27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Towards an Intelligent Software Agent System as Defense<br />

Against Botnets<br />

Evan Dembskey and Elmarie Biermann<br />

UNISA, Pretoria, South Africa<br />

French South African Institute of Technology CPUT, Cape Town, South Africa<br />

Dembsej@unisa.ac.za<br />

bierman@xsinet.co.za<br />

Abstract: Computer networks are targeted by state and non-state actors and criminals. With the<br />

professionalization and commoditization of malware we are moving into a new realm where off-the-shelf and<br />

time-sharing malware can be bought or rented by the technically unsophisticated. The commoditization of<br />

malware comes with all the benefits of mass produced software, including regular software updates, access to<br />

fresh exploits and the use of hack farms. To an extent defense is out of the hands of the government, and in the<br />

hands of commercial and private hands. However, the cumulative effect of Information Warfare attacks goes<br />

beyond the commercial and private spheres and affects the entire state. Thus the responsibility for defense<br />

should be distributed amongst all actors within a state. As malware increases and becomes more sophisticated<br />

and innovative in their attack vectors, command & control structures and operation, more sophisticated,<br />

innovative and collaborative methods are required to combat them. The current scenario of partial protection due<br />

to resource constraints is inadequate. It is thus necessary to create defence systems that are robust and resilient<br />

against known vectors and vectors that have not previously been used in a manner that is easy and cheap to<br />

implement across government, commercial and private networks without compromising security. We argue that a<br />

significant portion of daily network defence must be allocated to software agents acting in a beneficent botnet<br />

with distributed input from human actors, and propose a framework for this purpose. This paper is based the<br />

preliminary work of a PhD thesis on the topic of using software agents to combat botnets, and covers the<br />

preliminary literature survey and design of the solution. This includes a crowd sourcing component that uses<br />

information about malware gained from software agents and from human users. Part of this work is based on<br />

previous research by the authors. It is anticipated that the research will result in a clearer understanding of the<br />

role of software agents in the role of defence against computer network operations, and a proof-of-concept<br />

implementation.<br />

Keywords: information warfare, Botnet, software agent<br />

1. Introduction<br />

We propose to use distributed software agents (SA) as a method for overcoming botnets and other<br />

malware in the area of Information Warfare (IW). This area of research is important due to the growing<br />

threat posed by malware. This research addresses some of the long term research goals identified by<br />

the US National Research Council (National Research Council (U.S.). Committee on the Role of<br />

Information Technology in Responding to Terrorism et al. 2003) and four of the ten suggested<br />

research areas in (Denning, Denning 2010). It is an extension and refinement of research undertaken<br />

to determine if an IW SA agent framework is viable (Dembskey, Biermann 2008).<br />

Malware is a reality of networked computers and is being increasingly used by state, criminal and<br />

terrorist actors as weapons, vectors for crime and tools of coercion. While it is debatable whether a<br />

digital Pearl Harbour is a genuine possibility (Smith 1998), it is agreed that malware is on the increase<br />

and is being commoditized (Knapp, Boulton 2008, Microsoft 2010, Dunham, Melnick 2009), though<br />

there is some dissent on this point (Prince 2010). Technically unsophisticated users can purchase<br />

time on existing botnets to accomplish some goal, e.g. phishing attacks, spamming, or the denial,<br />

destruction or modification of data.<br />

A botnet is a distributed group of software agent-like bots that run autonomously and automatically,<br />

usually without the knowledge of the computers owner. Botnets are usually, but not necessarily,<br />

malicious. The purpose of botnets is not necessarily destructive; it is often financial gain, which results<br />

in a very different approach to development and Command & Control. An effective process of<br />

prevention, detection and removal will mitigate botnets regardless of their purpose.<br />

IW is warfare that explicitly recognises information as an asset. Computer Network Operations (CNO)<br />

is a form of IW that uses global computer networks to further the aims of warfare. CNO is divided into<br />

Computer Network Attack (CNA) and Computer Network Defence (CND). Increasingly, politically<br />

motivated cyber attacks are focusing on commercial and not government infrastructure (Knapp,<br />

298

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!