Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering

被引:0
|
作者
Caballero, Juan [1 ]
Poosankam, Pongsin [1 ]
Kreibich, Christian
Song, Dawn
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
关键词
protocol reverse engineering; botnet infiltration; binary analysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Automatic protocol reverse-engineering is important for many seemly applications. including the analysis and defense against botnets. Understanding the command-and-control (C&C) protocol used by a hornet is crucial for anticipating its repertoire of nefarious activity and to enable active botnet infiltration Frequently. security analysts need to rewrite messages sent and received by a bot in order to contain malicious activity and to provide the botmaster with an illusion of successful and unhampered operation To enable such rewriting, we need detailed information about the intent and structure of the messages in both directions of the communication despite the fact that we generally only have access to the implementation of one endpoint, namely the bot binary Current techniques cannot enable such rewriting In this paper, we propose techniques to extract the format of protocol messages sent by an application that implements a protocol specification. and to infer the field semantics for messages both sent and received by the application Our techniques enable applications such as rewriting the C&C messages for active hornet infiltration We implement our techniques into Dispatcher. a tool to extract the message format and field semantics of both received and sent messages. We use Dispatcher to analyze MegaD. a prevalent spam hornet employing a hitherto undocumented C&C protocol. and show that the protocol information extracted by Dispatcher can be used to rewrite the C&C messages
引用
收藏
页码:621 / 634
页数:14
相关论文
共 50 条
  • [41] Reverse-Engineering History: Re-presenting the Chichester Tablet Using Laser Scanning and 3D Printing
    Wilson, Paul F.
    Donnelly, Mike
    King, Ellie
    Williams, Mark A.
    Cooley, Alison E.
    STUDIES IN CONSERVATION, 2023, 68 (08) : 773 - 783
  • [42] A novel method for volumetric assessment of tooth wear using three-dimensional reverse-engineering technology A preliminary report
    Park, Jina
    Choi, Dong-Soon
    Jang, Insan
    Yook, Hyun-Tae
    Jost-Brinkmann, Paul-Georg
    Cha, Bong-Kuen
    ANGLE ORTHODONTIST, 2014, 84 (04) : 687 - 692
  • [43] Model Reverse-Engineering Attack against Systolic-Array-Based DNN Accelerator Using Correlation Power Analysis
    Yoshida, Kota
    Shiozaki, Mitsuru
    Okura, Shunsuke
    Kubota, Takaya
    Fujino, Takeshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (01) : 152 - 161
  • [44] Automatic Reverse Engineering of CAN Bus Data Using Machine Learning Techniques
    Huybrechts, Thomas
    Vanommeslaeghe, Yon
    Blontrock, Dries
    Van Barel, Gregory
    Hellinckx, Peter
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC-2017), 2018, 13 : 751 - 761
  • [45] Reverse-engineering and modeling the 3D passive and active responses of skeletal muscle using a data-driven, non-parametric, spline-based procedure
    Moreno, Sonsoles
    Jesus Amores, Victor
    Benitez, Jose Ma
    Montans, Francisco J.
    JOURNAL OF THE MECHANICAL BEHAVIOR OF BIOMEDICAL MATERIALS, 2020, 110
  • [46] IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering
    Luo, Jian-Zhen
    Shan, Chun
    Cai, Jun
    Liu, Yan
    SYMMETRY-BASEL, 2018, 10 (11):
  • [47] Three-Dimensional Topography of the Gingival Line of Young Adult Maxillary Teeth: Curve Averaging Using Reverse-Engineering Methods
    Park, Young-Seok
    Chang, Mi-Sook
    Lee, Seung-Pyo
    INTERNATIONAL JOURNAL OF ORAL & MAXILLOFACIAL IMPLANTS, 2011, 26 (06) : 1217 - 1224
  • [48] Higher security of ASIC fabrication process against reverse engineering attack using automatic netlist encryption methodology
    Zamanzadeh, S.
    Jahanian, A.
    MICROPROCESSORS AND MICROSYSTEMS, 2016, 42 : 1 - 9
  • [49] ASIC Design Protection against Reverse Engineering during the Fabrication Process using Automatic Netlist Obfuscation Design Flow
    Zamanzadeh, Sharareh
    Jahanian, Ali
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 8 (02): : 93 - 104
  • [50] Engineering organic solvent reverse osmosis in hybrid AlOxHy / polymer of intrinsic microporosity 1 (PIM-1) membranes using vapor phase infiltration
    Ren, Yi
    Jean, Benjamin C.
    Jang, Woo Jin
    Sarswat, Akriti
    Lee, Young Joo
    Mcguinness, Emily K.
    Dhavala, Kshitij
    Losego, Mark D.
    Lively, Ryan P.
    JOURNAL OF MEMBRANE SCIENCE LETTERS, 2023, 3 (02):