P2P-based Botnets

P2P-based Botnets
Author :
Publisher :
Total Pages :
Release :
ISBN-10 : OCLC:727276136
ISBN-13 :
Rating : 4/5 ( Downloads)

Book Synopsis P2P-based Botnets by :

Download or read book P2P-based Botnets written by and published by . This book was released on 2008 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: Botnets, which are networks of compromised machines that are controlled by one or a group of attackers, have emerged as one of the most serious security threats on the Internet. With an army of bots at the scale of tens of thousands of hosts or even as large as 1.5 million PCs, the computational power of botnets can be leveraged to launch large-scale DDoS (Distributed Denial of Service) attacks, sending spamming emails, stealing identities and financial information, etc. As detection and mitigation techniques against botnets have been stepped up in recent years, attackers are also constantly improving their strategies to operate these botnets. The first generation of botnets typically employ IRC (Internet Relay Chat) channels as their command and control (C & C) centers. Though simple and easy to deploy, the centralized C & C mechanism of such botnets has made them prone to being detected and disabled. Against this backdrop, peer-to-peer (P2P) based botnets have emerged as a new generation of botnets which can conceal their C & C communication. Recently, P2P networks have emerged as a covert communication platform for malicious programs known as bots. As popular distributed systems, they allow bots to communicate easily while protecting the botmaster from being discovered. Existing work on P2P-based hotnets mainly focuses on measurement of botnet sizes. In this work, through simulation, we study extensively the structure of P2P networks running Kademlia, one of a few widely used P2P protocols in practice. Our simulation testbed incorporates the actual code of a real Kademlia client software to achieve great realism, and distributed event-driven simulation techniques to achieve high scalability. Using this testbed, we analyze the scaling, reachability, clustering, and centrality properties of P2P-based botnets from a graph-theoretical perspective. We further demonstrate experimentally and theoretically that monitoring bot activities in a P2P network is difficult, suggesting that the P2P mechanism indeed helps botnets hide their communication effectively. Finally, we evaluate the effectiveness of some potential mitigation techniques, such as content poisoning, Sybil-based and Eclipse-based mitigation. Conclusions drawn from this work shed light on the structure of P2P botnets, how to monitor bot activities in P2P networks, and how to mitigate botnet operations effectively.


P2P-based Botnets Related Books

P2P-based Botnets
Language: en
Pages:
Authors:
Categories:
Type: BOOK - Published: 2008 - Publisher:

DOWNLOAD EBOOK

Botnets, which are networks of compromised machines that are controlled by one or a group of attackers, have emerged as one of the most serious security threats
Advanced Monitoring in P2P Botnets
Language: en
Pages: 118
Authors: Shankar Karuppayah
Categories: Computers
Type: BOOK - Published: 2018-05-17 - Publisher: Springer

DOWNLOAD EBOOK

This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitor
Handbook of Information and Communication Security
Language: en
Pages: 863
Authors: Peter Stavroulakis
Categories: Technology & Engineering
Type: BOOK - Published: 2010-02-23 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhap
Conversation Based P2P Botnet Detection with Decision Fusion
Language: en
Pages: 122
Authors: Shaojun Zhang
Categories: Computer networks
Type: BOOK - Published: 2013 - Publisher:

DOWNLOAD EBOOK

"Botnets have been identified as one of the most dangerous threats through the Internet. A botnet is a collection of compromised computers called zombies or bot
Botnet Detection
Language: en
Pages: 178
Authors: Wenke Lee
Categories: Computers
Type: BOOK - Published: 2007-10-23 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate