ProVeX: detecting botnets with encrypted command and control channels

  • Authors:
  • Christian Rossow;Christian J. Dietrich

  • Affiliations:
  • Institute for Internet Security, University of Applied Sciences Gelsenkirchen, Germany,The Network Institute, VU University Amsterdam, The Netherlands;Institute for Internet Security, University of Applied Sciences Gelsenkirchen, Germany,Department of Computer Science, Friedrich-Alexander University, Erlangen, Germany

  • Venue:
  • DIMVA'13 Proceedings of the 10th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Abstract. Botmasters increasingly encrypt command-and-control (C&C) communication to evade existing intrusion detection systems. Our detailed C&C traffic analysis shows that at least ten prevalent malware families avoid well-known C&C carrier protocols, such as IRC and HTTP. Six of these families - e.g., Zeus P2P, Pramro, Virut, and Sality - do not exhibit any characteristic n-gram that could serve as payload-based signature in an IDS. Given knowledge of the C&C encryption algorithms, we detect these evasive C&C protocols by decrypting any packet captured on the network. In order to test if the decryption results in messages that stem from malware, we propose ProVex, a system that automatically derives probabilistic vectorized signatures. ProVex learns characteristic values for fields in the C&C protocol by evaluating byte probabilities in C&C input traces used for training. This way, we identify the syntax of C&C messages without the need to manually specify C&C protocol semantics, purely based on network traffic. Our evaluation shows that ProVex can detect all studied malware families, most of which are not detectable with traditional means. Despite its naive approach to decrypt all traffic, we show that ProVex scales up to multiple Gbit/s line speed networks.