Characterizing Bots' Remote Control Behavior

  • Authors:
  • Elizabeth Stinson;John C. Mitchell

  • Affiliations:
  • Department of Computer Science, Stanford University, Stanford, CA 94305,;Department of Computer Science, Stanford University, Stanford, CA 94305,

  • Venue:
  • DIMVA '07 Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

A botnet is a collection of bots, each generally running on a compromised system and responding to commands over a "command-and-control" overlay network. We investigate observable differences in the behavior of bots and benign programs, focusing on the way that bots respond to data received over the network. Our experimental platform monitors execution of an arbitrary Win32 binary, considering data received over the network to be tainted, applying library-call-level taint propagation, and checking for tainted arguments to selected system calls. As a way of further distinguishing locally-initiated from remotely-initiated actions, we capture and propagate "cleanliness" of local user input (as received via the keyboard or mouse). Testing indicates behavioral separation of major bot families (agobot, DSNXbot, evilbot, G-SySbot, sdbot, Spybot) from benign programs with low error rate.