论文标题
来自蜜罐日志的机器人装载机的采矿功能同源
Mining Function Homology of Bot Loaders from Honeypot Logs
论文作者
论文摘要
僵尸网络中广泛采用自包式装载机,用于注入加载命令和产卵新机器人。尽管研究人员可以剖析机器人客户以获取植物园的各种信息,但装载机的基于云的和独立的设计有效地阻碍了研究人员使用经典方法来理解装载机的演变和变化。机器人装载机的解耦性也大大降低了调查客户和基础设施之间关系的可行性。在本文中,我们提出了一种基于文本的方法,以研究和分析使用Honeypots的机器人加载器的详细信息。我们利用高相互作用的蜜饯来收集请求日志,并根据聚集聚类的结果定义八个机器人装载机。在功能级别,我们将进一步推动研究,以使用序列对齐技术对请求日志的相似性分析来探索其同源关系。此进一步的探索揭示了Mirai已发布的守则会在客户端和服务器端上卵满产卵。本文揭示了主动僵尸网络基础设施的同源性,为在网络犯罪之间找到秘密关系提供了新的前景。在功能级别上精确研究了机器人装载机,以便为研究人员提供新的见解,以识别僵尸网络的基础架构并随着时间的流逝跟踪其演变。
Self-contained loaders are widely adopted in botnets for injecting loading commands and spawning new bots. While researchers can dissect bot clients to get various information of botnets, the cloud-based and self-contained design of loaders effectively hinders researchers from understanding the loaders' evolution and variation using classic methods. The decoupled nature of bot loaders also dramatically reduces the feasibility of investigating relationships among clients and infrastructures. In this paper, we propose a text-based method to investigate and analyze details of bot loaders using honeypots. We leverage high interaction honeypots to collect request logs and define eight families of bot loaders based on the result of agglomerative clustering. At the function level, we push our study further to explore their homological relationship based on similarity analysis of request logs using sequence aligning techniques. This further exploration discloses that the released code of Mirai keeps spawning new generations of botnets both on the client and the server side. This paper uncovers the homology of active botnet infrastructures, providing a new prospect on finding covert relationships among cybercrimes. Bot loaders are precisely investigated at the function level to yield a new insight for researchers to identify the botnet's infrastructures and track their evolution over time.