Malware Capturing and Detection in Dionaea Honeypot: Dilsheer Ali. P Gireesh Kumar T
Malware Capturing and Detection in Dionaea Honeypot: Dilsheer Ali. P Gireesh Kumar T
Malware Capturing and Detection in Dionaea Honeypot: Dilsheer Ali. P Gireesh Kumar T
Abstract - This paper proposes software based malware gain information about the motives and mode of operation of
capturing and detection method. Which implements an efficient the attackers. Research honeypot’s are complex to deploy and
malware capturing and detection method in honeypot maintain , main advantage of this kind of honeypot to collect
environment. It includes collecting the logs from the network
using honeypot system. It create incident table based on the logs,
all the information’s up to the Operating System level. The
in the test case we are using metasploit frame work for attacking size of the logs in a honeypot is very huge. These types of
the honeypot system through LibEmu manually. In the honeypot’s is mainly used for research purpose, military, or
metasploit there are thousands of malicious payloads are government organizations. Based on level of involvement
available, using the payloads we can exploit the vulnerabilities honeypot classified in to two types. High Interaction honeypot
present in the services on the honeypot. and Low interaction honeypot [4] [10]. High interaction
Keywords – Malware, Honeypot, LibEmu, Incidents, Metasploit. honeypot provide lots of services to the attacker up to the
Operating system level[5]. Attacker try to attack the system
through this services. Low Interaction honeypot’s provide the
I. NTRODUCTION service to the attacker that he frequently requested, these types
of honeypots provide only limited number of services.
Malwares can be classified in to different types, some of the
Malware is a computer program that designedly fulls the malwares are list out below . Worm is a malicious computer
abusive intent of an attacker is unremarkable referred to as program that geminates itself to other computer machine, it
despiteful software or malware. Worm, Virus, and Trojan can run independently. The initial element of a worm is called
horse are some of the malware, these malwares are posses malcode[2]. The malcode is act as a penetration testing tool
sympathetic malicious behavior. The ultimate aim of the that locates the vulnerabilities in the system. It will also scan
malware is to take the sensitive information's from the the unsecured servers and replicates itself to each server. Virus
computer system and display unwanted advertisement etc. cannot run independently . It requires host program be run to
Today the malware's are mainly used by black haters and hap it. The first step is invasion virus enter in to the computer
government to steal the information from the Internet users. In system and infect the system. When virus enter the computer
general honeypot means a container of honey. But in terms of system they move towards the hidden areas. When we open
computer markup language, honeypot is a security system some files related to these viruses the virus could infect the
designed to detect the unauthorized access or the use of a system, destroy its major components. Trojan horse is
computer system[6][12]. The aim of the honeypot is to deviate malicious software that pretends to be very useful but perform
the attackers from the real servers[11]. All the traffic through despiteful actions on the background part. The Trojan horses
the honeypot is purely unauthorized, because there is no real are might be very useful browser plugins screen-savers, and
server is running. The honeypot’s can be categorized based on might be downloadable games. Once installed their malicious
their deployment (use/action) and their level of intercession, part might download additional malware from the Internet,
and further classified in to Production and Research honeypot. which also try to modify the system settings or infect files on
Production honeypot can easy to use. It can capture only the computer system. Spyware is mainly used for tracking and
limited number of information’s [4][8]. This type of honeypots storing the internet users movements on the web and serving
are mainly used by corporates, Research honeypots are run to pop-up advertisements to the internet users. Software that
retrieves the sensitive information from the user system, and • Analysis results including labels of anti-viruses etc.
transfer the information to the attacker. Information they • Internet Protocol (IP) addresses information.
might be useful to the attacker like credit card details, account • Downloaded Logs, binaries that were submitted.
credentials, contents of confidential data's and email contents
[2]. Botnet is a group of infected end system under the control The Fetched Malware binaries are stored in the log
of botmaster. Every bot have at least one command and servers and submitted to the analysis server for analysis
control(C & C)channel. Botnet is mainly use IRC protocol due purpose. The malware binaries were fetched from log server
to his high availability. It will commonly used other protocols and submitted to anti-virus scan server which will take care of
are HTTP, Peer to peer, the botmaster send commands to bot the analysis of the binaries supported on signatures. For
through C & C channel [1]. analysis purpose three anti-virus software were taken from
different companies like Symantec and Microsoft, MacAfee,
II. Related Works also the MD5 hash values of the corresponding binaries were
submitted to the Virus Total for scan with 42 anti-virus
Every day the cyber attack rate is increased products.
tremendously, as this reason the security mechanism is very Bhanu S, Khilari G, and Kumar proposed in 2014 [3],
important. Honeypot security mechanism is one of the best Kippo is a SSH based honeypot is a medium-interaction
malware analysis mechanism in the current situation. Here we honeypot which is written in Python language. Kippo is
are us-ing DIONEA Honeypot , dionaea is a low interaction mainly used to log the brute force attacks and the complete
honeypot, it provided some services like SMB, FTP, TFTP, shell interaction recite by an attacker. SSH(Secure shell) is an
VoIP. The LibEmu is the services provided by Dionaea, it encrypted remote system connection mechanism, commonly
provide a shell to the attacker using port binding. Attacker try used in Linux based operating systems. It provides a secure
to execute his malware payload on the shell [8][9]. Dionaea connection between the computer systems. The protocol was
logs all the activities of the attacker. The main aim of the defined by Ylonen and Lonvick in Internet Engineering Task
dionaea is to obtain the copy of the malware. Dionaea collect Forces RFC4254 and allows users to access the secure shell of
the API calls and Argument, using the features it will a remote system through only authentication mechanism. SSH
download the copy of the malware using HTTP. In 2012 uses the port 22 for authentication purpose it will ask for the
chaudhary B. P. [1] deals with a project based on nepenthes username and password at the time of login, also it has a more
honeypot. It is a botnet detection based low interaction secure methods like public key authentication. First they
honeypot, Botnet detection possible on public network as well deploy a kippo honeypot using a virtual private server (VPS).
as in the private network by deploying the honeypots. The Assign a static ip for the server. To monitor all the attacker
automated architecture for malware collection using honeypot activity, they were use some of the tools like an openSSH
and analysis is done by using anti-virus scan. There are three server for collecting the passwords, syslogging to remotely log
major components in the nepenthes honeypot system: important system events. Sebek tool is used for collecting
Malware collector, Virus scan server and Log server. There secretly all keystrokes on incoming SSH connections [3].
are various modules in nepenthes honeypot. Egele, Manuel [2] in 2012 deals with various techniques based
on dynamic malware analysis and tools used for it. The
• Shell code Handlers and Emulators : Which provide a dynamic analysis mainly focused on execute a malware
path to interact with the malware and honeypot sample and analyzing the action taken by it. In static analysis
• Download Modules : It Will try to download the we are analyzing the sample by perambulating it. There are
binary of the file (http,curl, ftp, tftp etc). some drawbacks for static analysis. The main drawback is, it
• Submission Modules : It will submit the binary of a will not give a proper result when it is disassembling them.
malware for analysis purpose(Norman box, Cuckoo function parameter analysis, information flow tracking,
sandbox, postgres, etc). Instruction traces, function call monitoring are useful for
dynamic analysis.
Collected malwares and all the data set including network
trace, and captured data were stored in the log server for • Function call monitoring : A function in a program
further analysis. Log server is a main database server which deals with a specific task. While we are analyzing the
keeps the metadata of the collected information. Also it keeps function call we got the information about it. The
the following records: grabbing of a function call can be termed as hooking.
• Function parameter analysis : The function parameter
• MD5 hash values of the collected samples is different from both static analysis and dynamic
• Binaries of the collected malwares. analysis. In static analysis we consider only possible
• Captured data and network traces.
2
International Conference on Innovations in Power and Advanced Computing Technologies [i-PACT2017]
parameters, but in dynamic analysis, we take the real Dionaea collect all the networks logs in the local repository.
values when function is invoked. Dionaea is a low interaction honeypot. It is the latest version
• Information flow tracking : This is deal with the how of nepenthes honeypot. The ultimate aim of the dionaea is to
the malicious program execute the datas. The obtain the copy of the malware. The Metasploit Framework
important information's are marked as taint. (MSF) has number of vulnerable exploits were available. Its
Whenever the taint label is invoked it will shows an infrastructure that you can build upon your malicious
warnings. payloads and utilize for your custom needs. Lots of vulnerable
• Instruction trace : It will give the behavior view of exploits are available in Metasploit. In dionaea honeypot there
the machine level instruction while it is being are different kinds of services running on there like SMB,
executed. Analysis of system calls and function calls FTP, TFTP, VoIP. SMB is the one of the most vulnerable
are the examples of this type. service running in dionaea honeypot[13]. Open metasploit
frame work in another computer system. Search the different
Podhradsky, A. L., Casey, C., & Ceretti, P. (2012) kinds of payloads for SMB,FTP,FTP, choose one payload and
[7]. The Bluetooth honeypot (Bluepot) developed by Andrew set the payload. After that, set the local IP address and port
Micheal Smith his grail was to create a software that collect number, similarly set the remote IP address and remote system
malware logs and Bluetooth attacks. He create a software port number and exploit the payload on the remote shell.
written in java compatible with Linux operating system. In the
bluepot it will take care of the 3 Bluetooth protocols like A. LibEmu
OBEX,L2CAP,RFCOMM. We can configure and enable the
Bluetooth settings through the bluepot. We can enable the Dionaea uses a service called LibEmu. Which is used
randomizer also which will automatically change the to detect and evaluate the payload send by an attacker. Libemu
Bluetooth name randomly every interval of time, so every provide a LibEmu VM the payloads are executed on there,
interval attacker got a new Bluetooth devices. Attacker try to after executing the payload it will store the features like API
connect to that systems, if the connection established attacker calls and arguments which is called profiling. Once we got the
send a malicious payloads in to the devices through OBEX profiling and payload we have to act up on it in order to obtain
protocol. If the payload is received at the receiver side the the copy of the malware , there are some techniques which is
bluepot take the mac address of the attacker device and Store used by an attacker for attacking a system.
the malicious payloads on the local repository. The bluepot
will provide a graphical representation of an attacking rate. • Shell Binding : Dionaea offers a shell emulation for
payload the provide a shell to the attacker. Attacker
III. DESIGN AND IMPLEMENTATION tries to execute his malicious payload on the shell.
Here we are using the ip address is 172.128.17.46,
Fig.1. shows the complete system architecture of the dionaea attacker try to make a connection with this ip. After
honeypot. All the network traffic are coming to the internal the establishment connection dionea provide a shell
network through the dionaea honeypot, so it will collect the to the attacker. Attacker inject his malicious payloads
logs from the network and stored in the logal repository. This on the shell.
logs is further used for analysis purpose. • URLDownToFile API :- Which is used to download
a copy of the malware via http that send by an
attacker and the copy will be stored in the local
repository.
B. Logging
3
International Conference on Innovations in Power and Advanced Computing Technologies [i-PACT2017]
4
International Conference on Innovations in Power and Advanced Computing Technologies [i-PACT2017]
References
Table II. Malware’s downloaded by dionaea honeypot
[1] Kumar, S., Sehgal, R., Singh, P., & Chaudhary, A. (2013). Nepenthes
Honeypots Based Botnet Detection. arXiv preprint arXiv:1303.3071.
Connection Download URL MD5 Hash values of the Malware
number [2] Egele, M., Scholte, T., Kirda, E., & Kruegel, C. (2012). A survey on
automated dynamic malware-analysis techniques and tools. ACM
Computing Surveys (CSUR), 44(2), 6.
14296 smb://1.34.68.135 939b1bbfd367b0f6ef45144ce0516be [3] Bhanu, S., Khilari, G., and Kumar, V. (2014). Analysis of SSH attacks
of Darknet using Honeypots. International Journal of Engineering
Development and Research, ISSN, 2321-9939
[4] Sachan, A., and Panchagavi, R. (2016). Honeypots: Sweet OR Sour spot
14296 smb://1.34.68.135 64b4345a946bc9388412fedd53fb2
in Network Security
[5] Kumar, S., and Pant, D. (2009). Detection and prevention of new and
unknown malware using honeypots. arXiv preprint arXiv:0912.2293.
14300 smb://1.34.68.135 6f14fbd4368fd67d5fa1d8b92cfd2a9f
[6] Kambow, N., and Passi, L. K. (2014). Honeypots: The Need of Network
Security. International Journal of Computer Science and Information
Technologies, 5(5).
132619 spoolss://103.5.112 7878277b316e802761d4e3f8705c4221
[7] Podhradsky, A. L., Casey, C., & Ceretti, P. (2012, April). The Bluetooth
honeypot project. InWireless Telecommunications Symposium (WTS),
2012(pp. 1-10). IEEE.
132622 spoolss://103.5.112. ce9a7d0d23b3238ff379aa9a313b4e90
94 [8] Aathira.K.S, Hiran.V.Nath, Thulasi.N. Kutty, Gireesh Kumar.T, Low
Budget Honeynet Creation and Implementation for Nids and Nips,
International Journal of Computer and Network Security, Vol. 2, No.
8,pp 27-32, August 2010.
132627 spoolss://103.5.112. f2c55e756009e81c109369c1f9068d30
94 [9] www.edgis-security.org/honeypot/dionaea.
[10] https://github.com/rep/dionaea.
[11] https://www.honeynet.org/project.
132630 spoolss://103.5.112 113e9ae0b05d7aea1ce423b3013c23491 [12] https://en.wikipedia.org/wiki/Honeypot28computing29.
[13] https://github.com/DinoTools/dionaea.