System and method for bot detection

ABSTRACT

Exemplary systems and methods for detecting a communication channel of a bot. In exemplary embodiments, presence of a communication channel between a first network device and a second network device is detected. Data from the communication channel is scanned and used to determine if a suspected bot communication exists. If a bot communication is detected, then a recovery process may be initiated.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.14/052,632 filed Oct. 11, 2013, now U.S. Pat. No. 9,628,498 issued onApr. 18, 2017, which is a continuation of U.S. patent application Ser.No. 11/998,605, filed Nov. 30, 2007, now U.S. Pat. No. 8,561,177, whichclaims benefit of provisional patent application No. 60/868,323, filedDec. 1, 2006, entitled, “Detecting Command & Control CommunicationChannels of Botnets”, and is a continuation-in-part of U.S. patentapplication Ser. No. 11/494,990, filed Jul. 28, 2006, entitled “DynamicSignature Creation and Enforcement”, which is a continuation-in-part ofU.S. patent application Ser. No. 11/471,072, filed Jun. 19, 2006,entitled “Virtual Machine with Dynamic Data Flow Analysis”, which is acontinuation-in-part of U.S. patent application Ser. No. 11/409,355,filed Apr. 20, 2006, entitled “Heuristic Based Capture with Replay toVirtual Machine”, which is a continuation-in-part of U.S. patentapplication Ser. No. 11/096,287, filed Mar. 31, 2005, entitled “Systemand Method of Detecting Computer Worms”, and is a continuation-in-partof U.S. patent application Ser. No. 11/151,812, filed Jun. 13, 2005,entitled “System and Method of Containing Computer Worms,” and is acontinuation-in-part of U.S. patent application Ser. No. 11/152,286,filed Jun. 13, 2005, entitled “Computer Worm Defense System and Method;U.S. patent application Ser. No. 11/096,287 claims the benefit of U.S.Provisional Application No. 60/559,198 filed on Apr. 1, 2004, U.S.patent application Ser. No. 11/151,812 claims the benefit of U.S.Provisional Application No. 60/579,953 filed on Jun. 14, 2004, and U.S.patent application Ser. No. 11/152,286 claims the benefit of U.S.Provisional Application No. 60/579,910 filed on Jun. 14, 2004, all ofwhich are incorporated by reference herein.

This application is related to U.S. patent application Ser. No.11/998,750, filed on Nov. 30, 2007, and entitled “Systems and Methodsfor Detecting Encrypted Bot Command & Control Channels.”

The above-referenced related patent application is also incorporated byreference herein.

BACKGROUND OF THE INVENTION Field of the Invention

The present invention relates generally to network security and moreparticularly to detecting command and control communication channels ofa bot.

Background Art

Presently, malicious software (i.e., malware) can attack various devicesvia a network. For example, malware may include any program or file thatis harmful to a computer user, such as bots, computer viruses, worms,Trojan horses, spyware, or any programming that gathers informationabout a computer user or otherwise operates without permission. Variousprocesses and devices have been employed to prevent the problems thatmalware can cause.

For example, computers often include antivirus scanning software thatscans a particular client device for viruses. The scanning may beperformed based on a schedule specified by a user associated with theparticular computer, a system administrator, and so forth.Unfortunately, by the time a virus is detected by the scanning software,some damage on the particular computer may have already occurred.

Another option for preventing malware is a honey pot. A honey pot is acomputer system on the Internet that is expressly set up to attract and“trap” an illicit user that attempts to penetrate another's computersystem. The illicit user can include a hacker, a cracker, or a scriptkiddy, for example. The honey pot records the activities associated withthe invasion of the computer system. Disadvantageously, as the honey potis being invaded, so too are other users' computer systems on the samenetwork. Thus, other users' computer systems may be harmed while thehoney pot determines the nature of the malware invading the honey pot'sown computer system.

In some instances, malware comprises a bot. A bot is a software robotconfigured to remotely control all or a portion of a digital device(e.g., a computer) without authorization by the digital device's user.Bot related activities include bot propagation and attacking othercomputers on a network. Bots commonly propagate by scanning nodes (e.g.,computers or other digital devices) available on a network to search fora vulnerable target. When a vulnerable computer is scanned, the bot mayinstall a copy of itself. Once installed, the new bot may continue toseek other computers on a network to infect.

A bot may also, without the authority of the infected computer user,establish a command and control communication channel to receiveinstructions. Bots may receive command and control communication from acentralized bot server or another infected computer (e.g., via apeer-to-peer (P2P) network established by a bot on the infectedcomputer).

The bot may receive instructions to perform bot related activities. Whena plurality of bots (i.e., a botnet) act together, the infectedcomputers (i.e., zombies) can perform organized attacks against one ormore computers on a network. In one example, bot infected computers maybe directed to ping another computer on a network in a denial-of-serviceattack. In another example, upon receiving instructions, one or morebots may direct the infected computer to transmit spam across a network.

A bot may also receive instructions to transmit information regardingthe infected host computer. In one example, the bot may be instructed toact as a keylogger and record keystrokes on the infected host computer.The bot may also be instructed to search for personal information andemail addresses of other users contained in an email or contacts file.This information may be transmitted to one or more other infectedcomputers or a user in command of the bot or botnet.

SUMMARY OF THE INVENTION

Systems and methods for detecting a command and control communicationchannel of a bot are provided. In exemplary embodiments, presence of acommunication channel between a first network device and a secondnetwork device is detected.

Data from the communication channel is scanned and used to determine ifa suspected bot communication exists. Several different methods may beutilized to detect a command and control (C&C) communication within thecommunication channel. In one embodiment, a fingerprint module may scanfor a bot oriented command communications in an IRC channel. In oneexample, the fingerprint module scans for commands or messages thatindicate that an IRC channel is being established. In an alternativeembodiment, a port module may monitor for communications originatingfrom a non-standard port. In a further embodiment, a virtual machine maybe utilized to detect C&C communication channels either in a replayvirtual machine environment or in a direct entry virtual machineenvironment. Accordingly, intercepted or replayed network data obtainedfrom the communication channel is transmitted to the virtual machine,and the virtual machine response is then analyzed to determine if thevirtual machine is infected. In some embodiments, an analysisenvironment may wait for an outbound domain name system (DNS) request,which may also identify the C&C channel. A pseudo-DNS server in thevirtual machine can respond to the request with an IP address mapped toan internal-to-virtual machine-analysis pseudo-server. The outbound IRCor web request made to the supplied IP address may confirm the C&Cchannel.

If a bot communication is detected, then a recovery process may beinitiated. In one embodiment, during the recovery process, the devicesthat are suspected as being infected may be flagged and/or proper usersand administrators notified. For example, icons associated with nodescoupled to a network may be color coded based on their association withany infection propagation, command and control communication with a bot,and/or bot attack. In another embodiment, a router (i.e., switch) may beconfigured to direct all data from a bot server (e.g., from the sourceIP address of the bot server) to a controller. As a result, all thenetwork data from the bot server, not only that which is transmitted tothe network device, may be intercepted.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram of a channel detection environment in whichembodiments of the present invention may be practiced.

FIG. 2 is a block diagram of an exemplary bot detector implementing someembodiments of the present invention.

FIG. 3 is a block diagram of an exemplary controller implementing someembodiments of the present invention.

FIG. 4 is a block diagram of an exemplary analysis environment, inaccordance with some embodiments of the present invention.

FIG. 5 is a flowchart of an exemplary method for detecting a C&C channelof a bot.

FIG. 6 is a block diagram of the controller, in accordance with oneembodiment of the present invention.

DESCRIPTION OF EXEMPLARY EMBODIMENTS

Exemplary systems and methods for detection of a command and controlcommunication channel of a bot are provided. The bot running on acompromised device may be part of a plurality of software robots (e.g.,a botnet) which run autonomously on a collection of compromised devicesunder a common command and control (C&C) infrastructure. In one example,a bot on the compromised device may open an Internet Relay Chat (IRC)channel with another device to receive commands. This IRC channel may bereferred to as a C&C communication channel.

In some embodiments, the communication channel detection system maycomprise a dynamic honey pot. A dynamic honey pot can monitor networktraffic to detect the presence of a C&C communication channel. If a C&Cchannel or a suspected C&C channel is detected, then the network datafrom the C&C communication channel may be intercepted. In exemplaryembodiments, the network traffic does not need to be directlytransmitted to the dynamic honey pot. Rather, the dynamic honey pot candetect possible bot infection attempts or command and controlcommunication with an existing bot on other devices on the network. Upondetection, the dynamic honey pot can then intercept future network data.

In exemplary embodiments, network data from a communication network maybe copied and analyzed. If a C&C channel or a suspected C&C channel isdetected, related network data may be intercepted. The interceptednetwork data may continue to be analyzed. If the intercepted networkdata comprises a network attack, command and control communication,and/or an attempt to propagate the bot, an unauthorized activitysignature configured to identify the activity and/or bot may begenerated.

The bot compromises one or more compromised devices which may send spamand malware, such as viruses, worms, or Trojan horses, for example. Avirus is an intrusive program that infects a computer file by insertinga copy of itself in the file. The copy is usually executed when the fileis loaded into memory, allowing the virus to infect other files. A wormis a program that propagates itself across multiple computers, usuallyby creating copies of itself in each computer's memory. A worm mayduplicate itself in a computer so many times that it causes the computerto crash. A Trojan horse is a destructive program disguised as a game,utility, or application. When run by a user or computer program, aTrojan horse can harm the computer system while appearing to dosomething useful.

Malware may also include adware and spyware. Adware is a programconfigured to direct advertisements to a computer or a particular user.In one example, adware identifies the computer and/or the user tovarious websites visited by a browser on the computer. The website maythen use the adware to either generate pop-up advertisements orotherwise direct specific advertisements to the user's browser. Spywareis a program configured to collect information regarding the user, thecomputer, and/or a user's network habits. In an example, spyware maycollect information regarding the names and types of websites that theuser browses and then transmit the information to another computer.Adware and spyware are often added to the user's computer after the userbrowses to a website that hosts the adware and/or spyware. The user isoften unaware that these programs have been added and are similarlyunaware of the adware and/or spyware's function.

FIG. 1 is a diagram of a channel detection environment 100 in whichembodiments of the present invention may be practiced. The channeldetection environment 100 may comprise a bot server 105 in communicationvia a communication network 110 with a network device 115. Additionally,a tap 120 may be coupled to the communication network 110. The tap 120may be further coupled to a controller 125. Optionally, a router (notshown) may be provided for re-routing data from the communicationnetwork 110.

The bot server 105 and the network device 110 comprise digital devices.A digital device comprises any device with a processor. Some examples ofdigital devices include computers, servers, laptops, personal digitalassistants, and cellular telephones. The bot server 105 is configured totransmit network data over the communication network 110 to the networkdevice 115, which is configured to receive the network data. In someembodiments, the bot server 105 may establish a C&C communicationchannel with the network device 115 via the communication network 110.The C&C communication channel may be utilized by the bot server 105 tocontrol a bot on the node or the node itself on the network device 115.

The bot server 105 may attempt to control the network device 115 bytransmitting instructions or a bot to the network device 115. In oneexample, the bot server 105 is a computer controlled by an illicit userto control one or more bots or one or more network devices 115 throughthe use of bots. In another example, the bot server 105 is a networkdevice similar to the network device 115; the bot server 105 may be apart of a P2P communication network for transmitting instructions to abot on another digital device. In this example, once infected, thenetwork device 115 may be a part of a P2P communication network wherebythe network device 115 may transmit instructions to another networkdevice similar to a bot server 105.

The tap 120 may comprise a digital data tap configured to monitornetwork data and provide a copy of the network data to the controller125. In some embodiments, the tap 120 comprises a span port. The networkdata comprises signals and data that are transmitted over thecommunication network 110 including data flows from the bot server 105to the network device 115. As discussed herein, the network data mayinclude command and control instructions transmitted from the bot server105. In one example, the tap 120 copies the network data without anappreciable decline in performance of the bot server 105, the networkdevice 115, or the communication network 110. The tap 120 may copy anyportion of the network data. For example, the tap 120 can receive andcopy any number of data packets of the network data. In exemplaryembodiments, the tap 120 can monitor and copy data transmitted frommultiple devices without appreciably affecting the performance of thecommunication network 110 or the devices coupled to the communicationnetwork 110. In various embodiments, the tap 120 can sample the networkdata based on a sampling scheme.

The tap 120 can also capture metadata from the network data. Themetadata can be associated with the bot server 105 and/or the networkdevice 115. In one example, the metadata may identify the bot server 105and/or the network device 110. In some embodiments, the bot server 105transmits metadata, which is captured by the tap 120. In otherembodiments, a heuristic module, described in more detail below, candetect the bot server 105 and/or the network device 110 by analyzingdata packets within the network data and generate the metadata.

The communication network 110 may comprise a public computer networksuch as the Internet, a private computer network such as a wirelesstelecommunication network, wide area network, local area network, or anyother type of network enabled to provide communications between coupleddevices.

Although FIG. 1 depicts data transmitted from the bot server 105 to thenetwork device 115, either device can transmit and receive data from theother device. Similarly, although only one bot server 105, communicationnetwork 110, network device 115, tap 120, and controller 125 aredepicted in FIG. 1, there may be any number of bot servers 105,communication networks 110, network devices 115, taps 120, andcontrollers 125.

The controller 125 may comprise a processor and/or software configuredto receive and analyze network data for the presence of network datasent via the C&C communication channel. In exemplary embodiments, thecontroller 125 receives network data over the tap 120. If the controller125 detects commands within network data that potentially establishes aC&C communication channel, the controller 125 may intercept theassociated network data. In one example, the controller 125 mayintercept network data from the same data flow as that which potentiallyestablished the C&C communication channel. In another example, thecontroller 125 may intercept all network data from a node on thecommunication network that either received or sent the commands (e.g.,the bot server 105 and the network device 115). When network data isintercepted, the network data is no longer received by the intendedrecipient but rather is received by the controller 125. In someembodiments, the associated network data is intercepted when networkdata is flagged as suspicious.

In some embodiments, the controller 125 can organize the network datainto one or more data flows. Data flows can then be reconstructed basedon the network data samples received from the tap. The controller 125 isfurther discussed in more detail in connection with FIG. 3.

FIG. 2 is a block diagram of an exemplary bot detector 200 implementingsome embodiments of the present invention. In various embodiments, thebot detector 200 may be coupled to or comprised within the controller125. In other embodiments, the bot detector 200 is coupled to thecommunication network 110. In various embodiments, the bot detector 200is software that is loaded on a digital device. For example, the botdetector 200 may be provided to a user for installation onto their LANor a network device (e.g., network device 115).

The exemplary bot detector 200 may comprise a protocol fingerprintmodule 205, a protocol state description module 210, a port module 215,a signature module 220, and a tracking module 225. Alternativeembodiments may comprise more, less, or functionally equivalent modules.

In various embodiments, the use of an IRC protocol is used for botcommand and control. Therefore, detecting the existence or establishmentof an IRC channel in the network may indicate a possible botnet C&Ccommunication channel. In one embodiment, the protocol fingerprintmodule 205 is utilized to detect an IRC C&C channel. The exemplaryprotocol fingerprint module 205 may comprise input/output relatedbehavior that uniquely identifies a protocol implementation (e.g.,version number, feature, vendor, etc.). In some embodiments, a networktrace may map routes between the bot server 105 and the network device115.

In exemplary embodiments, network data is scanned to detect a botoriented IRC command, such as .advscan and SCAN, to highlight IRCchannels to a potential bot server 105. Stateful protocol fingerprintinganalysis by the protocol fingerprint module 205 may be performed todetect bot oriented commands in the IRC channels. For example, insteadof simply scanning for .advscan in an input stream, the protocolfingerprint module 205 may first look for an IRC channel establishment(e.g., JOIN and JOIN confirm commands), and then scan for an .advscanmessage.

In some embodiments, the protocol fingerprinting module 205 may beextensible to other protocols via protocol feature description usingprotocol state descriptions provided by the protocol state descriptionmodule 210 and regular expressions. A description of the IRC protocol ismade possible using this technique. For example, if the protocol statedescription module 210 determines that the protocol being used is IRC,the protocol fingerprint module 205 may be configured by the protocolstate description module 210 to detect IRC commands.

In various embodiments, the signature module 220 provides signatureswhich identify bot related behavior, known bot servers 105, suspectedbot servers, mechanisms to block attacks, mechanisms to block botpropagation, and/or mechanisms that remove bots from network devices115. These signatures may be provided to the protocol fingerprint module205 and/or the controller 125 to take corrective action.

By correlating infection propagation with C&C communication activity, ahigher degree of confidence can be ascribed to a suspected bot list. Forexample, if traffic is observed on a suspected IRC C&C channel andimmediately thereafter there is discovery of infection propagation fromthe IRC server (e.g., bot server 105 or network device 115) thatprovided the C&C communication, then all nodes that have communicated tothe same IRC server are highly suspect. This broadens the visibility ofinfected systems from those that are observed actively propagatinginfections to systems that have not been observed actively propagatingbut have been in communication with a confirmed active bot server 105.

Furthermore, detection of a central C&C server allows authorities andsystem administrators to take the central C&C server offline and/orblock communications with the central C&C server. Once the C&C serverhas been neutralized, the bots that may otherwise receive commands fromthe C&C server are no longer controlled and are, in some examples,unable to function.

However, because the bot server 105 may be easily neutralized byshutting down the central C&C server, botnets controlled using aPeer-to-Peer (P2P) communications protocol have been developed. Due tothe distributed nature of P2P communication channel, it becomes muchharder to shut down a P2P controlled botnet.

In various embodiments, detection of a P2P C&C channel may be performedby the port module 215 detecting communications on a seldom used(non-standard) port. During base-lining, standard well-known ports aremarked. For example, all well known ports and services in a networkenvironment may be categorized as “standard.” A standard list may becompiled and stored by the port module 215. In exemplary embodiments,the standard list may comprise all ports defined in Internet RFCs aswell as ports and services used by standard versions of Windows andLinux.

In some embodiments, the port module 215 may “learn” standard portsthrough observation of network data on a communication network 110. Inone example, the software on multiple network devices 115 may transmitand receive network data on a variety of ports. The network data isreceived by the controller 125 and the port module 215 may update thestandard list based on the ports of the network devices 115 that receiveand transmit data over a predetermined period of time.

Any port not on the standard list may be considered a non-standard port.In some embodiments, the port module 215 will mark a number of nodescommunicating over a non-standard port over a predetermined period oftime a P2P communications channel when the number of nodes is over somethreshold (e.g., 3 or 4 nodes). In one example, the port module 215 willmark a potential P2P communications channel when four network devices115 communicate with each other over a non-standard port within 4seconds.

These nodes do not need to be communicating on the same port, as long asthe ports are seldom used non-standard ports. For example, the portmodule 215 may detect P2P chains that use a different port for each legof the chain. In some embodiments, the time difference between anomalypropagation in the chain may be assumed to be small (e.g., less than 10seconds). This short time difference allows the tracking module 225 totrack various nodes without running into resource constraint issues. Inone example, the tracking module 225 identifies network devices 115 thatcommunicate with other network devices 115 over the predetermined periodof time. The port module 215 may identify those network devices 115communicating over non-standard ports. Once the port module 215 detectsa network device 115 communicating over a non-standard port, the portmodule 215 may check the tracking module 225 to determine if any othernetwork device 115 has been communicating over non-standard ports.

In other embodiments, the tracking module 225, tracks the source anddestination of at least some communications over the communicationnetwork 110. If a bot server 105 or a potential bot server is detected,the tracking module 225 can provide a list of network devices 115 incommunication with the bot server 105 or the potential bot server. Inone example, the tracking module 225 can provide a list of nodes incommunication with a suspected bot server 105 over a predeterminedperiod of time.

While existence of a P2P channel is not conclusive evidence of a botnet,network operators may benefit from notification of P2P communications ontheir networks. If a P2P communication can be correlated to infectionpropagation via one or more nodes of the P2P chain, then all nodes ofthe P2P network may become highly suspect as members of a P2P controlledbotnet.

In exemplary embodiments of the present invention, systems may be markedin order to identify infections. For example, any nodes that are notassociated with any infection propagation may be placed in a yellowcategory. These nodes (e.g., network devices 115) may be considered“nodes of interest.” Nodes in an IRC or P2P network where at least oneof the nodes (e.g., in a chain of nodes) is observed propagating aninfection may be placed in, for example, an orange category. Nodes thatare observed to be actively propagating an infection may be placed in ared category. Any nodes that have not been categorized as yellow,orange, or red may be assigned to a green category. In variousembodiments, icons associated with nodes may be colored and/orassociated with a color category.

FIG. 3 is a block diagram of an exemplary controller 125 implementingembodiments of the present invention. The controller 125 may be anydigital device or software that receives network data. The exemplarycontroller 125 may comprise bot detection components similar to the botdetector 200 of FIG. 2 including a protocol fingerprint module 305, aprotocol state description module 310, and a tracking module 315. Inthis example, the functions of the tracking module 225 (FIG. 2) and theport module 215 (FIG. 2) are combined.

The controller 125 may further comprise a heuristic module 320, ascheduler 325, a fingerprint module 330, a virtual machine pool 335, ananalysis environment 340, a signature module 345, and a policy engine350. In some embodiments, the controller 125 comprises a tap which isfurther coupled to the communication network 110. In other embodiments,the controller 125 is coupled to an external tap 120 or may be directlycoupled to the communication network 110.

The exemplary heuristic module 320 may receive a copy of network datafrom the communication network 110. The heuristic module 320 appliesheuristics and/or probability analysis to determine if the network datamay contain suspicious activity (such as bot related activity). In oneexample, the heuristic module 320 flags network data as suspicious. Thenetwork data can then be buffered and organized into a data flow. Thedata flow is then provided to the scheduler 325. In some embodiments,the network data is provided directly to the scheduler 325 withoutbuffering or organizing the data flow.

The heuristic module 320 can perform any heuristic and/or probabilityanalysis. In some embodiments, once a C&C communication channel has beendetected or suspected, analysis may be performed to confirm and/orverify the C&C channel. Once the protocol fingerprint module 305identifies a potential C&C communication channel, network data from thechannel is forwarded to the scheduler 325.

In other embodiments, the heuristic module 320 performs a dark internetprotocol (IP) heuristic. A dark IP heuristic can flag network datacoming from a bot server 105 that has not previously been identified bythe heuristic module 320. The dark IP heuristic can also flag networkdata going to an unassigned IP address. In an example, an attacker scansrandom IP addresses of a network to identify an active server orworkstation. The dark IP heuristic can flag network data directed to anunassigned IP address.

The heuristic module 320 can also perform a dark port heuristic. A darkport heuristic can flag network data transmitted to an unassigned orunusual port address. Such network data transmitted to an unusual portcan be indicative of a port scan by a worm, hacker, or bot. Further, theheuristic module 320 can flag network data from the bot server 105 ornetwork device 115 that is significantly different than traditional datatraffic transmitted by the bot server 105 or network device 115. Forexample, the heuristic module 320 can flag network data from the botserver 105 such as a laptop that begins to transmit network data that iscommon to a server.

The heuristic module 320 can retain data packets belonging to aparticular data flow previously copied by the tap 120. In one example,the heuristic module 320 receives data packets from the tap 120 andstores the data packets within a buffer or other memory. Once theheuristic module 320 receives a predetermined number of data packetsfrom a particular data flow, the heuristic module 320 performs theheuristics and/or probability analysis.

In some embodiments, the heuristic module 320 performs heuristic and/orprobability analysis on a set of data packets belonging to a data flow320 can then continue to receive new data packets belonging to the samedata flow. Once a predetermined number of new data packets belonging tothe same data flow are received, the heuristic and/or probabilityanalysis can be performed upon the combination of buffered and new datapackets to determine a likelihood of suspicious activity.

In some embodiments, an optional buffer receives the flagged networkdata from the heuristic module 320. The buffer can buffer and organizethe flagged network data into one or more data flows before providingthe one or more data flows to the scheduler 325. In various embodiments,the buffer can buffer network data and stall before providing thenetwork data to the scheduler 325. In one example, the buffer stalls thenetwork data to allow other components of the controller 125 time tocomplete functions or otherwise clear data congestion.

The scheduler 325 is a module that identifies the network device 115 toreceive the copied network data and retrieves a virtual machineassociated with the network device 115. A virtual machine may besoftware that is configured to mimic the performance of a device (e.g.,the network device 115). The virtual machine can be retrieved from thevirtual machine pool 335.

In some embodiments, the heuristic module 320 transmits the metadataidentifying the network device 115 to receive the copied network data tothe scheduler 325. In other embodiments, the scheduler 325 receives oneor more data packets of the network data from the heuristic module 320and analyzes the one or more data packets to identify the network device115. In yet other embodiments, the metadata can be received from the tap120.

The scheduler 325 can retrieve and configure the virtual machine tomimic pertinent performance characteristics of the network device 115.In one example, the scheduler 325 configures characteristics of thevirtual machine to mimic only those features of the network device 115that are affected by the network data copied by the tap 120. Thescheduler 325 can determine the features of the network device 115 thatare affected by the network data by receiving and analyzing the networkdata from the tap 120. Such features of the network device 115 caninclude ports that are to receive the network data, select devicedrivers that are to respond to the network data and any other devicescoupled to or contained within the network device 115 that can respondto the network data. In other embodiments, the heuristic module 320 candetermine the features of the network device 115 that are affected bythe network data by receiving and analyzing the network data from thetap 120. The heuristic module 320 can then transmit the features of thedestination device to the scheduler 325.

The optional fingerprint module 330 is configured to determine thepacket format of the network data to assist the scheduler 325 in theretrieval and/or configuration of the virtual machine. In one example,the fingerprint module 330 determines that the network data is based ona transmission control protocol/internet protocol (TCP/IP). Thereafter,the scheduler 325 will configure a virtual machine with the appropriateports to receive TCP/IP packets. In another example, the fingerprintmodule 330 can configure a virtual machine with appropriate ports toreceive user datagram protocol/internet protocol (UDP/IP) packets. Thefingerprint module 330 can determine any type of packet format of thenetwork data.

In other embodiments, the optional fingerprint module 330 passivelydetermines a software profile of the network data to assist thescheduler 325 in the retrieval and/or configuration of the virtualmachine. The software profile may comprise the operating system (e.g.,Linux RH6.2) of the bot server 105 that generated the network data. Thedetermination can be based on analysis of the protocol information ofthe network data. In an example, the fingerprint module 330 determinesthat the software profile of network data is Windows XP, SP1. Thefingerprint module 330 can then configure a virtual machine with theappropriate ports and capabilities to receive the network data based onthe software profile. In other examples, the fingerprint module 330passes the software profile of the network data to the scheduler 325,and the scheduler 325 either selects or configures the virtual machinebased on the profile.

The virtual machine pool 335 is configured to store virtual machines.The virtual machine pool 335 may include any storage capable of storingvirtual machines. In one example, the virtual machine pool 335 stores asingle virtual machine that can be configured by the scheduler 325 tomimic the performance of any network device, such as the network device115 on the communication network 110. The virtual machine pool 335 canstore any number of distinct virtual machines that can be configured tosimulate the performance of any of the network devices 115.

The analysis environment 340 is a module that simulates transmission ofunencrypted or decrypted network data between the bot server 105 and thenetwork device 115 to identify the effects of malware or illegitimatecomputer users (e.g., a hacker, computer cracker, or other computeruser) by analyzing the simulation of the effects of the network dataupon the network device 115 that is carried out on the virtual machine.In exemplary embodiments, there may be multiple analysis environments340 in order to simulate multiple network data.

In one example, the analysis environment 340 simulates transmission ofthe network data between the bot server 105 and the network device 115to analyze the effects of the network data upon the network device 115to detect unauthorized activity. As the analysis environment 340simulates the transmission of the network data, behavior of the virtualmachine can be closely monitored for unauthorized activity. If thevirtual machine crashes, performs illegal operations, or performs botrelated activity, the analysis environment 340 can react. In someembodiments, the analysis environment 340 performs dynamic taintanalysis to identify unauthorized activity.

Once unauthorized activity is detected, the analysis environment 340 cangenerate the unauthorized activity signature configured to identifynetwork data containing unauthorized activity (e.g., malware attacks orbot related activity). Since the unauthorized activity signature doesnot necessarily require probabilistic analysis to detect unauthorizedactivity within network data, unauthorized activity detection based onthe unauthorized activity signature may be very fast and save computingtime.

In various embodiments, the unauthorized activity signature may providecode that may be used to eliminate or “patch” portions of network datacontaining an attack. Further, in some embodiments, the unauthorizedactivity signature may be used to identify and eliminate (i.e., delete)the malware causing the attack. The unauthorized activity signature mayalso be used to configure digital devices to eliminate vulnerabilities(e.g., correct system settings such as disabling active-x controls in abrowser or updating an operating system.)

The analysis environment 340 may store the unauthorized activitysignature within the signature module 345. The analysis environment 340may also transmit or command the transmission of the unauthorizedactivity signature to one or more other controllers 125, bot detectors200 (e.g., to the signature module 220), network devices 115, switches,and/or servers. By automatically storing and transmitting theunauthorized activity signature, known malware, previously unidentifiedmalware, and the activities of illicit computer users can be quicklycontrolled and reduced before a computer system is damaged orcompromised. The analysis environment 340 is further discussed withrespect to FIG. 4.

The signature module 345 receives, authenticates, and storesunauthorized activity signatures. The unauthorized activity signaturesmay be generated by the analysis environment 340 or another controller125. The unauthorized activity signatures may then be transmitted to thesignature module 345 of one or more controllers 125.

The policy engine 350 coupled to the heuristic module 320 and is amodule that can identify network data as suspicious based upon policiescontained within the policy engine 350. In one example, the networkdevice 115 can be a computer designed to attract hackers and/or worms(e.g., a “honey pot”). The policy engine 350 can contain a policy toflag any network data directed to the “honey pot” as suspicious sincethe “honey pot” should not be receiving any legitimate network data. Inanother example, the policy engine 350 can contain a policy to flagnetwork data directed to any network device 115 that contains highlysensitive or “mission critical” information.

The policy engine 350 can also dynamically apply a rule to copy allnetwork data related to network data already flagged by the heuristicmodule 320. In one example, the heuristic module 320 flags a singlepacket of network data as suspicious. The policy engine 350 then appliesa rule to flag all data related to the single packet (e.g., associateddata flows) as suspicious. In some embodiments, the policy engine 350flags network data related to suspicious network data until the analysisenvironment 340 determines that the network data flagged as suspiciousis related to unauthorized activity.

The policy engine 350 may scan network data to detect unauthorizedactivity based upon an unauthorized activity signature. In someembodiments, the policy engine 350 retrieves the unauthorized activitysignature from the signature module 345. The network data is thenscanned for unauthorized activity based on the unauthorized activitysignature.

The policy engine 350 can scan both the header and body of a packet ofnetwork data. In some embodiments, the policy engine 350 scans only theheader of the packet for unauthorized activity based on the unauthorizedactivity signature. If unauthorized activity is found, then no furtherscanning may be performed. In other embodiments, the policy engine 350scans the packet contents for unauthorized activity.

Unauthorized activity may be found by scanning only the header of apacket, the contents of the packet, or both the header and the contentsof the packet. As a result, unauthorized activity that might otherwiseevade discovery can be detected. In one example, evidence ofunauthorized activity may be located within the contents of the packet.By scanning only the contents of the packet, unauthorized activity maybe detected.

If the packet contents or the packet header indicate that the networkdata contains unauthorized activity, then the policy engine 350, theprotocol fingerprint module 305, the heuristic module 320, or thesignature module 345 may take action. In one example, the policy engine350 may generate a rule or command an interceptor module (not shown) tointercept network data from the node that transmitted the network dataand delete or bar the packet from the communication network 110. Thepolicy engine 350 and/or the interceptor module may also quarantine,delete, or bar other packets belonging to the same data flow as theunauthorized activity packet.

Based on a determination that the network data is suspicious, theinterceptor module can re-route the associated network data to a virtualmachine from the virtual machine pool 335. As discussed herein, theheuristic module 320 can provide information that the network data issuspicious. The interceptor module can intercept all of the network datathat is initially flagged by the heuristic module 320. The interceptormodule can also base the interception of data on the detection of amalware attack by the analysis environment 340 or a policy or signatureby the policy engine 350.

The interceptor module can provide the intercepted data to the heuristicmodule 320 for analysis with a heuristic or to the analysis environment340 to orchestrate the transmission of the intercepted data to detect amalware attack. If no malware attack is detected, the interceptor modulecan transmit some or all of the intercepted data to the intendedrecipient (e.g., network device 115.) If a malware attack is detectedwithin the intercepted data, the unauthorized activity signature may begenerated by the signature module 345 and transmitted to one or morecontrollers 125 or other digital devices.

The interceptor module can redirect network data from the bot server 105in any number of ways including, but not limited to, configuring aswitch, Address Resolution Protocol (ARP) manipulation, or DHCPservices.

The interceptor module may send a request to a switch to redirectnetwork data from any bot server 105 to the controller 125. The switchincludes any device configured to receive and direct network databetween one or more digital devices. Examples of a switch include, butis not limited to, a router, gateway, bridge, and, or server.

In some embodiments, executable code is loaded onto the switch. In oneexample, the executable code configures the switch to direct networkdata from any bot server 105 to the controller 125. In another example,the executable code allows the interceptor module to transmit a requestto the switch to direct network data from the bot server 105 to thecontroller 125. In some embodiments, the interceptor module configuresthe router to intercept network data from the bot server 105 for apredetermined time. The predetermined time may be set by the interceptormodule, preloaded into the switch, or configured by a user.

The interceptor module may manipulate dynamic host configurationprotocol (DHCP) services to intercept network data. As the bot server105 transmits network data that is flagged as suspicious or otherwiseidentified as containing a malware attack. The interceptor module maymanipulate DHCP services to assign new IP addresses, associate thecontroller 125 MAC address with the IP address of the network device115, or otherwise redirect network data from the bot server 105 to thecontroller 125.

In various embodiments, the interceptor module can manipulate the DHCPserver to configure the bot server 105 with a gateway IP address whichis the same as the controller's IP address to send all network data tothe controller 125. In other embodiments, the interceptor module mayperform DHCP services for the communication network 110 as a DHCPserver.

In one example of ARP manipulation, the heuristic module 320 or theinterceptor module scans the copied network data flagged as suspiciousto identify a source IP address and a target IP address. In thisexample, the source IP address is the IP address of the bot server 105and the target IP address is the IP address of the network device 115.In some embodiments, the interceptor module may send an ARP reply to thebot server 105. The ARP reply is configured to identify the MAC addressof the controller 125 with the IP address of the network device 115.When the bot server 105 receives the ARP reply, the bot server 105 maybegin to send network data intended for the destination device to thecontroller 125.

In other embodiments, a policy within the policy engine 350 may indicatewhich IP addresses are bot servers 105. Whenever a bot server 105 sendsnetwork data for the first time to a network device 115, the bot server105 may transmit an ARP request. The network data identifying the sourceIP address is copied by the tap 120 and the policy within the policyengine 350 can flag the source IP address as a bot server 105.Thereafter, the interceptor module may store the ARP request, andprovide the controller 125 MAC address in an ARP reply to the switchand/or the bot server 105. Once the switch and/or the bot server 105receives the controller 125 MAC address in the ARP reply, the IP addressof the digital device (e.g., network device 115) will be associated withthe controller 125 MAC address (e.g., in memory storage or cache).Network data intended for the network device 115 may then be transmitfrom the bot server 105 to the controller 125.

The bot server 105 may send the network data to any number of digitaldevices. Before the attack can proceed, the bot server 105 may send aseparate ARP request for the IP address of every other digital devicethe malware wishes to send data to. The controller 125 detects andresponds to each ARP request by sending an ARP reply to each requestwith the controller 125 MAC address. The controller 125 MAC address maybe associated with the IP address of the other digital devices on atable within the bot server 105, switch, and/or server (not depicted).The table may be within memory, storage, buffered, and/or cached. As aresult, network data transmitted by the bot server 105 to multiplenetwork devices 115 may be intercepted by the controller 125.

Once the network data is intercepted, the network data is re-routed tothe virtual machine, as discussed herein. Because the network data isre-routed, the actual machine or the network device 115 for which thenetwork data is intended may not receive the network data and is, as aresult, unaffected. A plurality of the network data can be re-routed tomore than one virtual machine at one time (e.g., in parallel.) Thus, ifthe network data intended for a plurality of the network devices 115 isflagged as suspicious, or as coming from the device that has previouslybeen deemed suspicious (e.g., the bot server 105), the interceptormodule can select a plurality of virtual machines on which to test thesuspicious network data.

The policy engine 350 may scan network data to detect unauthorizedactivity (e.g., including some bot related activity) based upon anunauthorized activity signature. In some embodiments, the policy engine350 retrieves the unauthorized activity signature from the signaturemodule 345. The network data is then scanned for unauthorized activitybased on the unauthorized activity signature. The policy engine 350 canalso flag network data as suspicious based on policies, as discussedherein.

Although FIG. 3 depicts various modules comprising the controller 125,fewer or more modules can comprise the controller 125 and still fallwithin the scope of various embodiments.

FIG. 4 is a block diagram of an exemplary analysis environment 340, inaccordance with some embodiments of the present invention. The analysisenvironment 340 comprises a replayer 405, a virtual switch 410, and avirtual machine 415. The replayer 405 is a module that receives networkdata that has been flagged by the heuristic module 320 and replays thenetwork data in the analysis environment 340. In some embodiments, thereplayer 405 mimics the behavior of the infected bot server 105 intransmitting the flagged network data. There can be any number ofreplayers 405 simulating the transmission of network data between nodeson the communication network (e.g., the bot server 105 and the networkdevice 115). In a further embodiment, the replayer 405 dynamicallymodifies session variables, as is appropriate, to emulate a “live”client or server of the protocol sequence being replayed. In oneexample, dynamic variables that may be dynamically substituted includedynamically assigned ports, transaction IDs, and any other variable thatis dynamic to each protocol session. In other embodiments, the networkdata received from the heuristic module 205 is transmitted to thevirtual machine 415 without a replayer 405.

The virtual switch 410 is a module that is capable of forwarding packetsof flagged network data to the virtual machine 415. The virtual switch410 simulates network device 115. The virtual switch 410 can route thedata packets of the data flow to the correct ports of the virtualmachine 415.

The virtual machine 415 is a representation of the network device 115that can be provided to the analysis environment 340 by the scheduler325. In one example, the scheduler 325 retrieves a virtual machine 415from the virtual machine pool 335 and configures the virtual machine 415to mimic the network device 115. The configured virtual machine 415 isthen provided to the analysis environment 340 where it can receiveflagged network data from the virtual switch 410.

As the analysis environment 340 simulates the transmission of thenetwork data, behavior of the virtual machine 415 can be closelymonitored for unauthorized activity. If the virtual machine 415 crashes,performs illegal operations, performs abnormally, or allows access ofdata to an unauthorized computer user, the analysis environment 340 canreact.

In exemplary embodiments, virtual machines may be used to detect C&Cchannels and botnet infected systems using the C&C channels. C&C channeldetection may occur in a replay virtual machine environment or in adirect entry virtual machine environment. While replay virtual analysisof virtual machines may be leveraged to extract C&C channel information,this may not be possible for all infection protocols. For infectionsprotocols that can be replayed to result in a full bot infection, thistechnique may yield positive results. For infection protocols that donot go proceed to completion due to an inability to effectively replayunknown worms protocols, for example, the replay environment may notresult in a full infection of the virtual machine 415. This may resultin a denial of C&C channel information extraction, which will onlybecome evident post-infection. In those instances, the analysisenvironment 340 may flag the devices involved in the suspected C&Cchannel as possibly infected with a bot and continue to track the nodesthat communicate with those devices that participate within thesuspected C&C channel.

Passive replay virtual machine environments may be effective for C&Cchannel discovery, since a passive worm may introduce no new wormprotocol. Instead, a passive worm may merely piggyback on an existingprotocol. Therefore, the existing passive worm replay may be adequate todetect a full bot infection. Passive replay of, for example, web basedexploits may be extended to result in full infection and extraction ofC&C channel information. Direct entry virtual machine environments areeffective in extracting C&C channel information, since there is no needto replay an unknown worm protocol.

In some embodiments, the analysis environment 340 performs dynamic taintanalysis to identify unauthorized activity. For a malware attack tochange the execution of an otherwise legitimate program, the malwareattack may cause a value that is normally derived from a trusted sourceto be derived from the user's own input. Program values (e.g., jumpaddresses and format strings) are traditionally supplied by a trustedprogram and not from external untrusted inputs. Malware, however, mayattempt to exploit the program by overwriting these values.

In one example of dynamic taint analysis, all input data from untrustedor otherwise unknown sources are flagged. Program execution of programswith flagged input data is then monitored to track how the flagged datapropagates (i.e., what other data becomes tainted) and to check when theflagged data is used in dangerous ways. For example, use of tainted dataas jump addresses or format strings often indicates an exploit of avulnerability such as a buffer overrun or format string vulnerability.

In some embodiments, the analysis environment 340 monitors and analyzesthe behavior of the virtual machine 415 in order to determine a specifictype of malware or the presence of an illicit computer user. Theanalysis environment 340 can also generate computer code configured toeliminate new viruses, worms, bots, or other malware. In variousembodiments, the analysis environment 340 can generate computer codeconfigured to identify data within the network data indicative of amalware attack, repair damage performed by malware, or the illicitcomputer user. By simulating the transmission of suspicious network dataand analyzing the response of the virtual machine, the analysisenvironment 340 can identify known and previously unidentified malwareand the activities of illicit computer users before a computer system isdamaged or compromised.

Once the virtual machine is infected, via either replay or direct entry,the environment can wait for an outbound domain name system (DNS)request. The requested name in the DNS request is likely a C&C channel.A pseudo-DNS server in the virtual machine environment can respond tothis request with an IP address mapped to an internal-to-virtualmachine-analysis pseudo-server. If an outbound IRC or web request ismade to the supplied IP address, then this confirms the existence of theC&C channel.

In some embodiments, all outbound DNS requires may be logged in acircular buffer (not shown). Once a C&C channel DNS name is identified,a search may be performed on all entries in the buffer for other sourceIP addresses that have requested the same DNS name. These source IPaddresses are now highly suspect to be infected with the same bot ormalware family that infected the virtual machine, even though theseother IP addresses may not have been acknowledged as propagating aninfection.

Once a C&C DNS name is discovered, the name may be communicated to allother devices as well as a cloud server. This allows other distributeddevices to detect attempts to connect to the same C&C channel.

FIG. 5 is a flowchart 500 of an exemplary method for detecting a C&Cchannel of a bot. In step 505, the system (e.g., controller 125 and/orbot detector 200) determines if there is communication detected in thecommunication network 110. The determination may be performed, inaccordance with some embodiments, by the tap 120, the bot detector 200,and/or the controller 125. If there is communication detected, then instep 510, data within the communication may be scanned. In oneembodiment, the data may be copied. For example, the network data fromthe network device 115 to the bot server 105 may be copied by the tap120. The network data is then sent from the tap 120 to the controller125 for analysis. In an alternative embodiment, the data may be scanneddirectly by, for example, the bot detector 200.

In step 515, a bot communication analysis is performed. As discussedherein, the bot detector 200 or the controller 125 may utilizes variousmodules (e.g., protocol fingerprint module 305, heuristic module 320,and analysis environment 340) to determine whether the copied networkdata contains a possible bot communication or may otherwise bepotentially harmful to the network device 115 for which the copiednetwork data may be intended. Subsequently, suspicious nodes can beflagged. If the controller 125 or bot detector 200 does not identify thecopied network data as possibly containing a possible bot communication,the network data may be transmitted to the intended destination (e.g.,network device 115).

As described herein, several different methods may be utilized to detecta C&C communication within a channel on the communication network 110.In one embodiment, a fingerprint module 205 or 305 may scans for a botoriented command in an IRC channel including IRC channel establishmentcommands or messages.

In an alternative embodiment, a port module 215 may monitor the use ofnon-standard ports. During base-lining a list of standard ports iscompiled. Communications not originating from a standard port may beconsidered non-standard or an anomaly. As such, associated nodes may beflagged (e.g., color coded) and tracked.

In a further embodiment, a virtual machine may be utilized to detect C&Ccommunication channels. The C&C communication channel detection mayoccur in a replay virtual machine environment or in a direct entryvirtual machine environment. Accordingly, a virtual machine is retrievedwhich is used to mimic the network device 115. Intercepted or replayednetwork data obtained from the communication channel is transmitted tothe virtual machine. The virtual machine response is then analyzed todetermine if the virtual machine is infected. In some embodiments, theanalysis environment 340 may wait for an outbound domain name system(DNS) request, which likely identifies the C&C channel. A pseudo-DNSserver in the virtual machine can respond to the request with an IPmapped to an internal-to-virtual machine-analysis pseudo-server. If theoutbound IRC or web request is made to the supplied IP address, thenthis confirms a C&C channel.

If a suspected bot communication is detected in step 520, then arecovery process may be performed in step 525. In one embodiment, theassociated devices may be flagged and/or proper users and administratorsnotified. For example, any nodes that are not associated with anyinfection propagation may be placed in a yellow category. Nodes in anIRC or P2P network where at least one of the nodes (e.g., in a chain ofnodes) is observed propagating an infection may be placed in, forexample, an orange category. Nodes that are observed to be activelypropagating an infection may be placed in a red category. Any nodes thathave not been categorized as yellow, orange, or red may be assigned to agreen category.

In another embodiment, a router (i.e., switch) may be configured todirect all data received from the bot server 105 (e.g., from the sourceIP address of the bot server 105) to the controller 125. As a result,all the network data from the bot server 105, not only that which istransmitted to the network device 115, may be intercepted.

FIG. 6 is a block diagram of the controller 125, in accordance with oneembodiment of the present invention. The controller 125 comprises aprocessor 600, a memory system 605, a storage system 610, an I/Ointerface 615, and a communication network interface 620 which are allcoupled to a system bus 625. The processor 600 is configured to executeexecutable instructions. In some embodiments, the processor 600comprises circuitry or any one or more processors capable of processingthe executable instructions.

The memory system 605 is any memory configured to store data. Someexamples of the memory system 605 include storage devices, such as RAMor ROM.

The storage system 610 is any storage configured to retrieve and storedata (e.g., a computer readable medium). Some examples of the storagesystem 610 are flash drives, hard drives, optical drives, and/ormagnetic tape. The storage system 610 can comprise a database or otherdata structure configured to hold and organize data (e.g., network data,copies of network data, buffered data.) In some embodiments, thecontroller 125 includes memory in the form of RAM and storage in theform of flash data. The memory system 605 and/or the storage system 610can comprise cache and buffers configured to retain network data orcopies of network data.

The input/output (I/O) interface 615 is any device that can receiveinput and provide output to a user. The I/O interface 615 can be, but isnot limited to, a keyboard, a mouse, a touchscreen, a keypad, abiosensor, or floppy disk drive.

The communication network interface 620 can be coupled to any userdevice via the link 630 through link 635. The communication networkinterface 620 may support communication over a USB connection, afirewire connection, an Ethernet connection, a serial connection, aparallel connection, or an ATA connection. The communication networkinterface 620 may also support wireless communication (e.g., 802.11a/b/g/n or wireless USB). It will be apparent to those skilled in theart that the communication network interface 620 can support many wiredand wireless standards.

Although only two links (630 and 635) are depicted in FIG. 6, there maybe any number of links. In various embodiments, there may be one link630 used by the tap 120 to transparently copy network data from thecommunication network 110. The other links may be used by the controller125 to intercept data from one or more bot server 105 in parallel. Inone example, the controller 125 comprises multiple IP addresses that maybe broadcast from different links. Network data may be intercepted fromdifferent infected devices 105 by different links.

The above-described modules can be comprised of instructions that arestored on storage media (e.g., computer readable media). Theinstructions can be retrieved and executed by a processor (e.g., theprocessor 600). Some examples of instructions include software, programcode, and firmware. Some examples of storage media comprise memorydevices and integrated circuits. The instructions are operational whenexecuted by the processor to direct the processor to operate inaccordance with embodiments of the present invention. Those skilled inthe art are familiar with instructions, processor(s), and storage media.

While various embodiments have been described above, it should beunderstood that they have been presented by way of example only, and notlimitation. Thus, the breadth and scope of a preferred embodiment shouldnot be limited by any of the above-described exemplary embodiments.

What is claimed is:
 1. A method for detecting a communication channel ofa bot in a network, comprising: analyzing a portion of network databeing transmitted over the network; configuring a module within acontroller to determine a communication protocol being used in atransmission of the network data over a communication channel;responsive to detecting the communication channel using thecommunication protocol, processing at least the portion of the networkdata within a first virtual machine to determine whether a botcommunication exists by at least determining whether the portion of thenetwork data includes a plurality of commands in a particular sequencethat, according to the determined communication protocol, tend to beassociated with the bot communication; and performing a recovery processwhen the bot communication is detected, the recovery process including,determining one or more network devices that participated incommunications using the communication channel operating as a commandand control communication channel.
 2. The method of claim 1 furthercomprising detecting a presence of the communication channel in thenetwork between a first network device and a second network device ofthe one or more network devices.
 3. The method of claim 1, wherein theprocessing of at least the portion of the network data within the firstvirtual machine to determine whether the bot communication existsfurther includes determining that the portion of the network dataoriginated from a non-standard port.
 4. The method of claim 3, whereinprior to the processing of at least the portion of the network datawithin a first virtual machine, the method includes determining whetherthe portion of network data associated with the communication channel isassociated with the suspicious activity, the suspicious activityincluding bot related activities that comprise at least one of:installing a copy of the bot on a third network device, establishing acommand and control communication channel with the third network device,receiving one or more instructions from a bot-infected network device,transmitting a ping message to the third network device in adenial-of-service attack, receiving instructions to act as a keylogger,or transmitting personal information or email addresses over thenetwork.
 5. The method of claim 4, wherein the third network device isdifferent than both of the first network device and the second networkdevice.
 6. The method of claim 1, wherein the processing of at least theportion of the network data includes analyzing content of at least theportion of the network data for a command of the plurality of commandsdirected to establishment of the communication channel being an InternetRelay Chat (IRC) channel.
 7. The method of claim 1, wherein theplurality of commands includes a first command to establish thecommunication channel followed by a scan command.
 8. The method of claim7, wherein the first command establishes the communication channel beingan Internet Relay Chat (IRC) channel.
 9. The method of claim 1, whereinthe performing of the recovery process further includes identifying theone or more network devices that participated in communications usingthe communication channel operating as the command and controlcommunication channel.
 10. The method of claim 9, wherein theidentifying of the one or more network devices comprises adjusting acolor of an icon associated with the one or more network devices. 11.The method claim 1, wherein the determining whether the portion of thenetwork data includes the plurality of commands in the particularsequence comprises scanning for commands that indicate a particularprotocol associated with a command and control (C&C) channel is beingestablished.
 12. The method claim 11, wherein the plurality of commandsin the particular sequence include a JOIN command followed by a SCANcommand.
 13. The method of claim 1, wherein the plurality of commandsthat tend to establish a command and control (C&C) communicationchannel.
 14. A controller comprising: one or more processors; and astorage device communicatively coupled to the one or more processors,the storage device including: a first software module that, whenexecuted by the one or more processors, to detect network datatransmitted between a first network device and a second network deviceover a network, a second software module that, when executed by the oneor more processors, to (i) determine a communication protocol being usedin a transmission of the network data over a communication channel ofthe network, and (ii) scan at least a portion of the network data for aplurality of commands in a particular sequence that, according to thedetermined communication protocol, tend to be associated with a botcommunication, the scan including analyzing content of at least theportion of the network data for bot related activities includinganalyzing for the plurality of commands, including a scan commandutilized by a bot to gather information from a targeted source andtransfer to a third network device over the communication channel; athird software module including a plurality of virtual machines, whereineach of the plurality of virtual machines is in communication with thesecond software module, wherein at least a first virtual machine of theplurality of virtual machines (1) receives at least the portion of thenetwork data, and (2) processes at least the portion of the network datato detect a bot related activity, and wherein responsive to detection ofthe bot related activity, the third software module generates anactivity signature based on at least the detected bot related activity,and a signature module to store generated activity signatures.
 15. Thecontroller of claim 14, wherein the second software module being furtherconfigured to analyzing whether the portion of the network dataoriginated from a non-standard port.
 16. The controller of claim 14,wherein second software module that, when executed by the one or moreprocessors, is further configured to scan at least the portion of thenetwork data for suspicious activity including one or more bot relatedactivities by at least installing a copy of the bot on the third networkdevice, establishing a command and control communication channel withthe third network device, transmitting a ping message to the thirdnetwork device in a denial-of-service attack, or receiving instructionsto act as a keylogger.
 17. The controller of claim 14, wherein the thirdnetwork device is different than both of the first network device andthe second network device.
 18. The controller of claim 14, wherein thescan by the second software module includes analyzing content of atleast the portion of the network data for a JOIN command directed toestablishing the communication channel between the first network deviceand the second network device via the network.
 19. The controller ofclaim 14, further comprising: a heuristic module that identifies a botserver, the first network device or the second network device byanalyzing one or more data packets of the network data.
 20. Thecontroller of claim 19, wherein the first virtual machine is selected bythe third software module based on one or more characteristics of one ofthe first network device or the second network based on identificationby the heuristic module.
 21. The controller of claim 14, furthercomprising: a fourth software module that, responsive to detection ofthe suspicious activities during scanning of at least the portion of thenetwork data, performs a recovery process, wherein at least one of (i)the first network device, or (ii) the second network device are flaggedas being associated with the suspicious activities.
 22. The controllerof claim 14, wherein the second software scans at least the portion ofthe network data for the plurality of commands in the particularsequence by at least scanning for commands that indicate a particularprotocol associated with a command and control (C&C) communicationchannel is being established.
 23. The controller of claim 14, whereinthe plurality of commands in the particular sequence includes a JOINcommand followed by a SCAN command.
 24. A controller comprising: one ormore processors; and a storage system communicatively coupled with theone or more processors, the storage system includes a bot detectionlogic that, when executed by the one or more processors: (i) analyzes aportion of network data that permits control, via a network, of a firstnetwork device without authorization by a user of the first networkdevice, (ii) configures a module within a controller that determines acommunication protocol being used in a transmission of the network dataover a communication channel, (iii) provides at least a portion ofnetwork data associated with the communication channel to a firstvirtual machine, and (iv) analyzes operations of the first virtualmachine based on processing of at least the portion of the network dataincluding (a) a plurality of commands in a particular sequence that,according to the communication protocol as determined by the controller,are part of the portion of the network data and tend to be associatedwith a bot communication and (b) the network data originated from anon-standard port.
 25. The controller of claim 24, the bot detectionlogic that, when executed by the one or more processors: (v) generatesand stores an activity signature based on analysis by the first virtualmachine for use in subsequent analyses.
 26. The controller of claim 24,wherein detection of the communication channel that permits control ofthe first network device without authorization by the user of thenetwork device includes detection of at least one or more bot relatedactivities.
 27. The controller of claim 26, wherein the bot relatedactivities include one or more activities from among a plurality ofactivities including: (i) bot propagation, (ii) initiating a malwareattack on the first network device, (iii) installing a copy of the boton the first network device, (iv) establishing a command and control(C&C) communication channel with the first network device, (v) receivingone or more instructions from a bot-infected network device, (vi)transmitting a ping message to the first network device in adenial-of-service attack, (vii) transmitting spam across thecommunication channel, (viii) receiving instructions to act as akeylogger, (ix) recording keystrokes, (x) receiving instructions tosearch the first network device for personal information or emailaddresses, and (xi) transmitting personal information or email addressesover the network.
 28. The controller of claim 24, wherein the botdetection logic analyzes the operations of the first virtual machine byat least analyzing content of at least the portion of the network datafor a command of the plurality of commands directed to establishing thecommunication channel being an Internet Relay Chat (IRC) channel. 29.The controller of claim 24, wherein the bot detection logic that, whenexecuted by the one or more processors: identifies a bot server or thefirst network device by analyzing one or more data packets of thenetwork data.
 30. The controller of claim 29, wherein the first virtualmachine is selected based on one or more characteristics of the firstnetwork device based on identification via analysis of the one or moredata packets of the network data.
 31. The controller of claim 24,wherein the bot detection logic that, when executed by the one or moreprocessors: responsive to detection of the communication channel thatpermits control, via a network, of the first network device withoutauthorization by the user of the first network device, performing arecovery process, wherein the first network device is flagged as beingassociated with bot related activities.
 32. The controller of claim 24,wherein the bot detection logic analyzes operations of the first virtualmachine based on processing of at least the portion of the network dataincluding the plurality of commands in the particular sequence by atleast scanning for commands that indicate a particular protocolassociated with a command and control (C&C) communication channel isbeing established.
 33. The controller of claim 24, wherein the pluralityof commands in the particular sequence includes a JOIN command followedby a SCAN command.