Botnet Literature Review

نویسنده

  • Brandon Shirley
چکیده

Botnets have continuously evolved since they were first created. This evolution is now being fueled by a talent influx generated by the incentive of the monetary gains facilitated by botnet operations. This talent base has allowed new botnet generations to continuously side-step mitigation techniques. This is also due to the fact that computer security has generally reacted to new malware as it is discovered in the wild. This paradigm has proven to be much too slow for botnet mitigation as the botnet is often well entrenched before any real defense has been implemented. At this point the botnet has already been able to inflict considerable damage. As a result botnet research is shifting to a forward-looking or proactive approach. Botnets have started a trend towards smaller network sizes with less bots or sites. This allows a botnet to have a better chance of flying under the radar. This means that each botnet might have a separate or specialized infrastructure, or at least some way to keep them separate. This presents the botmaster or organization that is running multiple such networks with a cumbersome management and maintenance issue. Another method for achieving smaller or segmented attacks would be to keep the botnet intact and to use another strategy to segment it at will for a given attack or action. This implies that the typical “publish-subscribe” system employed by most P2P networks would need to be reworked or replaced. A possible replacement would be a Voronoi P2P overlay, it has the potential to segment a P2P at will based on a virtual geography. This overlay is already being vetted for use in massively multi-player on-line games (MMOGs) as a possible means for managing network vitrual environments (NVEs) that were previously managed by a centralized server. The same characteristics that make a Voronoi desirable for this application might also make it a viable botnet command and control (C&C) infrastructure. ∗Open to suggestion for a better title. †No author note at this point.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BotOnus: an online unsupervised method for Botnet detection

Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...

متن کامل

A Holistic Botnet Detection Framework Independent of Botnet Protocols and Architecture

Fast growth of Internet has brought some security concerns. One of these security concerns is Botnet. Bot and Botnets are new sophisticated kind of malware that is equipped with advanced features and have variety of applications. This paper reviews the current botnet detection frameworks and their advantages and drawbacks. To address the drawbacks we propose a conceptual holistic Botnet Detecti...

متن کامل

A Survey on Botnet Architectures, Detection and Defences

Botnets are known to be one of the most serious Internet security threats. In this survey, we review botnet architectures and their controlling mechanisms. Botnet infection behavior is explained. Then, known botnet models are outlined to study botnet design. Furthermore, Fast-Flux Service Networks (FFSN) are discussed in great details as they play an important role in facilitating botnet traffi...

متن کامل

Review of the Research on Botnet

The botnet is controlled by an attacker, which is formed by a lot of vulnerable hosts. The botnet is one of the biggest threats on the Internet. The attacker usually uses it to attack, such as: spam, distributed denial of service attacks, fraud and so on. In this paper, we mainly study the control channel of the botnet, including the IRC protocol, the P2P protocol and the HTTP protocol. At the ...

متن کامل

Botnet Malicious Activity Detection Based on DNS Traffic Analysis

In the field of internet security botnet is becoming the significant threat as more number of users are connected to internet. Botnet which is a collection of infected computers so called (bots) are becoming the major threat to internet community. The difference between a malware and botnet is that bot is remotely controlled by a C&C server which are under the control of a botmaster. Here in th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010