Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering

被引:0
|
作者
Caballero, Juan [1 ]
Poosankam, Pongsin [1 ]
Kreibich, Christian
Song, Dawn
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
关键词
protocol reverse engineering; botnet infiltration; binary analysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Automatic protocol reverse-engineering is important for many seemly applications. including the analysis and defense against botnets. Understanding the command-and-control (C&C) protocol used by a hornet is crucial for anticipating its repertoire of nefarious activity and to enable active botnet infiltration Frequently. security analysts need to rewrite messages sent and received by a bot in order to contain malicious activity and to provide the botmaster with an illusion of successful and unhampered operation To enable such rewriting, we need detailed information about the intent and structure of the messages in both directions of the communication despite the fact that we generally only have access to the implementation of one endpoint, namely the bot binary Current techniques cannot enable such rewriting In this paper, we propose techniques to extract the format of protocol messages sent by an application that implements a protocol specification. and to infer the field semantics for messages both sent and received by the application Our techniques enable applications such as rewriting the C&C messages for active hornet infiltration We implement our techniques into Dispatcher. a tool to extract the message format and field semantics of both received and sent messages. We use Dispatcher to analyze MegaD. a prevalent spam hornet employing a hitherto undocumented C&C protocol. and show that the protocol information extracted by Dispatcher can be used to rewrite the C&C messages
引用
收藏
页码:621 / 634
页数:14
相关论文
共 50 条
  • [21] SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels
    Radboud University, Nijmegen
    6500, Netherlands
    不详
    637553, Singapore
    不详
    2628, Netherlands
    IEEE Des. Test, 4 (7-14): : 7 - 14
  • [22] An Evaluation of Active Learning Causal Discovery Methods for Reverse-Engineering Local Causal Pathways of Gene Regulation
    Sisi Ma
    Patrick Kemmeren
    Constantin F. Aliferis
    Alexander Statnikov
    Scientific Reports, 6
  • [23] An Evaluation of Active Learning Causal Discovery Methods for Reverse-Engineering Local Causal Pathways of Gene Regulation
    Ma, Sisi
    Kemmeren, Patrick
    Aliferis, Constantin F.
    Statnikov, Alexander
    SCIENTIFIC REPORTS, 2016, 6
  • [24] Automatic Field Extraction of Extended TLV for Binary Protocol Reverse Engineering
    Huang, Zewen
    Wu, Kui
    Huang, Shengqiang
    Zhou, Yang
    Giagone, Ronnie Salvador
    2022 31ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2022), 2022,
  • [25] SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels
    Batina, Lejla
    Bhasin, Shivam
    Jap, Dirmanto
    Picek, Stjepan
    IEEE DESIGN & TEST, 2022, 39 (04) : 7 - 14
  • [26] Protocol Reverse Engineering Using LDA and Association Analysis
    Li, Haifeng
    Shuai, Bo
    Wang, Jian
    Tang, Chaojing
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 312 - 316
  • [27] PREUNN: Protocol Reverse Engineering using Neural Networks
    Kiechle, Valentin
    Boersig, Matthias
    Nitzsche, Sven
    Baumgart, Ingmar
    Becker, Juergen
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 345 - 356
  • [28] Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis
    Ma, Rongkuan
    Zheng, Hao
    Wang, Jingyi
    Wang, Mufeng
    Wei, Qiang
    Wang, Qingxian
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2022, 23 (03) : 351 - 360
  • [29] Automatic Reverse Engineering Method for Extracting Well-trimmed Protocol Specification
    Goo, Young-Hoon
    Shim, Kyu-Seok
    Kim, Myung-Sup
    PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND COMMUNICATION ENGINEERING (ICTCE 2018), 2018, : 16 - 21
  • [30] Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis
    Ma, Rongkuan
    Zheng, Hao
    Wang, Jingyi
    Wang, Mufeng
    Wei, Qiang
    Wang, Qingxian
    Frontiers of Information Technology and Electronic Engineering, 2022, 23 (03): : 351 - 360