Title: Towards Understanding the Lifecycle of Malicious Network Infrastructure

 

Date: Tuesday, December 3, 2024

Time: 3:00 PM – 5:00 PM ET

Location [Hybrid]:  3126 Conference Room Klaus & Zoom

Zoom Link: https://gatech.zoom.us/j/98536458994?pwd=1z2b49FvKG7yCbpRCFoRgmUMBvZ92x.1

 

Athanasios Avgetidis

Ph.D. CS Student

School of Cybersecurity and Privacy

College of Computing

Georgia Institute of Technology

 

Committee:

Dr. Manos Antonakakis (Advisor), School of Electrical and Computer Engineering, Georgia Institute of Technology

Dr. Angelos D. Keromytis (Co-Advisor), School of Electrical and Computer Engineering, Georgia Institute of Technology

Dr. Fabian Monrose, School of Electrical and Computer Engineering, Georgia Institute of Technology

Dr. Roberto Perdisci, School of Computing, University of Georgia

Dr. Alberto Dainotti, School of Computer Science, Georgia Institute of Technology 

 

Abstract:

 

Network infrastructure is an important component of malicious cyber operations. Cyber adversaries utilize network infrastructure for command and control, data exfiltration, malware hosting and social engineering among others. Over the years, while there have been several studies that have focused on detecting, blocking and characterizing malicious infrastructure, the temporal aspect of how this infrastructure changes over time and how this affects common security and forensic tasks has often been overlooked. This thesis shows that temporal analysis of malicious infrastructure reveals unknown forensic information hidden in network datasets that are used in modern defensive operations — systematic discovery and analysis of such unknown forensic information enables more comprehensive understanding of Internet threats.  

In this proposal, I will shed light on the lifecycle of malicious infrastructure through presenting the findings of three empirical measurement studies utilizing different network vantage points. First, I will demonstrate how targeting analysis from a network perspective is temporally sensitive by utilizing the unique vantage point of Authoritative DNS. Second, I will present the first large scale measurement study of the lifecycle of password stealers and their operators showcasing how they manage their operations over a span of 20 months. Lastly, I will introduce my ongoing work on characterizing the lifecycle of the domain names of Advanced Persistent Threats (APT), by proposing Atropos, a novel system that automatically and accurately identifies APT-controlled infrastructure in historical DNS logs.