Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering

被引:0
|
作者
Caballero, Juan [1 ]
Poosankam, Pongsin [1 ]
Kreibich, Christian
Song, Dawn
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
关键词
protocol reverse engineering; botnet infiltration; binary analysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Automatic protocol reverse-engineering is important for many seemly applications. including the analysis and defense against botnets. Understanding the command-and-control (C&C) protocol used by a hornet is crucial for anticipating its repertoire of nefarious activity and to enable active botnet infiltration Frequently. security analysts need to rewrite messages sent and received by a bot in order to contain malicious activity and to provide the botmaster with an illusion of successful and unhampered operation To enable such rewriting, we need detailed information about the intent and structure of the messages in both directions of the communication despite the fact that we generally only have access to the implementation of one endpoint, namely the bot binary Current techniques cannot enable such rewriting In this paper, we propose techniques to extract the format of protocol messages sent by an application that implements a protocol specification. and to infer the field semantics for messages both sent and received by the application Our techniques enable applications such as rewriting the C&C messages for active hornet infiltration We implement our techniques into Dispatcher. a tool to extract the message format and field semantics of both received and sent messages. We use Dispatcher to analyze MegaD. a prevalent spam hornet employing a hitherto undocumented C&C protocol. and show that the protocol information extracted by Dispatcher can be used to rewrite the C&C messages
引用
收藏
页码:621 / 634
页数:14
相关论文
共 50 条
  • [1] Automatic protocol reverse-engineering: Message format extraction and field semantics inference
    Caballero, Juan
    Song, Dawn
    COMPUTER NETWORKS, 2013, 57 (02) : 451 - 474
  • [2] Automatic instruction scheduler retargeting by reverse-engineering
    Bridges, Matthew J.
    Vachharajani, Neil
    Ottoni, Guilherme
    August, David I.
    ACM SIGPLAN NOTICES, 2006, 41 (06) : 228 - 238
  • [3] Protocol Reverse-Engineering Methods and Tools: A Survey
    Huang, Yuyao
    Shu, Hui
    Kang, Fei
    Guang, Yan
    COMPUTER COMMUNICATIONS, 2022, 182 : 238 - 254
  • [4] Automatic protocol reverse engineering using grammatical inference
    Xiao, Ming-Ming
    Luo, Yu-Ping
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2017, 32 (05) : 3585 - 3594
  • [5] Reverse-Engineering a Watermark Detector Using an Oracle
    Craver, Scott
    Atakli, Idris
    Yu, Jun
    EURASIP JOURNAL ON INFORMATION SECURITY, 2007, (01):
  • [6] Comparison of reverse-engineering methods using an in Silico network
    Camacho, Diogo
    Licona, Paola Vera
    Mendes, Pedro
    Laubenbacher, Reinhard
    REVERSE ENGINEERING BIOLOGICAL NETWORKS: OPPORTUNITIES AND CHALLENGES IN COMPUTATIONAL METHODS FOR PATHWAY INFERENCE, 2007, 1115 : 73 - 89
  • [7] Reverse-engineering bar charts using neural networks
    Fangfang Zhou
    Yong Zhao
    Wenjiang Chen
    Yijing Tan
    Yaqi Xu
    Yi Chen
    Chao Liu
    Ying Zhao
    Journal of Visualization, 2021, 24 : 419 - 435
  • [8] Reverse-engineering bar charts using neural networks
    Zhou, Fangfang
    Zhao, Yong
    Chen, Wenjiang
    Tan, Yijing
    Xu, Yaqi
    Chen, Yi
    Liu, Chao
    Zhao, Ying
    JOURNAL OF VISUALIZATION, 2021, 24 (02) : 419 - 435
  • [9] A Survey of Automatic Protocol Reverse Engineering Tools
    Narayan, John
    Shukla, Sandeep K.
    Clancy, T. Charles
    ACM COMPUTING SURVEYS, 2015, 48 (03)
  • [10] Using Qualitative Probability in Reverse-Engineering Gene Regulatory Networks
    Ibrahim, Zina M.
    Ngom, Alioune
    Tawfik, Ahmed Y.
    IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, 2011, 8 (02) : 326 - 334