Skip to main content

A Host-Based Approach to BotNet Investigation?

  • Conference paper
Digital Forensics and Cyber Crime (ICDF2C 2009)

Abstract

Robot Networks (BotNets) are one of the most serious threats faced by the online community today. Since their appearance in the late 1990’s, much effort has been expended in trying to thwart their unprecedented growth. However, with robust and advanced capabilities, it is very difficult for average users to avoid or prevent infection by BotNet malware. Moreover, whilst BotNets have increased in scale, scope and sophistication, the dearth of standardized and effective investigative procedures poses huge challenges to digital investigators in trying to probe such cases. In this paper we present a practical (and repeatable) host-based investigative methodology to the collection of evidentiary information from a Bot-infected machine. Our approach collects digital traces from both the network and physical memory of the infected local host, and correlates this information to identify the resident BotNet malware involved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ramsbrock, D.: Mitigating the Botnet Problem: From Victim to Botmaster, Master Thesis, George Mason University (2008), http://mars.gmu.edu:8080/dspace/bitstream/1920/3136/1/Ramsbrock_Daniel.pdf

  2. Barford, P., Yegneswaran, V.: An inside look at BotNets. In: Proceedings of Special Workshop on Malware Detection. Advances in Information Security. Springer, Heidelberg (2006)

    Google Scholar 

  3. Cooke, E., Jahanian, F., McPherson, D.: The Zombie roundup: understanding, detecting, and disrupting botnets. In: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop, Cambridge, MA, July 07, p. 6 (2005)

    Google Scholar 

  4. Goebel, J., Holz, T.: Rishi: Identify bot contaminated hosts by irc nickname evaluation. In: Proceedings of USENIX Workshop on Hot Topics in Understanding Botnets, HotBots (2007)

    Google Scholar 

  5. Dagon, D., Zou, C., Lee, W.: Modeling botnet propagation using time zones. In: Proceedings of 13th Annual Network and Distributed System Security Symposium (NDSS), February 2006, pp. 235–249 (2006)

    Google Scholar 

  6. Dagon, D.: Botnet detection and response: The network is the infection. In: Proceedings of the Operations, Analysis, and Research Center Workshop, OARC (2005)

    Google Scholar 

  7. Choi, H., Lee, H., Lee, H., Kim, H.: Botnet Detection by Monitoring Group Activities in DNS Traffic. In: Proceedings of the 7th IEEE International Conference on Computer and Information Technology, Fukushima, Japan, October 16-19, pp. 715–720 (2007)

    Google Scholar 

  8. Romaña, D.A.L., Musashi, Y.: Entropy Based Analysis of DNS Query Traffic in the Campus Network. In: Proceedings for The 4th International Conference on Cybernetics and Information Technologies, System and Applications (CITSA 2007), Orlando, FL, USA, pp. 162–164 (2007)

    Google Scholar 

  9. Schonewille, A., Helmond, D.: The Domain Name Service as an IDS: How DNS can be used for detecting and monitoring badware in a network. University of Amsterdam (2006)

    Google Scholar 

  10. Karasaridis, A., Rexroad, B., Hoeflin, D.: Wide-scale botnet detection and characterization. In: USENIX Workshop on Hot Topics in Understanding Botnets, HotBots (2007)

    Google Scholar 

  11. Kristoff, J.: Botnets, detection and mitigation: DNS-based techniques. Information Security Day, Northwestern University (July 2005), http://www.it.northwestern.edu/bin/docs/botskristoff_jul05.ppt

  12. Farmer, D., Venema, W.: Data Gathering and the Order of Volatility, Appendix B, Forensic Discovery. Addison-Wesley, Reading (2005), http://www.porcupine.org/forensics/forensic-discovery/appendixB.html

    Google Scholar 

  13. Wireshark, http://www.wireshark.org

  14. Fport, http://www.foundstone.com/us/resources/proddesc/fport.htm

  15. Pslist, http://technet.microsoft.com/en-us/sysinternals/bb896682.asp

  16. Mandiant Memoryze v.1.2.18.0, http://www.mandiant.com/software/memoryze.htm

  17. Volatility Framework, https://www.volatilesystems.com/default/volatility

  18. Memory DD v1.3, http://www.mantech.com/msma/MDD.asp

  19. X-Ways Capture v1.18, http://www.x-ways.net/capture/index-m.html

  20. F-Response Field Kit Edition v1.18, http://www.f-response.com/

  21. Encase Forensic Tool, http://www.guidancesoftware.com/

  22. FTK imager, http://www.accessdata.com/

  23. Helix Live CD, http://www.e-fense.com/products.php

  24. Lee, R.: Memory Forensic Acquisition and Analysis 101, 2008-11-19, http://sansforensics.wordpress.com/2008/11/19/memory-forensic-analysis-finding-hidden-processes/

  25. Schiller, C., Binkley, J., Evron, G., Willems, C.: Botnets – The killer web app. Syngress, 179–208 (February 2007)

    Google Scholar 

  26. Grizzard, J., Sharma, V., Nunnery, C.: Peer-to-Peer Botnets: Overview and Case Study. In: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, Cambridge, MA, p. 1, April 10 (2007)

    Google Scholar 

  27. Taxonomy of Botnet Threats, A Trend Micro White Paper (November 2006), http://us.trendmicro.com/imperia/md/content/us/pdf/threats/securitylibrary/botnettaxonomywhitepapernovember2006.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Law, F.Y.W., Chow, K.P., Lai, P.K.Y., Tse, H.K.S. (2010). A Host-Based Approach to BotNet Investigation?. In: Goel, S. (eds) Digital Forensics and Cyber Crime. ICDF2C 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 31. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11534-9_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11534-9_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11533-2

  • Online ISBN: 978-3-642-11534-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics