Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Amine Boukhtouta is active.

Publication


Featured researches published by Amine Boukhtouta.


conference on privacy, security and trust | 2010

On the analysis of the Zeus botnet crimeware toolkit

Hamad Binsalleeh; Thomas Ormerod; Amine Boukhtouta; Prosenjit Sinha; Amr M. Youssef; Mourad Debbabi; Lingyu Wang

In this paper, we present our reverse engineering results for the Zeus crimeware toolkit which is one of the recent and powerful crimeware tools that emerged in the Internet underground community to control botnets. Zeus has reportedly infected over 3.6 million computers in the United States. Our analysis aims at uncovering the various obfuscation levels and shedding the light on the resulting code. Accordingly, we explain the bot building and installation/infection processes. In addition, we detail a method to extract the encryption key from the malware binary and use that to decrypt the network communications and the botnet configuration information. The reverse engineering insights, together with network traffic analysis, allow for a better understanding of the technologies and behaviors of such modern HTTP botnet crimeware toolkits and opens an opportunity to inject falsified information into the botnet communications which can be used to defame this crimeware toolkit.


conference on risks and security of internet and systems | 2010

Insights from the analysis of the Mariposa botnet

Prosenjit Sinha; Amine Boukhtouta; Victor Heber Belarde; Mourad Debbabi

Nowadays, botnets are among the topmost network threats by combining innovative hacking capabilities. This is due to the fact that they are constantly improved by hackers to become more resilient against detection and debugging techniques. In this respect, we analyze one of the most prominent botnets, namely Mariposa, which infected more than 13 million computers that are located in more than 190 countries. In this regard, we analyze the botnet architecture, components, commands and communication. In this setting, we detail the obfuscation and anti-debugging techniques it uses. Moreover, we detail the infection and code-injection techniques into legitimate processes. In addition, we explain the spreading mechanisms that are employed in Mariposa as well as the underlying communication protocols. More importantly, we analyze the injected bot code. This is accomplished by a reverse engineering exercise that uses both a network analysis together with reverse-engineering analysis. The insights from this work are meant to illustrate the know-how used in current botnet technologies and enable the elaboration of analysis, detection and prevention techniques.


international conference on emerging security information, systems and technologies | 2010

Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat

Thomas Ormerod; Lingyu Wang; Mourad Debbabi; Amr M. Youssef; Hamad Binsalleeh; Amine Boukhtouta; Prosenjit Sinha

Botnets have become one of the most prevailing threats to todays Internet partly due to the underlying economic incentives of operating one. Botnet toolkits sold by their authors allow any layman to generate his/her own customized botnet and become a botmaster; botnet services sold by botmasters allow any criminal to steal identities and credit card information; finally, such stolen credentials are sold to end-users to make unauthorized transactions. Many existing botnet countermeasures meet inherent difficulties when they choose to target the botmasters or authors of toolkits, because those at the highest levels of this food chain are also the most technology-savvy and elusive. In this paper, we propose a different, bottom-up approach. That is, we defame botnet toolkits through discouraging or prosecuting the end-users of the stolen credentials. To make the concept concrete, we present a case study of applying the approach to a popular botnet toolkit, Zeus, with two methodologies, namely, reverse engineering and behavioural analysis.


conference on risks and security of internet and systems | 2012

Investigating the dark cyberspace: Profiling, threat-based analysis and correlation

Claude Fachkha; Elias Bou-Harb; Amine Boukhtouta; Son Dinh; Farkhund Iqbal; Mourad Debbabi

An effective approach to gather cyber threat intelligence is to collect and analyze traffic destined to unused Internet addresses known as darknets. In this paper, we elaborate on such capability by profiling darknet data. Such information could generate indicators of cyber threat activity as well as providing in-depth understanding of the nature of its traffic. Particularly, we analyze darknet packets distribution, its used transport, network and application layer protocols and pinpoint its resolved domain names. Furthermore, we identify its IP classes and destination ports as well as geo-locate its source countries. We further investigate darknet-triggered threats. The aim is to explore darknet embedded threats and categorize their severities. Finally, we contribute by exploring the inter-correlation of such threats, by applying association rule mining techniques, to build threat association rules. Specifically, we generate clusters of threats that co-occur targeting a specific victim. Such work proves that specific darknet threats are correlated. Moreover, it provides insights about threat patterns and allows the interpretation of threat scenarios.


Journal of Computer Virology and Hacking Techniques | 2016

Network malware classification comparison using DPI and flow packet headers

Amine Boukhtouta; Serguei A. Mokhov; Nour-Eddine Lakhdari; Mourad Debbabi; Joey Paquet

In order to counter cyber-attacks and digital threats, security experts must generate, share, and exploit cyber-threat intelligence generated from malware. In this research, we address the problem of fingerprinting maliciousness of traffic for the purpose of detection and classification. We aim first at fingerprinting maliciousness by using two approaches: Deep Packet Inspection (DPI) and IP packet headers classification. To this end, we consider malicious traffic generated from dynamic malware analysis as traffic maliciousness ground truth. In light of this assumption, we present how these two approaches are used to detect and attribute maliciousness to different threats. In this work, we study the positive and negative aspects for Deep Packet Inspection and IP packet headers classification. We evaluate each approach based on its detection and attribution accuracy as well as their level of complexity. The outcomes of both approaches have shown promising results in terms of detection; they are good candidates to constitute a synergy to elaborate or corroborate detection systems in terms of run-time speed and classification precision.


Digital Investigation | 2015

Graph-theoretic characterization of cyber-threat infrastructures

Amine Boukhtouta; Djedjiga Mouheb; Mourad Debbabi; Omar Alfandi; Farkhund Iqbal; May El Barachi

In this paper, we investigate cyber-threats and the underlying infrastructures. More precisely, we detect and analyze cyber-threat infrastructures for the purpose of unveiling key players (owners, domains, IPs, organizations, malware families, etc.) and the relationships between these players. To this end, we propose metrics to measure the badness of different infrastructure elements using graph theoretic concepts such as centrality concepts and Google PageRank. In addition, we quantify the sharing of infrastructure elements among different malware samples and families to unveil potential groups that are behind specific attacks. Moreover, we study the evolution of cyber-threat infrastructures over time to infer patterns of cyber-criminal activities. The proposed study provides the capability to derive insights and intelligence about cyber-threat infrastructures. Using one year dataset, we generate notable results regarding emerging threats and campaigns, important players behind threats, linkages between cyber-threat infrastructure elements, patterns of cyber-crimes, etc.


aspect-oriented software development | 2009

The dataflow pointcut: a formal and practical framework

Dima Alhadidi; Amine Boukhtouta; Nadia Belblidia; Mourad Debbabi; Prabir Bhattacharya

Some security concerns are sensitive to flow of information in a program execution. The dataflow pointcut has been proposed by Masuhara and Kawauchi in order to easily implement such security concerns in aspect-oriented programming (AOP) languages. The pointcut identifies join points based on the origins of values. This paper presents a formal framework for this pointcut based on the λ_calculus. Dataflow tags are propagated statically to track data dependencies between expressions. We introduce a static semantics for tag propagation and prove that it is consistent with respect to the dynamic semantics of the propagation. We instrument the static effect-based type system to propagate tags, match and inject advices. This static approach can be used to minimize the cost of dataflow pointcuts by reducing the runtime overhead since much of the dataflow information would be available statically and at the same time it can be used for verification. The proposed semantics for advice weaving is in the spirit of AspectJ where advices are injected before, after, or around the join points that are matched by their respective pointcuts. Inspired from the formal framework, the AspectJ compiler ajc is extended with the dataflow pointcut that tracks data dependencies inside methods.


Procedia Computer Science | 2013

Towards Fingerprinting Malicious Traffic

Amine Boukhtouta; Nour-Eddine Lakhdari; Serguei A. Mokhov; Mourad Debbabi

Abstract The primary intent of this paper is detect malicious traffic at the network level. To this end, we apply several machinelearning techniques to build classifiers that fingerprint maliciousness on IP traffic. As such, J48, Na¨ive Bayesian, SVMand Boosting algorithms are used to classify malware communications that are generated from dynamic malware anal-ysis framework. The generated traffic log files are pre-processed in order to extract features that characterize maliciouspackets. The data mining algorithms are applied on these features. The comparison between different algorithms resultshas shown that J48 and Boosted J48 algorithms have performed better than other algorithms. We managed to obtain adetection rate of 99% of malicious traffic with a false positive rate less than 1% for J48 and Boosted J48 algorithms.Additional tests have generated results that show that our model can detect malicious traffic obtained from differentsources.c 2011 Published by Elsevier Ltd. Keywords: Traffic Classification, Malicious Traffic Detection, Malware Analysis.


new technologies, mobility and security | 2014

Inferring Malware Family through Application Protocol Sequences Signature

Amine Boukhtouta; Nour-Eddine Lakhdari; Mourad Debbabi

The dazzling emergence of cyber-threats exert todays cyberspace, which needs practical and efficient capabilities for malware traffic detection. In this paper, we propose an extension to an initial research effort, namely, towards fingerprinting malicious traffic by putting an emphasis on the attribution of maliciousness to malware families. The proposed technique in the previous work establishes a synergy between automatic dynamic analysis of malware and machine learning to fingerprint badness in network traffic. Machine learning algorithms are used with features that exploit only high-level properties of traffic packets (e.g. packet headers). Besides, the detection of malicious packets, we want to enhance fingerprinting capability with the identification of malware families responsible in the generation of malicious packets. The identification of the underlying malware family is derived from a sequence of application protocols, which is used as a signature to the family in question. Furthermore, our results show that our technique achieves promising malware family identification rate with low false positives.


Electronic Communication of The European Association of Software Science and Technology | 2010

Security Evaluation and Hardening of Free and Open Source Software (FOSS)

Robert Charpentier; Mourad Debbabi; Dima Alhadidi; Azzam Mourad; Nadia Belblidia; Amine Boukhtouta; Aiman Hanna; Rachid Hadjidj; Hakim Idrissi Kaitouni; Marc-André Laverdière; Hai Zhou Ling; Syrine Tlili; Xiaochun Yang; Zhenrong Yang

Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off- The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term solution that deserves careful consideration because of its potential for significant cost savings, improved reliability, and numerous advantages over proprietary software. However, the secure integration of FOSS in IT infrastructures is very challenging and demanding. Methodologies and technical policies must be adapted to reliably compose large FOSS-based software systems. A DRDC Valcartier-Concordia University feasibility study completed in March 2004 concluded that the most promising approach for securing FOSS is to combine advanced design patterns and Aspect-Oriented Programming (AOP). Following the recommendations of this study a three years project have been conducted as a collaboration between Concordia University, DRDC Valcartier, and Bell Canada. This paper aims at presenting the main contributions of this project. It consists of a practical framework with the underlying solid semantic foundations for the security evaluation and hardening of FOSS.

Collaboration


Dive into the Amine Boukhtouta's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Elias Bou-Harb

Florida Atlantic University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge