BOTNET
DETECTION
Presented By: Rubal Sagwal
Cyber Security
NIT, Kurukshetra
Motivation
 Botnets signifies one of the most severe cybersecurity threats faced by
everyone today.
 Botnets have been used as the main path in carrying many cybercrimes
reported in the recent news.
 The Internet traffic consisted of up to 80 % of botnets traffic related to
spam e-mails originating from known botnets such as Grum, Cutwail and
Rustock. Currently, a large scale of botnets can be more than one
million PCs, launching cyber attacks.
 The FBI in 2013 reported that 10 international hackers were arrested
for using botnets to steal more than $850 million through a group of
compromised computers; they use the personal financial information of
the people to steal such amount.
 Online social networks (OSNs) are even more vulnerable by social bots.
Table of Content
1. Introduction
2. Types of attack
3. Most wanted bots
4. Life cycle of bots
5. Botnet topologies
6. Social bots
7. Types of social bot attack
8. Defensive technique
9. Conclusion
10. Future work
Background
Introduction – Types of Attacks – Most wanted Bots
INTRODUCTION
 A Botnet is a network of compromised computers called
Zombie Computers or Bots, under the control of a
remote attacker.
 Botnets area large collection of geographically separate
compromised machines that act as proxies to hide the
actual location of the host.
 Botnet is one of the most significant threats to the
cybersecurity as they are considered a launching pad for
a number of several illegal activities such as distributed
denial of service (DDoS), click fraud, phishing,
identity theft, spamming and malware distribution.
 A social botnet refers to a group of social bots under
the control of a single bot-master, which work together
to conduct malicious behavior while mimicking (copy)
the interactions among normal OSN users to reduce
their individual risk of being detected.
Types of Attack
 Distributed Denial of Service (DDoS) attacks
 Sending Spams, Viruses, Spyware
 Phishing
 Stealing
 Click Fraud
States
States
Most Wanted Bots
 Zeus- Compromised U.S. 3.6 million computers.
 Koobface- Compromised U.S. 2.9 million computers.
 TidServ- Compromised U.S. 1.5 million computers.
 Trojan.Fakeavalert- Compromised U.S. 1.4 million
computers.
 R/Dldr.Agent.JKH- Compromised U.S. 1.2 million
computers
Components of Botnet
Botmaster – C & C Server – Bot-Machine
…
…
…
.
…
…
…
…
…
…
internet
BOT MASTER
C & C SERVER
BOT MACHINE /
ROBOT
VICTIM
MACHINE
Bot-Master
 The bot master is a person who operates the command
and control of botnets for remote process execution.
 It can control the infected machines, send commands
without directly communicating with them.
 Moreover, botnet owners attempt to hide their
communication with the bots to block any deployed
botnet detection processes.
 The attackers or bot masters use the DNS services to
hide their command and control (C&C) IP address to
make the botnet reliable and easy to migrate from
server to another without being noticed.
Bot-Computer
 A Bot-computer is a computer connected to the
Internet that has been compromised by a hacker,
computer virus or Trojan horse and may be used to
perform malicious tasks of one sort or another beneath
remote direction.
 Botnets of bot-computers are often used to spread
spam e-mail and launch denial-of-service attacks.
 A bot is a malicious program that performs various
actions at a cybercriminal’s command.
Command and Control
Server
 A command and control server (C & C) is a server used
by cybercriminals (Bot-Master) to send orders to bots
and to receive reports from them.
 A C & C servers, it is probable that it can be either
controlled by the malware operators directly, or
themselves run on hardware compromised by malware.
Botnet Life Cycle
Victim MachineBot
Computer
C & C
Server
Bot Master
Botnet Topologies
1. STAR TOPOLOGY 2. HIERARCHICAL TOPOLOGY 3. P2P TOPOLOGY
SOCIAL
BOTNET
Social Botnet
 A Social botnet refers to a group of social bots under
the control of a single bot-master, which work together
to conduct malicious behavior while mimicking (copy)
the interactions among normal OSN users to reduce
their individual risk of being detected.
 For example, social bots on Twitter can follow others
and retweet/answer others’ tweets. Since a skewed
following/followers (FF) ratio is a typical feature for
social bots on Twitter, maintaining a balanced FF ratio
in the social botnet.
 Creating a social botnet is also fairly easy due to the
open APIs published by OSN providers.
Security Threats
 A social-bot can pollute the targeted OSN with a large number
of non-genuine social relationships.
 Second, once a socialbot infiltrates a targeted OSN, it can
exploit its new position in the network to spread
misinformation in an attempt to bias the public opinion . For
eg. : koobface botnet.
 It can also harvest private user data such as email addresses,
phone numbers, and other personally identifiable information
that have monetary value.
OSN Vulnerabilities
INEFFECTIVE
CAPTCHA
SYBIL
ACCOUNTS AND
FAKE PROFILES
EXPLOITABLE
PLATFORMS
AND APIs
Bot Master
C & C channel
C & C Server
Online Social
Network
Social Bots
The Social-
bot
Network[4]
Social-Bot
 A social-bot is a type of bot that controls a social
media account. Like all bots, a social-bot is automated
software. The exact way a social-bot replicates
depends on the social network, but unlike a regular bot,
a social-bot spreads by convincing other users that the
social-bot is a real person.
 A social-bot is also known as social networking bot, or
social bot.
 A socialbot consists of two main components:
> A profile on a targeted OSN (the face), and
> The socialbot software (the brain)
 we require the socialbot to support two types of generic
operations in any given OSN:
(1) social-interaction operations that are used to read
and write social content.
(2) social-structure operations that are used to alter the
social graph.
Types of Social Bitnet Attack
1. Hashtag hijacking
2. Trend-jacking/watering hole
3. Spray and pray
4. Retweet storm
5. Click/Like Farming
Why OSN?
 A social-bot can pollute the targeted OSN with a large
number of non-genuine social relationships.
 Second, once a social-bot infiltrates a targeted OSN, it
can exploit its new position in the network to spread
misinformation in an attempt to bias the public opinion
. For eg. : koobface botnet.
 It can also harvest private user data such as email
addresses, phone numbers, and other personally
identifiable information that have monetary value.
 They allow to share user-generated contents in a fast
and simple way (e.g., there is no need for additional
hosting or authoring tools).
 They support user-to-user real-time interaction, as well
as asynchronous conversations through messages and
comments.
 Web development techniques, such as the Asynchronous
Java script and XML (AJAX) method, permit many OSNs
to be very interactive even providing provision to real-
time features.
 Many OSNs can be accessed via ad-hoc client-interfaces
specifically made for tablets, handheld devices and
gaming consoles, making the service everywhere
available.
 As a consequence of a solid mobility support, OSNs also
offer localization services.
 Unintentional disclosure of personal information.
 Mobile devices are widely use to accessed OSNs from,
e.g., via IEEE 802.11 air interfaces. Then, due the
utilization of weak security settings to exchange data
there are additional risks (e.g., the usage of HTTP
instead of the Secure Hyper Text Transfer Protocol),
 Third-party Web applications can access to user profiles,
turning the OSN into an effective attack platform,
 Therefore, the investigation of privacy and security
aspects of OSNs is a mandatory action to guarantee
their safe and successful utilization.
Are Social Bots Common?
 Bots are actually more common than you might think.
Botnet Detection Technique
1. ANALYSIS BASED TECHNIQUE[6]
USER’S WALL
POST
DRAGGED
USER’S WALL
POST
FILTER USER’S
POST WITHOUT
URL
CLUSTER USERS
BASED ON URL
AND PSOT
IDENTIFY
MALICIOUS
USER
ANALYZE USER
SOCIAL BOT
WITH FAST FLUX
NETWORK
2. SUPERVISED LEARNING[3]
 Most existing work on detecting misbehaving identities
in social networks leverage supervised learning
techniques.
 It deploys honey pots in OSNs to attract spam, trains a
machine learning (ML) classifier over the captured
spam, and then detects new spam using the classifier.
 It creates statistical behavioral profiles for Twitter
users, trains a statistical model with a small manually
labeled dataset of both benign and misbehaving users,
and then uses it to detect compromised identities in
Twitter.
 While working with large crowdsourcing systems,
supervised learning approaches have inherent
limitations. Specifically they are attack-specific and
vulnerable to adaptive attacker strategies. Given the
adaptability of the attacker strategies, to maintain
efficacy.
 supervised learning approaches require labeling,
training, and classification to be done periodically.
3. DEFENSE AGAINST BOTNET-BASED SPAM DISTRIBUTION[3]
 To defend against this attack, they propose to track each
user’s history of participating in spam distribution and
suspend a user if his accumulated suspicious behaviors
exceed some threshold.
 Specifically, for each user v we maintain a spam score sv,
which is updated every time user v retweets a spam. Once
sv exceeds a predefined threshold, user v is labeled as a
spammer and suspended.
 Closer the user to the spam source, the more likely he is a
member of the social botnet. The reason is that social
botnet usually prefers shorter retweeting path for fast
spam dissemination.
 Once a user’s spam score exceeds certain predetermined
threshold, the user is suspended.
Open Issues
 There are no methods which can accurately estimate
the size of botnet.
 Researchers are having access to very small amount of
data for their work for which they have to sign an
agreement for using that data separately for each
domain.
 The use of many detection approaches like Honeypots
is also restricted because of conflicts between IT laws
for data protection and securing IT services from any
illegal intrusion.
 As researchers managed to get very small amount of
real data traces which make it very challenging to verify
their work for large data set
Related Work
 The social botnet has acknowledged attention
only recently. Some works showed that a social
botnet is very in effective in joining to many
random or under attack Facebook users (i.e.,
large-scale infiltration).
 The work in some paper shows how the
spammers become cleverer to insert themselves
into OSN. There is a rich collected works on
spam detection in OSNs.
 Some line of work think through independent
spam bots and comes up with dissimilar
methods to characterize and identify them.
 Some work emphases on describing and identifying
planned spam campaigns launched by an army of spam
bots. Moreover, spam bots are growing towards more
intelligence.
Conclusion and Future Work
 Botnets have played an important role as a major security threats
on the Internet. It is estimated that over 80% of spam messages
originate from these overlay networks.
 The first necessary step towards combating botnet threats is
developing efficient detection techniques.
 From a computer security perspective, the concept of
social bots is both interesting and disturbing: the threat is
no longer from a human controlling or monitoring a
computer, but from exactly the opposite.
 As the future work, we will first extend our studies to OSNs
such as Facebook and Google+ and twitter.
 We will also investigate other attacks that can be enabled
or facilitated by the social botnet so as to raise the
attentiveness of OSN users and also help OSNs improve
their acting up behavior detection systems.
Contd…
 In addition, we plan to explore three lines of
countermeasures against our attacks
 The first line is inspired by the observation that the
amount of communications from a legitimate OSN user
to a social bot is usually far less than that in the
opposite direction.
 Another thinkable defense is to detect malicious
applications registered by the bot-master at OSNs.
 In actual, a large-scale social botnet often involves
allocating the access privileges of individual bots to the
applications the bot-master develops based on the
OSN’s open APIs and registers with the OSN.
These observations can help design effective and efficient
algorithms for OSNs to identify malicious botnet applications.
REFERENCES
1. Sergio S.C. Silva, Rodrigo M.P. Silna, Raqel C.G. Pinto, Ronaldo M. Salles, “Botnet: A Survey” Computer Networks, Volume 57, Issue 2, 4 February 2013, Pages 178-403
2. Alieyan, Kamal, Ammar ALmomani, Ahmad Manasrah, and Mohammed M. Kadhum. "A survey of botnet detection based on DNS." Neural Computing and
Applications (2015), Pages 1-18.
3. Caviglione, Luca, Mauro Coccoli, and Alessio Merlo. "A taxonomy-based model of security and privacy in online social networks." International Journal of
Computational Science and Engineering 9, no. 4 (2014): 325-338.
4. Zhang, Jinxue, et al. "The rise of social botnets: Attacks and countermeasures." IEEE Transactions on Dependable and Secure Computing (2016).
5. Boshmaf, Yazan, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. "The socialbot network: when bots socialize for fame and money." In Proceedings of
the 27th annual computer security applications conference, pp. 93-102. ACM, 2011.
6. Tyagi, Amit Kumar, and G. Aghila. "Detection of fast flux network based social bot using analysis based techniques." Data Science & Engineering (ICDSE), 2012
International Conference on. IEEE, (2012), pp 23-26
7. Boshmaf, Yazan, et al. "Design and analysis of a social botnet." Computer Networks 57.2 (2013), Pages 556-578.
8. Do-evil-the-business-of-social-media-bots. http://www.forbes.com/sites/lutzfinger/2015/02/17/do-evil-the-business-of-social-media-bots/#34bae4351104
9. The-rise-of-social-media-botnets. http://www.darkreading.com/attacks-breaches/the-rise-of-social-media-botnets/a/d-id/1321177
10. kaspersky-ddos-intelligence-report-for-q3-2016. https://securelist.com/analysis/quarterly-malware-reports/76464/kaspersky-ddos-intelligence-report-for-q3-
2016/
11. botnet-statistics-2017-02-05. http://botnet-tracker.blogspot.in/2017/02/botnet-statistics-2017-02-05.html
12. Socialbot. http://whatis.techtarget.com/definition/socialbot
Thank You!

More Related Content

PPT
Botnet Detection Techniques
PPTX
Cyber Threat Intelligence.pptx
PPTX
K-Folds Cross Validation Method
PDF
An Introduction to Test Driven Development
PPTX
Introducing CSS Grid
PPTX
Big Data Analytics
PPTX
Illuminating the dark web
PPTX
Build a chatbot using rasa
Botnet Detection Techniques
Cyber Threat Intelligence.pptx
K-Folds Cross Validation Method
An Introduction to Test Driven Development
Introducing CSS Grid
Big Data Analytics
Illuminating the dark web
Build a chatbot using rasa

What's hot (20)

PPTX
Botnets 101
PDF
BOTNET
PDF
Machine Learning Based Botnet Detection
PPTX
Iot Security
PPTX
PPTX
DDoS - Distributed Denial of Service
PDF
IOT Security
PPTX
PPTX
Denial of service attack
PPTX
Kali linux.ppt
PPTX
DoS or DDoS attack
PPTX
Security Threats at OSI layers
PDF
Network Security Fundamentals
PPTX
Denial of Service Attacks (DoS/DDoS)
PPTX
Dark Web
PDF
What is Ransomware?
PPTX
Investigating Using the Dark Web
PPT
IoT security (Internet of Things)
PPTX
Basics of Denial of Service Attacks
PPTX
Types of attacks
Botnets 101
BOTNET
Machine Learning Based Botnet Detection
Iot Security
DDoS - Distributed Denial of Service
IOT Security
Denial of service attack
Kali linux.ppt
DoS or DDoS attack
Security Threats at OSI layers
Network Security Fundamentals
Denial of Service Attacks (DoS/DDoS)
Dark Web
What is Ransomware?
Investigating Using the Dark Web
IoT security (Internet of Things)
Basics of Denial of Service Attacks
Types of attacks
Ad

Similar to Botnet Detection in Online-social Network (20)

PPTX
Mcs2453 aniq mc101053-assignment1
PPT
Botnet
PDF
Guarding Against Large-Scale Scrabble In Social Network
DOCX
All you know about Botnet
PPTX
unit cyber security BOTNETS Documents.pptx
PPTX
Botnets
PDF
Detecting HTTP Botnet using Artificial Immune System (AIS)
PPTX
Botnet
PDF
How To Protect Your Website From Bot Attacks
PDF
A short visit to the bot zoo
PPTX
Botnet Architecture
PDF
A Survey of Botnet Detection Techniques
PDF
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
PDF
“Design and Detection of Mobile Botnet Attacks”
PDF
P01761113118
PDF
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
PDF
A review botnet detection and suppression in clouds
PDF
Detection of Botnets using Honeypots and P2P Botnets
PDF
Tracing Back The Botmaster
PDF
A Dynamic Botnet Detection Model based on Behavior Analysis
Mcs2453 aniq mc101053-assignment1
Botnet
Guarding Against Large-Scale Scrabble In Social Network
All you know about Botnet
unit cyber security BOTNETS Documents.pptx
Botnets
Detecting HTTP Botnet using Artificial Immune System (AIS)
Botnet
How To Protect Your Website From Bot Attacks
A short visit to the bot zoo
Botnet Architecture
A Survey of Botnet Detection Techniques
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
“Design and Detection of Mobile Botnet Attacks”
P01761113118
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
A review botnet detection and suppression in clouds
Detection of Botnets using Honeypots and P2P Botnets
Tracing Back The Botmaster
A Dynamic Botnet Detection Model based on Behavior Analysis
Ad

More from Rubal Sagwal (20)

PPTX
Introduction to Information Security
PPTX
Cloud and Virtualization Security
PPTX
Cloud and Virtualization (Using Virtualization to form Clouds)
PPTX
ER Modeling and Introduction to RDBMS
PPTX
Database Models, Client-Server Architecture, Distributed Database and Classif...
PPTX
Overview of Data Base Systems Concepts and Architecture
PPTX
Practical Implementation of Virtual Machine
PPTX
Principles of Virtualization - Introduction to Virtualization Software
PPTX
Accessing virtualized published applications
PPTX
Prepare and Manage Remote Applications through Virtualization
PPTX
Managing Virtual Hard Disk and Virtual Machine Resources
PPTX
Configure and Manage Virtualization on different Platforms
PPTX
Virtualization Uses - Server Consolidation
PPTX
Principles of virtualization
PPTX
Troubleshooting Network and Network Utilities
PPTX
Application Layer and Protocols
PPTX
Basics of Network Layer and Transport Layer
PPTX
Wireless Technologies and Standards
PPTX
Ethernet, Point-to-Point Protocol, ARP
PPTX
Basics of Computer Network Device
Introduction to Information Security
Cloud and Virtualization Security
Cloud and Virtualization (Using Virtualization to form Clouds)
ER Modeling and Introduction to RDBMS
Database Models, Client-Server Architecture, Distributed Database and Classif...
Overview of Data Base Systems Concepts and Architecture
Practical Implementation of Virtual Machine
Principles of Virtualization - Introduction to Virtualization Software
Accessing virtualized published applications
Prepare and Manage Remote Applications through Virtualization
Managing Virtual Hard Disk and Virtual Machine Resources
Configure and Manage Virtualization on different Platforms
Virtualization Uses - Server Consolidation
Principles of virtualization
Troubleshooting Network and Network Utilities
Application Layer and Protocols
Basics of Network Layer and Transport Layer
Wireless Technologies and Standards
Ethernet, Point-to-Point Protocol, ARP
Basics of Computer Network Device

Recently uploaded (20)

PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
Altius execution marketplace concept.pdf
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PPTX
Presentation - Principles of Instructional Design.pptx
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
substrate PowerPoint Presentation basic one
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Advancing precision in air quality forecasting through machine learning integ...
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
SaaS reusability assessment using machine learning techniques
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
Data Virtualization in Action: Scaling APIs and Apps with FME
Rapid Prototyping: A lecture on prototyping techniques for interface design
Altius execution marketplace concept.pdf
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
Presentation - Principles of Instructional Design.pptx
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
4 layer Arch & Reference Arch of IoT.pdf
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Build automations faster and more reliably with UiPath ScreenPlay
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Introduction to MCP and A2A Protocols: Enabling Agent Communication
substrate PowerPoint Presentation basic one
A symptom-driven medical diagnosis support model based on machine learning te...
Advancing precision in air quality forecasting through machine learning integ...
Module 1 Introduction to Web Programming .pptx
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Auditboard EB SOX Playbook 2023 edition.
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
SaaS reusability assessment using machine learning techniques
Build Real-Time ML Apps with Python, Feast & NoSQL

Botnet Detection in Online-social Network

  • 1. BOTNET DETECTION Presented By: Rubal Sagwal Cyber Security NIT, Kurukshetra
  • 2. Motivation  Botnets signifies one of the most severe cybersecurity threats faced by everyone today.  Botnets have been used as the main path in carrying many cybercrimes reported in the recent news.  The Internet traffic consisted of up to 80 % of botnets traffic related to spam e-mails originating from known botnets such as Grum, Cutwail and Rustock. Currently, a large scale of botnets can be more than one million PCs, launching cyber attacks.  The FBI in 2013 reported that 10 international hackers were arrested for using botnets to steal more than $850 million through a group of compromised computers; they use the personal financial information of the people to steal such amount.  Online social networks (OSNs) are even more vulnerable by social bots.
  • 3. Table of Content 1. Introduction 2. Types of attack 3. Most wanted bots 4. Life cycle of bots 5. Botnet topologies 6. Social bots 7. Types of social bot attack 8. Defensive technique 9. Conclusion 10. Future work
  • 4. Background Introduction – Types of Attacks – Most wanted Bots
  • 5. INTRODUCTION  A Botnet is a network of compromised computers called Zombie Computers or Bots, under the control of a remote attacker.  Botnets area large collection of geographically separate compromised machines that act as proxies to hide the actual location of the host.  Botnet is one of the most significant threats to the cybersecurity as they are considered a launching pad for a number of several illegal activities such as distributed denial of service (DDoS), click fraud, phishing, identity theft, spamming and malware distribution.
  • 6.  A social botnet refers to a group of social bots under the control of a single bot-master, which work together to conduct malicious behavior while mimicking (copy) the interactions among normal OSN users to reduce their individual risk of being detected.
  • 7. Types of Attack  Distributed Denial of Service (DDoS) attacks  Sending Spams, Viruses, Spyware  Phishing  Stealing  Click Fraud
  • 10. Most Wanted Bots  Zeus- Compromised U.S. 3.6 million computers.  Koobface- Compromised U.S. 2.9 million computers.  TidServ- Compromised U.S. 1.5 million computers.  Trojan.Fakeavalert- Compromised U.S. 1.4 million computers.  R/Dldr.Agent.JKH- Compromised U.S. 1.2 million computers
  • 11. Components of Botnet Botmaster – C & C Server – Bot-Machine
  • 12. … … … . … … … … … … internet BOT MASTER C & C SERVER BOT MACHINE / ROBOT VICTIM MACHINE
  • 13. Bot-Master  The bot master is a person who operates the command and control of botnets for remote process execution.  It can control the infected machines, send commands without directly communicating with them.  Moreover, botnet owners attempt to hide their communication with the bots to block any deployed botnet detection processes.  The attackers or bot masters use the DNS services to hide their command and control (C&C) IP address to make the botnet reliable and easy to migrate from server to another without being noticed.
  • 14. Bot-Computer  A Bot-computer is a computer connected to the Internet that has been compromised by a hacker, computer virus or Trojan horse and may be used to perform malicious tasks of one sort or another beneath remote direction.  Botnets of bot-computers are often used to spread spam e-mail and launch denial-of-service attacks.  A bot is a malicious program that performs various actions at a cybercriminal’s command.
  • 15. Command and Control Server  A command and control server (C & C) is a server used by cybercriminals (Bot-Master) to send orders to bots and to receive reports from them.  A C & C servers, it is probable that it can be either controlled by the malware operators directly, or themselves run on hardware compromised by malware.
  • 16. Botnet Life Cycle Victim MachineBot Computer C & C Server Bot Master
  • 17. Botnet Topologies 1. STAR TOPOLOGY 2. HIERARCHICAL TOPOLOGY 3. P2P TOPOLOGY
  • 19. Social Botnet  A Social botnet refers to a group of social bots under the control of a single bot-master, which work together to conduct malicious behavior while mimicking (copy) the interactions among normal OSN users to reduce their individual risk of being detected.  For example, social bots on Twitter can follow others and retweet/answer others’ tweets. Since a skewed following/followers (FF) ratio is a typical feature for social bots on Twitter, maintaining a balanced FF ratio in the social botnet.  Creating a social botnet is also fairly easy due to the open APIs published by OSN providers.
  • 20. Security Threats  A social-bot can pollute the targeted OSN with a large number of non-genuine social relationships.  Second, once a socialbot infiltrates a targeted OSN, it can exploit its new position in the network to spread misinformation in an attempt to bias the public opinion . For eg. : koobface botnet.  It can also harvest private user data such as email addresses, phone numbers, and other personally identifiable information that have monetary value.
  • 21. OSN Vulnerabilities INEFFECTIVE CAPTCHA SYBIL ACCOUNTS AND FAKE PROFILES EXPLOITABLE PLATFORMS AND APIs
  • 22. Bot Master C & C channel C & C Server Online Social Network Social Bots The Social- bot Network[4]
  • 23. Social-Bot  A social-bot is a type of bot that controls a social media account. Like all bots, a social-bot is automated software. The exact way a social-bot replicates depends on the social network, but unlike a regular bot, a social-bot spreads by convincing other users that the social-bot is a real person.  A social-bot is also known as social networking bot, or social bot.
  • 24.  A socialbot consists of two main components: > A profile on a targeted OSN (the face), and > The socialbot software (the brain)  we require the socialbot to support two types of generic operations in any given OSN: (1) social-interaction operations that are used to read and write social content. (2) social-structure operations that are used to alter the social graph.
  • 25. Types of Social Bitnet Attack 1. Hashtag hijacking 2. Trend-jacking/watering hole 3. Spray and pray 4. Retweet storm 5. Click/Like Farming
  • 26. Why OSN?  A social-bot can pollute the targeted OSN with a large number of non-genuine social relationships.  Second, once a social-bot infiltrates a targeted OSN, it can exploit its new position in the network to spread misinformation in an attempt to bias the public opinion . For eg. : koobface botnet.  It can also harvest private user data such as email addresses, phone numbers, and other personally identifiable information that have monetary value.  They allow to share user-generated contents in a fast and simple way (e.g., there is no need for additional hosting or authoring tools).
  • 27.  They support user-to-user real-time interaction, as well as asynchronous conversations through messages and comments.  Web development techniques, such as the Asynchronous Java script and XML (AJAX) method, permit many OSNs to be very interactive even providing provision to real- time features.  Many OSNs can be accessed via ad-hoc client-interfaces specifically made for tablets, handheld devices and gaming consoles, making the service everywhere available.  As a consequence of a solid mobility support, OSNs also offer localization services.  Unintentional disclosure of personal information.
  • 28.  Mobile devices are widely use to accessed OSNs from, e.g., via IEEE 802.11 air interfaces. Then, due the utilization of weak security settings to exchange data there are additional risks (e.g., the usage of HTTP instead of the Secure Hyper Text Transfer Protocol),  Third-party Web applications can access to user profiles, turning the OSN into an effective attack platform,  Therefore, the investigation of privacy and security aspects of OSNs is a mandatory action to guarantee their safe and successful utilization.
  • 29. Are Social Bots Common?  Bots are actually more common than you might think.
  • 30. Botnet Detection Technique 1. ANALYSIS BASED TECHNIQUE[6] USER’S WALL POST DRAGGED USER’S WALL POST FILTER USER’S POST WITHOUT URL CLUSTER USERS BASED ON URL AND PSOT IDENTIFY MALICIOUS USER ANALYZE USER SOCIAL BOT WITH FAST FLUX NETWORK
  • 31. 2. SUPERVISED LEARNING[3]  Most existing work on detecting misbehaving identities in social networks leverage supervised learning techniques.  It deploys honey pots in OSNs to attract spam, trains a machine learning (ML) classifier over the captured spam, and then detects new spam using the classifier.  It creates statistical behavioral profiles for Twitter users, trains a statistical model with a small manually labeled dataset of both benign and misbehaving users, and then uses it to detect compromised identities in Twitter.
  • 32.  While working with large crowdsourcing systems, supervised learning approaches have inherent limitations. Specifically they are attack-specific and vulnerable to adaptive attacker strategies. Given the adaptability of the attacker strategies, to maintain efficacy.  supervised learning approaches require labeling, training, and classification to be done periodically.
  • 33. 3. DEFENSE AGAINST BOTNET-BASED SPAM DISTRIBUTION[3]  To defend against this attack, they propose to track each user’s history of participating in spam distribution and suspend a user if his accumulated suspicious behaviors exceed some threshold.  Specifically, for each user v we maintain a spam score sv, which is updated every time user v retweets a spam. Once sv exceeds a predefined threshold, user v is labeled as a spammer and suspended.  Closer the user to the spam source, the more likely he is a member of the social botnet. The reason is that social botnet usually prefers shorter retweeting path for fast spam dissemination.  Once a user’s spam score exceeds certain predetermined threshold, the user is suspended.
  • 34. Open Issues  There are no methods which can accurately estimate the size of botnet.  Researchers are having access to very small amount of data for their work for which they have to sign an agreement for using that data separately for each domain.  The use of many detection approaches like Honeypots is also restricted because of conflicts between IT laws for data protection and securing IT services from any illegal intrusion.  As researchers managed to get very small amount of real data traces which make it very challenging to verify their work for large data set
  • 35. Related Work  The social botnet has acknowledged attention only recently. Some works showed that a social botnet is very in effective in joining to many random or under attack Facebook users (i.e., large-scale infiltration).  The work in some paper shows how the spammers become cleverer to insert themselves into OSN. There is a rich collected works on spam detection in OSNs.  Some line of work think through independent spam bots and comes up with dissimilar methods to characterize and identify them.
  • 36.  Some work emphases on describing and identifying planned spam campaigns launched by an army of spam bots. Moreover, spam bots are growing towards more intelligence.
  • 37. Conclusion and Future Work  Botnets have played an important role as a major security threats on the Internet. It is estimated that over 80% of spam messages originate from these overlay networks.  The first necessary step towards combating botnet threats is developing efficient detection techniques.  From a computer security perspective, the concept of social bots is both interesting and disturbing: the threat is no longer from a human controlling or monitoring a computer, but from exactly the opposite.  As the future work, we will first extend our studies to OSNs such as Facebook and Google+ and twitter.  We will also investigate other attacks that can be enabled or facilitated by the social botnet so as to raise the attentiveness of OSN users and also help OSNs improve their acting up behavior detection systems.
  • 38. Contd…  In addition, we plan to explore three lines of countermeasures against our attacks  The first line is inspired by the observation that the amount of communications from a legitimate OSN user to a social bot is usually far less than that in the opposite direction.  Another thinkable defense is to detect malicious applications registered by the bot-master at OSNs.  In actual, a large-scale social botnet often involves allocating the access privileges of individual bots to the applications the bot-master develops based on the OSN’s open APIs and registers with the OSN. These observations can help design effective and efficient algorithms for OSNs to identify malicious botnet applications.
  • 39. REFERENCES 1. Sergio S.C. Silva, Rodrigo M.P. Silna, Raqel C.G. Pinto, Ronaldo M. Salles, “Botnet: A Survey” Computer Networks, Volume 57, Issue 2, 4 February 2013, Pages 178-403 2. Alieyan, Kamal, Ammar ALmomani, Ahmad Manasrah, and Mohammed M. Kadhum. "A survey of botnet detection based on DNS." Neural Computing and Applications (2015), Pages 1-18. 3. Caviglione, Luca, Mauro Coccoli, and Alessio Merlo. "A taxonomy-based model of security and privacy in online social networks." International Journal of Computational Science and Engineering 9, no. 4 (2014): 325-338. 4. Zhang, Jinxue, et al. "The rise of social botnets: Attacks and countermeasures." IEEE Transactions on Dependable and Secure Computing (2016). 5. Boshmaf, Yazan, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. "The socialbot network: when bots socialize for fame and money." In Proceedings of the 27th annual computer security applications conference, pp. 93-102. ACM, 2011. 6. Tyagi, Amit Kumar, and G. Aghila. "Detection of fast flux network based social bot using analysis based techniques." Data Science & Engineering (ICDSE), 2012 International Conference on. IEEE, (2012), pp 23-26 7. Boshmaf, Yazan, et al. "Design and analysis of a social botnet." Computer Networks 57.2 (2013), Pages 556-578. 8. Do-evil-the-business-of-social-media-bots. http://www.forbes.com/sites/lutzfinger/2015/02/17/do-evil-the-business-of-social-media-bots/#34bae4351104 9. The-rise-of-social-media-botnets. http://www.darkreading.com/attacks-breaches/the-rise-of-social-media-botnets/a/d-id/1321177 10. kaspersky-ddos-intelligence-report-for-q3-2016. https://securelist.com/analysis/quarterly-malware-reports/76464/kaspersky-ddos-intelligence-report-for-q3- 2016/ 11. botnet-statistics-2017-02-05. http://botnet-tracker.blogspot.in/2017/02/botnet-statistics-2017-02-05.html 12. Socialbot. http://whatis.techtarget.com/definition/socialbot