170 likes | 279 Vues
This workshop report explores strategies for safeguarding Web 2.0 services from botnet exploitation and cybercrime. The authors introduce the API Verifier tool designed to detect web-based bots that utilize service APIs for control and command communication. Unlike traditional bots, web-based bots exhibit impermanent connections, making detection challenging. The paper details the architecture and functionality of API Verifier, highlights security analysis, and discusses various threat vectors including DDoS attacks and CAPTCHA circumvention. This innovative approach aims to distinguish between human users and bots to enhance online security.
E N D
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department of Computing, Macquarie University, Australia Reporter: 游明軒
Outline • Introduction • API Verifier • Security analysis • Conclusion & discussion
Introduction • Web 2.0 • Blog, RSS, Social networking sites, etc. • Web based bots • Use web 2.0 service as a C&C channel • Instead of traditional bots sitting on IRC channel, the connections between web based bots are not permanent • The authors implement a tool, API Verifier, to detect web based bots
Botnet detection methods • Analysis of network traffic flows • Network traceback • Honeypots • These techniques do not cover web based botnet because the bot activities are indistinguishable and legitimate users and websites
API Verifier • Motivation • Because a web based bot must use Web 2.0 service APIs, API Verifier is implemented to verify whether a user is a person or a bot • Approach • Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) • MAC address as identifier
API Verifier - architecture • Components • API Verifier Client • API Verifier Server
API Verifier - functionality • Authentication • User profile • Session key • Encrypt MAC address • Be generated independently each time when an API call is made • Permanent MAC address • CAPTCHA verification
Security analysis • Spoofing MAC address • API Verifier Client fraud • DDoSattack • By-passing CAPTCHA verification
Spoofing MAC address • Change MAC address (1a) • Hijacking OS kernel and modifying the OS communication with NIC is expensive • Cause the high risk of being detection • Change the encrypted MAC address (1b) • session key is generated each API call and is a combinationof the secret key and a time token
API Verifier Client fraud • It is hard to recover the secret key of the API Verifier Client • AES 128-bit • it is hard to disassemble the API Verifier Client • Obfuscation technique
DDoS attack • Set limit on the number of verification attempts • Finite times to solve CAPTCHA • A time interval for next MAC address verification
By-passing CAPTCHA verification • Analyze the picture and extract characters on the image • send the image to attacker to solve it
System short coming • API Verifier cannot get permanent MAC address on virtual machine
Conclusion & discussion • Propose a novel approach against web based botnet. The main concept is to identify whether a user is a person or a bot • Implement a system, API Verifier, to detect the bots before they access to web service API • For security, the authors consider all possible attacks and defend • DDoS attack issue still exists • Lack for a convincing proof of statistics in real world