This application claims the benefit of Korean Patent Application No. 10-2009-0126914, filed on Dec. 18, 2009 in the Korean Intellectual Property Office, which is incorporated herein by reference in its entirety.
(a) Field of the Invention
The present invention relates to a malicious traffic isolation system and method using botnet information, and more particularly, to a malicious traffic isolation system and method using botnet information, in which traffics for a set of clients having the same destination are routed to the isolation system based on a destination IP/Port, and botnet traffics are isolated using botnet information based on similarity among groups of the routed and introduced traffics.
(b) Background of the Related Art
Bot is the abbreviation of a robot, which refers to a personal computer (PC) infected with software having a malicious intention. Botnet refers to a network of interconnected computers which are infected with such a bot. The botnet is remotely controlled by a bot master and is used for a variety of malicious behaviors, such as a DDoS attack, personal information collection, phishing, distribution of malicious codes, sending spam mails, and the like. Such a botnet can be classified based on a protocol used by the botnet.
Attacks using such a botnet are continuously increasing, and methods of the attacks are gradually diversified. Unlike the case of inducing Internet service failure through DDoS, there are bots that induce personal system failure or illegally acquire personal information. In addition, increasing are the cases of abusing the bots for cyber crimes by illegally leaking user information such as identification (ID), password, financial information, and the like. Furthermore, conventional hacking attacks are merely in the level of boasting or competing abilities of hackers through a community, while hacking attacks using a botnet follows a trend toward intensive use of the botnet by hacker groups and cooperation between the hacker groups to make monetary profits.
However, botnets are further ingeniously designed so as not to be easily detected or evaded through cutting-edge technologies such as periodical updates, run-time packing techniques, code self-modifications, encryption of command channels, and the like. In addition, there occur several thousands of kinds of botnet variations since sources of botnets are open to the public, and bot codes can be easily created or controlled through a user interface. Therefore, the problem is serious since even a person lacking of special knowledge or techniques can create and use a botnet. Bot zombies configuring such a botnet are distributed in Internet service providers' networks across the world irrespective of countries, and bot Command and Control (C&C) that controls the bot zombies can migrate to another network.
Therefore, many researches on the botnets are actively in progress based on recognition of seriousness of the botnet-related problems. However, it is difficult to grasp overall configuration and distribution of botnets by detecting only the botnets residing in a specific Internet service provider's network, and there are numerous variations of botnets or the like. Therefore, there is an urgent need to develop a method of easily detecting botnets.
Accordingly, the present invention has been made to solve the above-mentioned problems occurring in the prior art, and it is an object of the present invention to provide a malicious traffic isolation system and method using botnet information, which can effectively isolate botnet traffics.
To accomplish the above object, in one aspect, the present invention provides a malicious traffic isolation system including: a botnet detection system for collecting traffics in a network and detecting a botnet; and a botnet isolation system for isolating traffics of the botnet.
The botnet isolation system includes: an isolation system manager for transmitting botnet group information including a protect target list, a zombie IP and C&C IP list; an isolation system agent for isolating a botnet group based on the botnet group information transmitted from the isolation system manager; and an isolation system monitor for monitoring the botnet isolation system in real-time.
The isolation system agent includes: an isolation system agent transmit and receive unit for receiving the protect target list, the zombie IP and C&C IP list from the isolation system manager and transmitting suspicious traffics and information on blockage of the suspicious traffics; a BGP unit for receiving traffics from the isolation system agent transmit and receive unit; an IP table unit for controlling filtering of traffics flowing in from the BGP unit; and a suspicious botnet storage unit for temporarily storing the suspicious traffics and transmitting the suspicious traffics to the isolation system agent transmit and receive unit.
To accomplish the above object, in another aspect, the present invention provides a malicious traffic isolation method including the steps of: detecting a botnet in a network; and isolating traffics of the botnet.
The malicious traffic isolation method further includes the steps of: after the step of detecting a botnet in a network, finding a malicious behavior of the detected botnet; and receiving existence of the malicious behavior, routing malicious traffics, and setting routing information to examine the malicious traffics.
Also, according to the malicious traffic isolation method, the step of isolating traffics of the botnet includes the steps of: isolating traffics of a botnet group flowing from outside to inside of a network in which the botnet is desired to be detected; or isolating traffics of a botnet group flowing from inside to outside of a network in which the botnet is desired to be detected.
In addition, according to the malicious traffic isolation method, the step of isolating traffics of a botnet group flowing from outside to inside of a network in which the botnet is desired to be detected includes the steps of: performing a first filtering by isolating DDoS traffics starting from a zombie IP among traffics headed for a safety zone from communication traffics starting from a C&C IP; performing a second filtering by secondarily determining the DDoS traffics by verifying a botnet IP and similarity using L2/L3/L4 information, the number of packets flowing in per unit time PPS, the number of bandwidths per unit time BPS, and the payload size in order to cope with the botnet traffics; and if a large amount of traffics flow in from outside to inside of the network after the first and second filtering steps are performed, performing a third filtering by applying rate-limit.
Further, according to the malicious traffic isolation method, in the step of performing the first filtering, communication traffics starting from the zombie IP among the traffics headed for the C&C IP is isolated from traffics starting from an unknown IP.
Moreover, according to the malicious traffic isolation method, the step of isolating traffics of a botnet group flowing from inside to outside of a network in which the botnet is desired to be detected includes the steps of: performing a first filtering by isolating communication traffics headed for a C&C IP, wherein the traffics are dropped if a SRC IP is a known zombie IP, and isolating communication traffics headed for the zombie IP; and if the SRC IP is an unknown IP in the communication traffics headed for the C&C IP or communication traffics headed for the zombie IP in the step of performing a first filtering, obtaining information on a new botnet using L2/L3/L4 information, the number of packets flowing in per unit time PPS, the number of bandwidths per unit time BPS, and the payload size of a corresponding traffic, obtaining the SRC IP as a zombie IP or the SRC IP as a C&C IP, and isolating the traffics or notifying the obtained information to a manager so as to cope with the malicious traffics.
The above and other objects, features and advantages of the present invention will be apparent from the following detailed description of the preferred embodiments of the invention in conjunction with the accompanying drawings, in which:
The preferred embodiments of the invention will be hereafter described in detail with reference to the accompanying drawings.
However, the present invention is not limited to embodiments which will be described below, but may be implemented in a variety of different forms. These embodiments are provided to render the disclosure of the present invention complete and allow those skilled in the art to fully understand the scope of the present invention. In the following description, elements having the same function are denoted by the same reference numerals.
As shown in
As shown in
The botnet traffic collecting sensor serves to collect traffics of a corresponding Internet service provider's network in order to detect botnets and comprises a traffic information collecting module, a traffic information management module, a management communication module, and a sensor policy management module as shown in
As shown in
As shown in
As shown in
As shown in
The botnet detection system is provided in an Internet service provider's network and detects botnets operating in the Internet service provider's network based on the traffic information collected by the botnet traffic collecting sensor. One or more of such a botnet detection system can be provided in the corresponding Internet service provider's network. In addition, as shown in
As shown in
The group information management module stores the group data received from the botnet traffic collecting sensor into the botnet detection system and creates a group matrix from the group data. The group information management module manages the number of group information stored in the botnet detection system and, specifically, manages update of the group data and the group matrix. At this point, managing the group data and the group matrix is reflecting a corresponding update, whereas managing the number of information of the entire groups is managing the number of group information geometrically increasing in the botnet detection system.
Referring to
Referring to
Referring to
Referring to
Referring to
The detection information creation module creates information on a group determined as a botnet by the suspicious group comparison and analysis module. The information on the botnet group may include a client IP, behavior of a corresponding botnet, and the like.
As shown in
The botnet behavior analyzer BBA analyzes attacks of a botnet group and whether the botnet group has spread or migrated.
The detection log management module DLM manages logs on organization and behavior information of a botnet group and includes an organization information database and a behavior information database of the botnet group.
The policy management module PM sets policies on the modules executed within a botnet control and security management system. In addition, the policy management module sets detection policies of botnet detection systems registered in the botnet control and security management system. In addition, the policy management module sets policies of the traffic information collecting sensors through the registered botnet detection systems.
The botnet control and security management system exchanges a variety of settings and state information with a control system, receives group behavior information related to a botnet and peer bot information from the botnet traffic collecting sensor, classifies traffics, analyzes organization and behavior of the botnet, and stores the analyzed organization and behavior information in a database. In addition, the botnet control and security management system transmits the organization and behavior analysis information stored in the database to the control system.
The botnet isolation system guides and isolates traffics transmitted from botnet groups detected by the botnet group detection system, i.e., PCs and C&C servers infected with a bot, in a quarantine area. As shown in
The isolation system manager transmits botnet group information including a protect target list, a zombie IP and C&C IP list. The isolation system manager comprises an isolation system manager transmit and receive unit in charge of information transmitted from the botnet detection system and information exchanged with the isolation system agent, an information database for storing information on the states of the botnet detection system and the isolation system agent and bot information transferred from the isolation system manager, and a collection database for storing information on suspicious packets transmitted from the isolation system agent and blocking information.
The isolation system agent isolates a botnet group based on the botnet group information transmitted from the isolation system manager. The isolation system agent comprises an isolation system agent transmit and receive unit for receiving a protect target list, a zombie IP and C&C IP list transmitted from the isolation system manager transmit and receive unit of the isolation system manager and transmitting information on suspicious traffics and information on blockage of the suspicious traffics to the collection database, a BGP unit for receiving traffics for each protect target through the isolation system agent, an IP table unit for controlling filtering of the received traffics, and a suspicious botnet storage unit for temporarily storing the suspicious traffics and transmitting the suspicious traffics to the isolation system agent. At this point, the sequence between the isolation system manager and the isolation system agent is as shown in
The isolation system monitor monitors the botnet isolation system in real-time and comprises an isolation system agent state unit for receiving a state of the isolation system agent from the information database and displaying the state in real-time, a suspicious packet state unit for receiving suspicious packets from the collection database and displaying the suspicious packets in real-time, and a packet blocking state unit for receiving blocked packet information from the collection database and displaying the packet information in real-time.
The botnet isolation system structured like this operates as shown in
Next, a malicious traffic isolation method using botnet information according to the present invention will be described with reference to the drawings. Those described above in the malicious traffic isolation system using botnet information according to the present invention will be omitted or briefly described.
As shown in
The step of detecting a botnet S1 comprises the steps of collecting traffics S1-1, creating group information S1-2, and determining a botnet group S1-3.
The step of collecting traffics S1-1 collects traffic data of a network using a packet capture tool based on collection policies. To this end, traffic information collecting sensors are provided in a plurality of networks and collect traffic information based on traffic collection policies set by the botnet control and security management system.
The step of creating group information S1-2 divides the collected traffics into groups. To this end, the step of creating group information S1-2 includes the step of classifying a protocol S1-2-1.
The step of classifying a protocol S1-2-1 classifies the traffics collected in the step of collecting traffics by the protocol. The step of classifying a protocol includes the step of constructing a client set by the destination S1-2-1-1.
The step of constructing a client set by the destination S1-2-1-1 analyzes the protocol collected in the step of collecting traffics and constructs a set of clients having the same destination. The step of constructing a client set by the destination S1-2-1-1 includes the steps of storing collected connection records S1-2-1-1-1 and constructing a client set S1-2-1-1-2.
The step of storing collected connection records S1-2-1-1-1 stores connection records collected by the traffic information collecting sensors and connection records collected during a predetermined time period.
The step of constructing a client set S1-2-1-1-2 analyzes the collected traffic information, divides the traffics by the protocol, and constructs the traffics into client sets. The protocol is largely classified into TCP and UDP as is in the malicious traffic isolation system using botnet information according to the present invention described above. TCP is divided into HTTP, SMTP, and other HTTPs. UDP is divided into DNS and other DNSs. At this point, the protocol is classified by analyzing contents of real traffics, and group data is constructed based on the IP and port, i.e., the destination address.
The step of determining a botnet group S1-3 determines a botnet group by comparing and analyzing similarity among the groups classified as a suspicious group. The step of determining a botnet group includes the steps of managing a group matrix S1-3-1, selecting an analysis target S1-3-2, and analyzing group similarity S1-3-3.
The step of managing a group matrix S1-3-1 manages a matrix of group data transmitted from the traffic information collecting module, i.e., a group matrix. Here, management of group matrix means creating, updating, and deleting a group matrix. Accordingly, the step of managing a group matrix includes the steps of creating a group matrix S1-3-1-1, updating a group matrix S1-3-1-2, and deleting a group matrix S1-3-1-3.
The step of creating a group matrix S1-3-1-1 creates a group matrix for a new group. That is, if a group is a new group that does not exist, a group matrix is created since the group matrix does not exist.
If a corresponding group exists, the step of updating a group matrix S1-3-1-2 updates the matrix of the existing group.
The step of deleting a group matrix S1-3-1-3 deletes a group matrix based on the group matrix management algorithm if clients belong to the group are not active for a predetermined period of time.
If a specific connection pattern of a group matrix goes above a threshold value after the group matrix is updated, the step of selecting an analysis target S1-3-2 selects the corresponding group as an analysis target group.
The step of analyzing group similarity S1-3-3 analyzes similarity of clients for the groups determined as an analysis target group. If similarity is higher than a predetermined level, for example, 80 percent, similarity is analyzed on a detailed client list of a representative specific connection pattern. In addition, if similarity between clients is higher than a predetermined level in a specific connection pattern, for example, 80 percent, the corresponding two groups are determined as the same botnet.
The step of notifying the botnet S2 notifies the botnet detected in the step of detecting a botnet S1 to the botnet isolation system. This can be performed through the steps of finding a malicious behavior S2-1 and notifying existence of the malicious behavior S2-2.
The step of finding a malicious behavior S2-1 selects suspicious packets performing a malicious behavior using the protect target list extracted by the botnet detection system and a zombie IP and C&C IP list.
A malicious behavior is found through the step of finding a malicious behavior S2-1 performed to isolate traffics of the botnet, and the step of notifying the malicious behavior S2-2 notifies information on the suspicious packets in order to block traffics of the botnet performing the malicious behavior.
The step of routing malicious traffics S3 receives existence of malicious behavior and sets routing information in order to examine malicious traffics through the botnet isolation system. A routing command may use any known protocol used in a network, such as eBGP, iBGP, OSPF, or the like. Since the routing protocol is applied differently depending on a network operating environment, the routing protocol is not limited to a specific one in the present invention.
The step of isolating the traffics S4 includes the steps of isolating traffics flowing from outside to inside S4-1 and isolating traffics flowing from inside to outside S4-2.
As shown in
The step of performing a first filtering S4-1-1 isolates DDoS traffics starting from a zombie IP among the traffics headed for a safety zone as shown in
As shown in
If a large amount of traffics flow in from outside to inside after the first and second filtering steps are performed as shown in
The step of isolating traffics flowing from inside to outside S4-2 isolates suspicious traffics flowing from inside to outside of a network as shown in
The step of performing a first filtering S4-2-1 isolates communication traffics headed for the C&C IP as shown in
If the SRC IP is an unknown IP in the communication traffics headed for the C&C IP or the zombie IP, the step of performing a second filtering S4-2-2 obtains information on a new botnet using L2/L3/L4 information, the number of packets flowing in per unit time PPS, the number of bandwidths per unit time BPS, and the payload size of a corresponding traffic, obtains the SRC IP as a zombie IP, obtains the SRC IP as a C&C IP, and isolates the traffic or notifies the obtained information to a manager so as to cope with the malicious traffic.
As described above, the present invention may provide a malicious traffic isolation method using botnet information, which can accommodate traffics received from a PC or a C&C server infected with a bot into a quarantine area, isolate normal traffics from traffics transmitted from malicious bots, and block the malicious traffics. In addition, the present invention may provide a malicious traffic isolation method using botnet information, which can provide statistics data on isolated botnet traffics and provide selected traffic contents. In addition, the present invention may provide a malicious traffic isolation method using botnet information, which can provide a variety of filtering functions (e.g., filtering based on host and C&C IP, payload size, rate-limit, or rate filtering) in association with the botnet detection system. In addition, the present invention may provide a malicious traffic isolation method using botnet information, which can provide a function of mitigating DDoS attacks of a botnet.
The present invention may provide a malicious traffic isolation system and method using botnet information, which can accommodate traffics received from a PC or a C&C server infected with a bot into a quarantine area, isolate traffics generated by normal users from traffics transmitted from malicious bots, and block the malicious traffics.
Furthermore, the present invention may provide a malicious traffic isolation system and method using botnet information, which can provide a variety of filtering functions (e.g., filtering based on host and C&C IP, payload size, rate-limit, or rate filtering) in association with the botnet detection system.
Furthermore, the present invention may provide a malicious traffic isolation system and method using botnet information, which can provide a function of mitigating DDoS attacks of a botnet.
While the present invention has been described with reference to the particular illustrative embodiments, it is not to be restricted by the embodiments but only by the appended claims. It is to be appreciated that those skilled in the art can change or modify the embodiments without departing from the scope and spirit of the present invention.
Number | Date | Country | Kind |
---|---|---|---|
10-2009-0126914 | Dec 2009 | KR | national |