Title: ANALYSIS OF WEB-BASED BOT MALWARE INFECTION
1ANALYSIS OF WEB-BASED BOT MALWARE INFECTION
- Louena L. Manluctao
- East Early College High School
- Houston Independent School District
- Dr. Guofei Gu
- Assistant Professor
- Department of Computer Science Engineering
- Director, SUCCESS LAB
- TEXAS A M University
2Dr Guofei Gu
- EDUCATION
- Ph. D in Computer Science
- Georgia Institute of Technology
- M.S. in Computer Science
- Fudan University
3Research interest
- Network and system security such as Internet
malware detection, defense, and analysis - Intrusion detection, anomaly detection
- Network security
- Web and social networking security
4Success LAB
- Success Lab Students
- PhDÂ
- Seungwon Shin
- Chao Yang
- Zhaoyan Xu
- Jialong Zhang
- MS
- Robert Harkreader
- Shardul Vikram
- Vijayasenthil VC
- Lingfeng Chen
- Alumni
- Yimin Song (MS, first employment Juniper
Networks)
5Seungwon shin
- Network Web Security
- Botnet Analysis Conficker
- Seungwon Shin and Guofei Gu. "Conficker and
Beyond A Large-Scale Empirical Study." To appear
in Proceedings of 2010 Annual Computer Security
Applications Conference (ACSAC'10), Austin,
Texasi, December 2010.
6Seungwon shin
- Network Web Security
- Botnet Analysis Conficker
- Seungwon Shin, Raymond Lin, Guofei Gu.
"Cross-Analysis of Botnet Victims New Insights
and Implications." To appear in Proceedings of
the 14th International Symposium on Recent
Advances in Intrusion Detection (RAID 2011),
Menlo Park, California, September 2011.
7chao yang
- Wireless Security
- Rogue Access Point Detection
- Yimin Song, Chao Yang, Guofei Gu. "Who Is Peeping
at Your Passwords at Starbucks? -- To Catch an
Evil Twin Access Point." In Proceedings of
the 40th Annual IEEE/IFIP International
Conference on Dependable Systems and Networks
(DSN'10), Chicago, IL, June 2010
8chao yang
- Social Networking Website Security
- Twitter Spammer Accounts Detection
- Chao Yang, Robert Harkreader, Guofei Gu. "Die
Free or Live Hard? Empirical Evaluation and New
Design for Fighting Evolving Twitter Spammers."
To appear in Proceedings of the 14th
International Symposium on Recent Advances in
Intrusion Detection (RAID 2011), Menlo Park,
California, September 2011.
9Zhaoyan xu
- Malware Analysis
- Analysis of binary code and source code
- Dynamic Analysis
- Static Analysis
- Reverse Engineering
- Protocol
- Semanticis
10Jialong Zhang
- Intrusion and Detection System
- Enterprise Network Security
- Assist Us with computer terms
11Applied cryptography
- The art of secret writing
- Converts data into unintelligible (random
looking) form - Must be reversible (recover original data
- without loss or modification)
12Encryption/Decryption
- Plaintext a message in its original form
- Ciphertext a message in the transformed,
unrecognized form - Encryption the process that transforms a
plaintext into a ciphertext - Decryption the process that transforms a
ciphertext to the corresponding plaintext - Key the value used to control encryption/decrypti
on.
13Probability and statisitics
14Probability and statistics
15Relevance of the research
- To Solve Practical Security Problems
- Internet malware detection, defense, and analysis
- Intrusion detection, anomaly detections
- Network security
- Web and social networking security
- To help society and country from threat of
national security
16Research activity
17Purpose of botnet taxonomy
- Help researchers identify the type of responses
that are most effective against botnets - Design Goals
- assist the defenders in identifying possible
types of botnets - describe key properties of botnet classes
18Key metrics for botnet structuresbotnet
effectiveness
- Estimate of overall utility. Measure the largest
number of bots that can receive instructions and
participate in an attack. - Average amount of bandwidth that a bot can
contribute, denoted by B.
19Botnet efficiency
- Network diameter is one means of expressing this
efficiency. - This is the average geodesic length of a network.
20Botnet robustness
- Clustering coefficient measures the average
degree of local transitivity. - The transitivity measure index generally
captures the robustness of a botnet
21Botnet network modelsErdos-Renyi random graph
models
- Random graphs are created to avoid creating
predictable flows. - In a random graph, each node is connected with
equal probability to the other N-1 nodes. - The chance that a bot has a degree of k is the
binomial distribution
22Acknowledgements
Texas AM University
Dr. Guofie Gu
National Science Foundation
Nuclear Power Institute
Chevron
Texas Workforce Commission
23Wilber Rivas, Math Teacher, Del Rio High School
Chao Yang, Phd Student
Jialong Zhang, Phd Student