[Discussion] The approach to detect proxybots
Gurvinder Singh
gurvinde at stud.ntnu.no
Sat May 30 05:19:40 UTC 2009
Hi,
First of all thanks to matt for introducing me to the open information
security foundation. I was in touch with matt and he suggested me to put
the concept in discussion list to get feedback on it from team. If
possible we can implement this concept to a preprocessor of the new
engine (read message from matt below).
The approach is based on Interarrival Packet Time (IPT). The IPT is the
difference between current packet arrival time and the last packet
arrival time from the sender under current session. The IPT is recorded
from incoming packets at the receiving end. Consider the following scenario
(200ms) (50ms)
Spammer ------------> Proxybot -------------> Mail
server
The spammer starts a session by sending a command to a bot. The bot
initiates a connection with the mail server and establishes a
connection. The mail server responds with greeting message and the bot
relays this message to the spammer. After receiving the greeting
message, the spammer sends HELO message to the bot and bot will relay
message to the server. The server will receive message after delay of
250ms or higher which is the total delay on connection between mail
server and spammer. If the bot system is the real originator of message
request, then the HELO message will be received in 50ms by mail server.
This delay is seen on each command (MAIL FROM, RCPT TO and DATA etc.)
received from bot at server end.
There is a probability that the delay can be due to congestion on the
network. But in above case server will receive an ACK message from bot
system after 50ms which signifies the lack of congestion on the network.
I tested the approach for different protocols and find it working on
FTP, HTTP GET request (Tor), Telnet and simple data transfer using TCP.
I will be happy to answer any question regarding above approach and
looking forward to hear from you about feedback on the concept. The
above concept is result of my master thesis work. If possible, I would
like to join the team.
P.S. The code can be released under GPL.
Thanks for your time.
Best Regards,
Gurvinder Singh
>
> Matt Jonkman wrote:
>> Forgot to mention that this code will all be GPL. :)
>>
>> matt
>>
>> Matt Jonkman wrote:
>>
>>> Hello Gurvinder! Your timing couldn't be better.
>>>
>>> I'm fascinated by the concept, that would help in a lot of things we
>>> are
>>> currently challenged in with IDS.
>>>
>>> The timing is perfect because we've received US Dept of homeland
>>> security funding to build a new next generation IDS. We're about to get
>>> the bulk of our funding and begin development work.
>>>
>>> I'd like to talk to you about applying this concept to a
>>> preprocessor of
>>> the new engine. If you're interested I'd like to introduce you to the
>>> rest of the team. We're having our final planning and hiring meeting
>>> late next week. So this couldn't be more perfect.
>>>
>>> More information about us at http://www.openinfosecfoundation.org
>>>
>>> If you hop on the discussion mailing list we could bring the idea up
>>> and
>>> see what the community thinks about it as well.
>>>
>>> Thanks for contacting me!
>>>
>>> Matt
>>>
>>> Gurvinder Singh wrote:
>>>
>>>> Dear Matt Jonkmans,
>>>>
>>>> I am Gurvinder Singh, master student at Department of Telematics,
>>>> NTNU,
>>>> Trondheim, Norway. Currently i am working on my master thesis on topic
>>>> tittled "Detection of Intermediary Hosts through TCP latency
>>>> propagation". I performed experiments for different protocols and
>>>> find a
>>>> method to detect the intermediary hosts. After reading your article i
>>>> realize that my approach can be used to detect the spam coming from a
>>>> proxy system which is actually sent by some other system behind it. In
>>>> the scenario like this
>>>>
>>>> Spammer ----> ProxyBot ------> Mail Server or Relay
>>>>
>>>> at Mail server or relay we can detect the message is relayed via proxy
>>>> bot and thus server can drop the message and if the behavior is
>>>> persistent the IP address of Proxybot can be added to blacklists. I
>>>> was
>>>> wondering if you have some live traces of communication during arrival
>>>> of spam messages at mail server from proxybot, then i can have real
>>>> world data not just data from my lab. If yes, can it be possible to
>>>> share with me? I would appreciate any comment from you in this regard.
>>>>
>>>> Thanks for your valuable time.
>>>>
>>>> Best Regards,
>>>> Gurvinder Singh
>>>>
>>
>>
>
>
More information about the Discussion
mailing list