Discovery techniques for P2P botnets
نویسندگان
چکیده
Over the last few years, researchers and network operators have examined networks of DDoS agents, more recently called botnets due to their connection to Internet Relay Chat (IRC). In the continued quest to take down these networks of bots, two important questions arise: how many bots are there, and how to find every last bot? When one reads about a ten thousand, hundred thousand, one million node botnet, how much credibility does it have? Is botnet A really bigger than botnet B? The difficulty in accurately and stealthily assessing the size of the botnet often lies in the structure of the botnet itself, such as IRC, HTTP, P2P-based, or a hybrid thereof. We present a general overview of discovery techniques for networks of malware, and provide a glimpse at a two-year study of a P2P botnet.
منابع مشابه
PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification
The distributed and decentralized nature of peer-to-peer (P2P) networks has offered a lucrative alternative to bot-masters to build botnets. P2P botnets are not prone to any single point of failure and have been proven to be highly resilient against takedown attempts. Moreover, smarter bots are stealthy in their communication patterns and elude the standard discovery techniques which look for a...
متن کاملThe Next Generation Botnet Attacks And Defenses
A “botnet” is a network of compromised computers (bots) that are controlled by an attacker (botmasters). Botnets are one of the most serious threats to today’s Internet; they are the root cause of many current Internet attacks, such as email spam, distributed denial of service (DDoS) attacks , click fraud, etc. There have been many researches on how to detect, monitor, and defend against botnet...
متن کاملSurvey of Peer-to-Peer Botnets and Detection Frameworks
Botnet is a network of compromised computers controlled by the attacker(s) from remote locations via Command and Control (C&C) channels. The botnets are one of the largest global threats to the Internet-based commercial and social world. The decentralized Peer-to-Peer (P2P) botnets have appeared in the recent past and are growing at a faster pace. These P2P botnets are continuously evolving fro...
متن کاملA Review of Peer-to-Peer Botnet Detection Techniques
In recent years, Peer-to-Peer technology has an extensive use. Botnets have exploited this technology efficiently and introduced the P2P botnet, which uses P2P network for remote control of its bots and become one of the most significant threats to computer networks. They are used to make DDOS attacks, generate spam, click fraud and steal sensitive information. Compared with traditional botnets...
متن کاملStudy of the Honeypot-Aware Peer-to-Peer Botnet and Its Feasibility
The research objective of this project is to investigate one possible advanced botnet – honeypotaware peer-to-peer (P2P) botnet: verifying our analysis of the propagation of a honeypot-aware P2P botnet, and then showing the feasibility of developing a such botnet in terms of its propagation effectiveness. A “botnet” is a network composed of compromised computers (“bots”) on the Internet, that a...
متن کامل