automated web patrol with strider honey monkeys

34
Automated Web Patrol with Strider Honey Monkeys Y.Wang, D.Beck, S.Chen, S.King, X.Jiang, R.Roussev, C.Verbowski Microsoft Research, Redmond Justin Miller February 27, 2007

Upload: cameo

Post on 12-Feb-2016

74 views

Category:

Documents


0 download

DESCRIPTION

Automated Web Patrol with Strider Honey Monkeys. Y.Wang, D.Beck, S.Chen, S.King, X.Jiang, R.Roussev, C.Verbowski Microsoft Research, Redmond Justin Miller February 27, 2007. Outline. Internet Attacks Web Browser Vulnerabilities HoneyMonkey System Experiments Analysis/Future Work. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Automated Web Patrol with Strider Honey Monkeys

Automated Web Patrolwith Strider Honey

MonkeysY.Wang, D.Beck, S.Chen, S.King,X.Jiang, R.Roussev, C.Verbowski

Microsoft Research, Redmond

Justin MillerFebruary 27, 2007

Page 2: Automated Web Patrol with Strider Honey Monkeys

2

Outline Internet Attacks Web Browser Vulnerabilities HoneyMonkey System Experiments Analysis/Future Work

Page 3: Automated Web Patrol with Strider Honey Monkeys

3

Internet Attacks Exploit vulnerability of user web browser Install malicious code on machine

No user interaction required later VM-based honeypots are used to detect

these attacks

Page 4: Automated Web Patrol with Strider Honey Monkeys

4

HoneyMonkeys OS’s of various patch levels Mimic human web browsing

Uses StriderTracer to catch unauthorized file creation and system configuration changes

Discover malicious web sites

Page 5: Automated Web Patrol with Strider Honey Monkeys

5

HoneyMonkeys

OS3

OS2

OS1

Malcode

Page 6: Automated Web Patrol with Strider Honey Monkeys

6

Browser vulnerabilities Code Obfuscation

Dynamic code injection using document.write() Unreadable, long strings with encoded chars

“%28” or “&#104” Decoded by function script or browser

Escapes anti-virus software

Page 7: Automated Web Patrol with Strider Honey Monkeys

7

Browser vulnerabilities URL Redirection

Protocol redirection using HTTP 302 temp redir HTML tags inside <frameset> Script functions

window.location.replace() or window.open() Redirection is common in non-malicious sites

Page 8: Automated Web Patrol with Strider Honey Monkeys

8

Browser vulnerabilities Malware Installation

Viruses Backdoor functions Bot programs Trojan downloaders – DL other programs Trojan droppers – delete (drop) files Trojan proxies – redirect network traffic Spyware programs

Page 9: Automated Web Patrol with Strider Honey Monkeys

9

HoneyMonkey System Attempts to automatically detect and analyze

web sites that exploit web browsers 3-stage pipeline of virtual machines

Stage 1: scalable mode Stage 2: recursive redirection analysis Stage 3: scan fully patched VM’s

Page 10: Automated Web Patrol with Strider Honey Monkeys

10

HoneyMonkey: Stage 1 Visit N URLs simultaneously If exploit detected, re-visit each one

individually until exploit URL is found

VM VM U1 U2 U3 U4 U5 U6 U2 U3

Page 11: Automated Web Patrol with Strider Honey Monkeys

11

HoneyMonkey: Stage 2 Re-scan exploit URLs Perform recursive redirection analysis

Identify all web pages involved

VM VM U2 U3 U2 U3 U2 U3 U9 U10

Page 12: Automated Web Patrol with Strider Honey Monkeys

12

HoneyMonkey: Stage 3 Re-scan exploit URLs Scan using fully patched VMs

Identify attacks exploiting the latest vulnerabilities

VM VM U2 U3 U9 U10 U2 U9

Page 13: Automated Web Patrol with Strider Honey Monkeys

13

HoneyMonkey Flowchart Scan up to 500-700 URL’s per day

Page 14: Automated Web Patrol with Strider Honey Monkeys

14

Web Site Visits Monkey program launches URL Wait 2 minutes

Allow all malicious code to DL Detect persistent-state changes

New registry entries and .exe files Allows uniform detection of:

Known vulnerability attack Zero-day exploits

Page 15: Automated Web Patrol with Strider Honey Monkeys

15

HoneyMonkey Report Generates XML report at end of each visit

.exe files created or modified Processes created Registry entries created or modified Vulnerability exploited Redirect-URLs visited

Cleanup infected state machine Monkey Controller

Page 16: Automated Web Patrol with Strider Honey Monkeys

16

Web Site Redirection

URL1 URL2 URL3 Redirect Redirect

Data collected data data

Page 17: Automated Web Patrol with Strider Honey Monkeys

17

Input URL Lists Suspicious URLs

Known to host spyware or malware Links appearing in phishing or spam messages

Most popular web sites Top 100,000 by browser traffic ranking

Local URLs Organization want to verify web pages have not

been compromised

Page 18: Automated Web Patrol with Strider Honey Monkeys

18

Output URL Data Exploit URLs

Measures risk of visiting similar web sites Topology Graphs

Several URLs shut down Provide leads for anti-spyware research

Zero-day exploits Monitors URL “upgrades”

Page 19: Automated Web Patrol with Strider Honey Monkeys

19

Experimental Results Collected 16,000+ URLs

Web search of “known-bad” web sites Web search for Windows “hosts” files Depth-2 crawling of previous URLs

207/16,190 = 1.28% of web sites

Page 20: Automated Web Patrol with Strider Honey Monkeys

20

Experimental Results All tests done using IEv6

Page 21: Automated Web Patrol with Strider Honey Monkeys

21

Topology Graphs 17 exploit URLs for SP2-PP Most powerful exploit pages

Page 22: Automated Web Patrol with Strider Honey Monkeys

22

Site Ranking Key role in anti-exploit process Determines how to allocate resources

Monitoring URLs Investigation of URLs Blocking URLs Legal actions against host sites

Page 23: Automated Web Patrol with Strider Honey Monkeys

23

Site Ranking 2 types of site ranking, based on: Connection counts

Links URLs to other malicious URLs Number of hosted exploit-URLs

Web sites with important internal page hierarchy Includes transient URLs with random strings

Page 24: Automated Web Patrol with Strider Honey Monkeys

24

Site Ranking Based on connection counts

Page 25: Automated Web Patrol with Strider Honey Monkeys

25

Site Ranking Based on number of exploit-URLs hosted

Page 26: Automated Web Patrol with Strider Honey Monkeys

26

Effective Monitoring Easy-to-find exploit URLs

Useful for detecting zero day exploits Content providers with well-known URLs

Must maintain these URLs to keep high traffic Highly ranked URLs

More likely to upgrade exploits

Page 27: Automated Web Patrol with Strider Honey Monkeys

27

Scanning Popular URLs

Page 28: Automated Web Patrol with Strider Honey Monkeys

28

HoneyMonkey Evasion Target IP addresses

Blacklist IP addresses of HoneyMonkey machines Determine if a human is present

Create cookie to suppress future visits One-time dialog pop up box disables cookie

Detect VM or HoneyMonkey code Test for fully virtualizable machine Becomes less effective as VMs increase

Page 29: Automated Web Patrol with Strider Honey Monkeys

29

Bad Web Site Rankings Celebrity info Song lyrics Wallpapers Video game cheats Wrestling

Page 30: Automated Web Patrol with Strider Honey Monkeys

30

Related Work Email quarantine

Intercepts every incoming message Shadow honeypots

Diverts suspicious traffic to a shadow version Detects potential attacks, filters out false positives

Honeyclient Tries to identify browser-based attacks

Page 31: Automated Web Patrol with Strider Honey Monkeys

31

Strengths HoneyMonkey will detect most

Trojan viruses Backdoor functions Spyware programs

Uniform detection of exploits Known vulnerability attack Zero-day exploits

Generates XML report for each visit

Page 32: Automated Web Patrol with Strider Honey Monkeys

32

Weaknesses Takes time to clean infected machine after

each web site visit Code obfuscation escapes anti-virus software Only detects persistent-state changes HoneyMonkey only waits 2 minutes per URL

Delay exploit on web pages

Page 33: Automated Web Patrol with Strider Honey Monkeys

33

Improvements Run HoneyMonkey with random wait times

Combat delayed exploits on web sites Randomize HoneyMonkey attack Vulnerability-specific exploit detector (VSED)

Insert break points within bad code Stops execution before potentially malicious code

Page 34: Automated Web Patrol with Strider Honey Monkeys

34

Questions?? ? ? ? ? ? ?

? ? ? ? ? ? ? ? ?? ? ? ? ? ? ? ? ? ? ? ? ?? ? ? ? ? ? ?

? ? ? ? ? ? ? ? ?? ? ? ? ? ? ? ? ? ? ? ? ?