize social engineering against the employees, and they should be aware of it.
For companies it is reasonable to determine if their security systems contain appropriate protections against attack
methods currently used by cybercriminals to infect, control,
and utilize the company’s IT resources. For this purpose the
checklist (self-assessment questionnaire) presented in table 3
can be used.
Summary
Botnets use multiple attack vectors and utilize new, sophisticated evasion techniques. In practice no single security technology can provide effective protection against this threat.
To be effective, security systems have to adopt a defense-indepth security strategy. The safeguards and management systems have to operate in the same areas as the botnets operate, i.e., they should control the malware (bots) distribution
infrastructure, the C&C communications, and the zombie
army activities. As most of the attacks use social engineering
targeted at the company’s employees, the security awareness
program operating in the scope of the entire company is a key
element of effective security system.
About the Author
Mariusz Stawowski, PhD, is Director of Business Development and Professional Services
of CLICO, a security technologies distributor
and service provider operating in Poland and
other Eastern European countries. For more
than 15 years he has been responsible for
management of security projects. He is an ISSA senior member, and holds CISSP and PRINCE2 Practitioner certificates.
He is an instructor teaching official (ISC)2 seminars. His doctoral dissertation was elaborated at the Military University of
Technology in the special field of IT systems security auditing
and network protections designing. Mariusz can be contacted
at [email protected].
ISSA Journal 2014 Calendar
Past Issues – click the download link:
JANUARY
Cyber Security and Compliance
FEBRUARY
Risk, Threats, and Vulnerabilities
MARCH
Legal / Privacy / Ethics
APRIL
Security and Cloud Computing
MAY
Healthcare Threats and Controls
JUNE
Identity Management
JULY
Practical Use of InfoSec Tools
AUGUST
Big Data: Use and Security Ramifications
Articles Due: 7/1/14
SEPTEMBER
History of Information Security
Articles Due: 8/1/14
OCTOBER
Data Protection Strategies and Controls
Articles Due: 9/1/14
NOVEMBER
Cyber Security / Cyber Defense
Articles Due: 10/1/14
DECEMBER
Best of 2014
PAST ISSUSES
Identity Management
Healthcare Threats and Controls
Cyber Security and Compliance
Risk, Threats, and Vulnerabilities
Legal / Privacy / Ethics
Security and Cloud Computing
You are invited to share your expertise with the association and
submit an article. Published authors are eligible for
CPE credits from organizations such as (ISC)2.
For theme descriptions, visit www.issa.org/?CallforArticles.
฀ ฀
July 2014 | ISSA Journal – 35