DocumentCode
68436
Title
Analysis of a “/0” Stealth Scan From a Botnet
Author
Dainotti, Alberto ; King, Alistair ; Claffy, Kimberly ; Papale, Ferdinando ; Pescape, Antonio
Author_Institution
CAIDA, Univ. of California, San Diego, La Jolla, CA, USA
Volume
23
Issue
2
fYear
2015
fDate
Apr-15
Firstpage
341
Lastpage
354
Abstract
Botnets are the most common vehicle of cyber-criminal activity. They are used for spamming, phishing, denial-of-service attacks, brute-force cracking, stealing private information, and cyber warfare. Botnets carry out network scans for several reasons, including searching for vulnerable machines to infect and recruit into the botnet, probing networks for enumeration or penetration, etc. We present the measurement and analysis of a horizontal scan of the entire IPv4 address space conducted by the Sality botnet in February 2011. This 12-day scan originated from approximately 3 million distinct IP addresses and used a heavily coordinated and unusually covert scanning strategy to try to discover and compromise VoIP-related (SIP server) infrastructure. We observed this event through the UCSD Network Telescope, a /8 darknet continuously receiving large amounts of unsolicited traffic, and we correlate this traffic data with other public sources of data to validate our inferences. Sality is one of the largest botnets ever identified by researchers. Its behavior represents ominous advances in the evolution of modern malware: the use of more sophisticated stealth scanning strategies by millions of coordinated bots, targeting critical voice communications infrastructure. This paper offers a detailed dissection of the botnet´s scanning behavior, including general methods to correlate, visualize, and extrapolate botnet behavior across the global Internet.
Keywords
IP networks; computer network security; invasive software; telecommunication traffic; IPv4 address space; SIP server; Sality botnet; UCSD Network Telescope; VoIP-related infrastructure; critical voice communications infrastructure; cyber-criminal activity; global Internet; horizontal scan; malware evolution; network scans; scanning strategy; stealth scanning strategies; traffic data; unsolicited traffic; Animation; Geology; IP networks; Internet; Ports (Computers); Servers; Telescopes; Botnet; Internet background radiation; Internet telephony; Network Telescope; VoIP; communication system security; darknet; network probing; scanning;
fLanguage
English
Journal_Title
Networking, IEEE/ACM Transactions on
Publisher
ieee
ISSN
1063-6692
Type
jour
DOI
10.1109/TNET.2013.2297678
Filename
6717049
Link To Document