SlideShare a Scribd company logo
DETECTING PEER-TO-PEER
BOTNETS BY TRACKING
CONVERSATIONS
Pratik Narang1, Subhajit Ray1, Chittaranjan Hota1 and Venkat Venkatakrishnan2
1BITS Pilani, Hyderabad campus, India
2University of Illinois at Chicago
Introduction
• What’s a bot ?
• What’s a botnet ?
• What’s a Peer-to-Peer based botnet ?
Traditional Botnets
Bot-Master
Peer-to-Peer Botnets
Bot-Master
P2P: Uses and Misuses
Previous work
• Intial work with signature-based approaches
• Evaded by bots using encryption
• Recent work – analysis of network behavior
• Most of it uses 5-tuple ‘flow-based’ approach
<Source IP, Dest. IP, Source port, Dest. Port, Protocol>
• Great success in Internet traffic classification
• Doesn’t suit the needs of P2P traffic
Identifying P2P traffic
• Modern P2P apps and bots randomize ports, operate on
TCP as well as UDP
• P2P traffic has bi-directional nature
• E.g.- BitTorrent- seeders and leechers
• Thus, traditional flow-based approaches may give a false
view of network communication
• Notion of a conversation more suited to P2P
• Who is talking to whom ?
• Irrespective of protocol, port, etc.
P2P apps v/s P2P bots
Applications:
• A human user-‘bursty’
traffic
• High volume of data
transfers seen
• Small inter-arrival time of
packets seen in apps
Botnets:
• Automated/scripted
commands
• Low in volume,
high in duration
• Large inter-arrival time of
packets seen in stealthy
bots
PeerShark: Overview
Conversation
Creation
Module
Conversation
Aggregation
Module
Classification
Module
Packet
Filtering
Module
FLOWGAP initial
FLOWGAP
Packets useful for our system Packets discarded by our system (Corrupted or missing headers)
Conversations classified as benign Conversations classified as malicious
Approach
• Parse network traces, discard corrupted packets
• Create ‘conversations’, identified by the tuple <IP1,IP2> and
an initial FLOWGAP parameter
• Aggregate conversations again – this time with a higher
FLOWGAP parameter
• To be decided by Network Admin based on understanding of the
network
• Useful for detecting slow and stealthy bots
Approach
• For each tuple, extract 4 features :
– The duration of the conversation
– The number of packets exchanged in the conversation
– The volume of the conversation (no. of bytes)
– The Median value of the inter-arrival time of packets in the conversation
• Hunt for long-lived, stealthy conversations
• Categorize P2P apps & bots with the features
above, using supervised machine learning
approaches
Dataset
P2P app name Used for? Type of data/Size of data
eMule P2P file sharing application pcap file/19 GB
uTorrent P2P file sharing application pcap file/33 GB
P2P botnet name What it does? Type of data/Size of data
Storm Email Spam pcap file/ 4.8 GB
Waledac Email spam, password stealing pcap file/ 1.1 GB
PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
Results
BayesNet J48
Adaboost with REP
tree
TP FP ROC TP FP ROC TP FP ROC
eMule 0.929 0.012 0.996 0.964 0.012 0.987 0.93 0.021 0.993
Storm 0.988 0.009 0.999 0.986 0.003 0.996 0.979 0.004 0.999
Waledac 0.989 0.01 0.999 0.988 0.005 0.995 0.97 0.009 0.998
uTorrent 0.947 0.019 0.996 0.965 0.012 0.989 0.943 0.025 0.994
Avg. 0.96325 0.0125 0.9975 0.97575 0.008 0.99175 0.9555 0.01475 0.996
90%
91%
92%
93%
94%
95%
96%
97%
98%
99%
100%
BayesNet J48 Adaboost with REP tree
OverallAccuracy(%)
Code publicly available for review & feedback:
https://github.com/pratiknarang/peershark
Back-up
Limitations & Possible evasions of
PeerShark
• Only built for 2 apps and 2 bots. Any new app/bot will also
get (mis)classified into one of these classes.
• If more than one P2P application (benign or malicious) is
running between two peers, PeerShark will not be able to
correctly classify it.
• Smarter bots which engage in occasional file-sharing with
bot-peers (and thus mimic benign behavior) can evade
PeerShark.

More Related Content

PDF
Feature selection for detection of peer to-peer botnet traffic
PDF
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
PDF
Network Analysis Using Wireshark -10- arp and ip analysis
PDF
Network Forensics: Packet Analysis Using Wireshark
PPTX
Packet analyzing with wireshark-basic of packet analyzing - Episode_02
PDF
Ch 06 -- Bandwidth Delay and Jitter Issues
PDF
Wireshark - Basics
PDF
Early application identification. CONEXT 2006
Feature selection for detection of peer to-peer botnet traffic
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
Network Analysis Using Wireshark -10- arp and ip analysis
Network Forensics: Packet Analysis Using Wireshark
Packet analyzing with wireshark-basic of packet analyzing - Episode_02
Ch 06 -- Bandwidth Delay and Jitter Issues
Wireshark - Basics
Early application identification. CONEXT 2006

What's hot (20)

PDF
Network analysis Using Wireshark 4: Capture Filters
PPTX
Network Measurement and Monitori - Assigment 1, Group3, "Classification"
PPT
Wireshark Basics
PPTX
Network Packet Analysis with Wireshark
PDF
Presentation1
PDF
Network Analysis using Wireshark 5: display filters
PDF
Wireshark ppt
PDF
Fukuoka University Public NTP Service and BCP38
PDF
Co se skrývá v datovém provozu? - Pavel Minařík
PDF
Empirically Characterizing the Buffer Behaviour of Real Devices
PPTX
2014.7.9 detecting p2 p botnets through network behavior analysis and machine...
PDF
lesson 7- Network analysis Using Wireshark - advanced statistics tools
PPTX
CapAnalysis - Deep Packet Inspection
PPT
Wireshark
PPT
SSL basics and SSL packet analysis using wireshark
PPT
Wireshark Inroduction Li In
PPTX
Vulnerability and Penetration Testing
PDF
Ch 08 -- Ethernet & LAN Switching Troubleshooting
PDF
Network Analysis Using Wireshark -Chapter 6- basic statistics tools
PDF
Zmap talk-sec13
Network analysis Using Wireshark 4: Capture Filters
Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Wireshark Basics
Network Packet Analysis with Wireshark
Presentation1
Network Analysis using Wireshark 5: display filters
Wireshark ppt
Fukuoka University Public NTP Service and BCP38
Co se skrývá v datovém provozu? - Pavel Minařík
Empirically Characterizing the Buffer Behaviour of Real Devices
2014.7.9 detecting p2 p botnets through network behavior analysis and machine...
lesson 7- Network analysis Using Wireshark - advanced statistics tools
CapAnalysis - Deep Packet Inspection
Wireshark
SSL basics and SSL packet analysis using wireshark
Wireshark Inroduction Li In
Vulnerability and Penetration Testing
Ch 08 -- Ethernet & LAN Switching Troubleshooting
Network Analysis Using Wireshark -Chapter 6- basic statistics tools
Zmap talk-sec13
Ad

Similar to PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations (20)

PPTX
P2P networking.pptx
PPT
P2P Lecture.ppt
PPT
P2P Lecture for better understanding of processed
PPT
Peer-to-peer Internet telephony
PPTX
Packet Analysis - Course Technology Computing Conference
PDF
Spotify: P2P music-on-demand streaming
PPTX
Peer to peer(p2 p)
PPT
Bittorrent
PDF
01 dsdsssdsssadasdasdsdasdasdasdasdasdasProtocols.pdf
PPT
P2P Seminar
PDF
Spotify: P2P music streaming
PDF
Networks Have Layers - Understanding The OSI Model
PPTX
Bots & spiders
PPTX
Computer network coe351- part2- final
PPT
BitTorrent Protocol
PPTX
Point To Point Protocol
PPTX
Filesharing using bittorrent protocol
ODP
Group Apres
ODP
C Cpres
ODP
C Cpres
P2P networking.pptx
P2P Lecture.ppt
P2P Lecture for better understanding of processed
Peer-to-peer Internet telephony
Packet Analysis - Course Technology Computing Conference
Spotify: P2P music-on-demand streaming
Peer to peer(p2 p)
Bittorrent
01 dsdsssdsssadasdasdsdasdasdasdasdasdasProtocols.pdf
P2P Seminar
Spotify: P2P music streaming
Networks Have Layers - Understanding The OSI Model
Bots & spiders
Computer network coe351- part2- final
BitTorrent Protocol
Point To Point Protocol
Filesharing using bittorrent protocol
Group Apres
C Cpres
C Cpres
Ad

More from Pratik Narang (6)

PDF
Hades_poster_Comad
PPTX
PDF
Machine-learning Approaches for P2P Botnet Detection using Signal-processing...
PDF
Gokul seminar
PPTX
Abhishek presentation october 2013
PPT
Hota iitd
Hades_poster_Comad
Machine-learning Approaches for P2P Botnet Detection using Signal-processing...
Gokul seminar
Abhishek presentation october 2013
Hota iitd

Recently uploaded (20)

PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
RMMM.pdf make it easy to upload and study
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Classroom Observation Tools for Teachers
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
advance database management system book.pdf
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Complications of Minimal Access Surgery at WLH
RMMM.pdf make it easy to upload and study
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Hazard Identification & Risk Assessment .pdf
Orientation - ARALprogram of Deped to the Parents.pptx
Classroom Observation Tools for Teachers
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
advance database management system book.pdf
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Chinmaya Tiranga quiz Grand Finale.pdf
Final Presentation General Medicine 03-08-2024.pptx
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Cell Types and Its function , kingdom of life
LDMMIA Reiki Yoga Finals Review Spring Summer
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS

PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations

  • 1. DETECTING PEER-TO-PEER BOTNETS BY TRACKING CONVERSATIONS Pratik Narang1, Subhajit Ray1, Chittaranjan Hota1 and Venkat Venkatakrishnan2 1BITS Pilani, Hyderabad campus, India 2University of Illinois at Chicago
  • 2. Introduction • What’s a bot ? • What’s a botnet ? • What’s a Peer-to-Peer based botnet ?
  • 5. P2P: Uses and Misuses
  • 6. Previous work • Intial work with signature-based approaches • Evaded by bots using encryption • Recent work – analysis of network behavior • Most of it uses 5-tuple ‘flow-based’ approach <Source IP, Dest. IP, Source port, Dest. Port, Protocol> • Great success in Internet traffic classification • Doesn’t suit the needs of P2P traffic
  • 7. Identifying P2P traffic • Modern P2P apps and bots randomize ports, operate on TCP as well as UDP • P2P traffic has bi-directional nature • E.g.- BitTorrent- seeders and leechers • Thus, traditional flow-based approaches may give a false view of network communication • Notion of a conversation more suited to P2P • Who is talking to whom ? • Irrespective of protocol, port, etc.
  • 8. P2P apps v/s P2P bots Applications: • A human user-‘bursty’ traffic • High volume of data transfers seen • Small inter-arrival time of packets seen in apps Botnets: • Automated/scripted commands • Low in volume, high in duration • Large inter-arrival time of packets seen in stealthy bots
  • 9. PeerShark: Overview Conversation Creation Module Conversation Aggregation Module Classification Module Packet Filtering Module FLOWGAP initial FLOWGAP Packets useful for our system Packets discarded by our system (Corrupted or missing headers) Conversations classified as benign Conversations classified as malicious
  • 10. Approach • Parse network traces, discard corrupted packets • Create ‘conversations’, identified by the tuple <IP1,IP2> and an initial FLOWGAP parameter • Aggregate conversations again – this time with a higher FLOWGAP parameter • To be decided by Network Admin based on understanding of the network • Useful for detecting slow and stealthy bots
  • 11. Approach • For each tuple, extract 4 features : – The duration of the conversation – The number of packets exchanged in the conversation – The volume of the conversation (no. of bytes) – The Median value of the inter-arrival time of packets in the conversation • Hunt for long-lived, stealthy conversations • Categorize P2P apps & bots with the features above, using supervised machine learning approaches
  • 12. Dataset P2P app name Used for? Type of data/Size of data eMule P2P file sharing application pcap file/19 GB uTorrent P2P file sharing application pcap file/33 GB P2P botnet name What it does? Type of data/Size of data Storm Email Spam pcap file/ 4.8 GB Waledac Email spam, password stealing pcap file/ 1.1 GB
  • 14. Results BayesNet J48 Adaboost with REP tree TP FP ROC TP FP ROC TP FP ROC eMule 0.929 0.012 0.996 0.964 0.012 0.987 0.93 0.021 0.993 Storm 0.988 0.009 0.999 0.986 0.003 0.996 0.979 0.004 0.999 Waledac 0.989 0.01 0.999 0.988 0.005 0.995 0.97 0.009 0.998 uTorrent 0.947 0.019 0.996 0.965 0.012 0.989 0.943 0.025 0.994 Avg. 0.96325 0.0125 0.9975 0.97575 0.008 0.99175 0.9555 0.01475 0.996 90% 91% 92% 93% 94% 95% 96% 97% 98% 99% 100% BayesNet J48 Adaboost with REP tree OverallAccuracy(%)
  • 15. Code publicly available for review & feedback: https://github.com/pratiknarang/peershark
  • 17. Limitations & Possible evasions of PeerShark • Only built for 2 apps and 2 bots. Any new app/bot will also get (mis)classified into one of these classes. • If more than one P2P application (benign or malicious) is running between two peers, PeerShark will not be able to correctly classify it. • Smarter bots which engage in occasional file-sharing with bot-peers (and thus mimic benign behavior) can evade PeerShark.