Study of the Honeypot-Aware Peer-to-Peer Botnet and Its Feasibility

نویسنده

  • Ping Wang
چکیده

The research objective of this project is to investigate one possible advanced botnet – honeypotaware peer-to-peer (P2P) botnet: verifying our analysis of the propagation of a honeypot-aware P2P botnet, and then showing the feasibility of developing a such botnet in terms of its propagation effectiveness. A “botnet” is a network composed of compromised computers (“bots”) on the Internet, that are under control of a remote attacker (“botmaster”). Botnets have become one of the most significant threats to today’s Internet. Most of the current botnets are centralized botnets, such as IRC-based botnets. All the bots are connecting to a central authority to get botmaster’s commands. However, in recent years, P2P botnets have emerged. They leverage existing P2P protocols and networks for either bootstrapping onto a hierarchical command and control (C&C) network or command and control directly. With the good feature of P2P networks, that is the resilience to “churn” (the network dynamics caused by node leaving and joining), P2P botnets are more robust than centralized botnets, because the losing a couple of bots will not bring much impact on a P2P botnets, while the C&C communication will be disrupted if a central server in a centralized botnet is captured and shutdown by defenders. Therefore P2P botnets have made the situation even worse. On the other hand, honeypots and honeynets are effective detection and defense techniques, and hence there has been much recent research in this area [20, 12, 15, 7, 24]. And in the meantime, attacker have started to develop anti-honeypot approaches, such as [17, 9]. It is highly possible that attackers would integrate honeypot detection techniques with P2P botnets, and come up with honeypot-aware P2P botnets, in order to prevent their botnets from being infiltrated and monitored. So to better prepare for the future, we propose a general hardwareand softwareindependent honeypot detection, and its implementation in P2P botnets. To show the feasibility of developing a such botnet, we model and analyze the botnet propagation time delay caused by honeypot detection, and compare it with a P2P botnet without the capbility of honeypot detection. Our conclusion drew from the numerical results is positive. But to be more convincing and further our research, we would like to perform simulation experiments on real machines in a distributed environment, which is exactly what PlanetLab [3] provides.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Honeypot detection in advanced botnet attacks

Botnets have become one of the major attacks in current Internet due to their illicit profitable financial gain. Meanwhile, honeypots have been successfully deployed in many computer security defense systems. Since honeypots set up by security defenders can attract botnet compromises and become spies in exposing botnet membership and botnet attacker behaviors, they are widely used by security d...

متن کامل

Exploring A Root-Cause Methodology to Prevent Emerging Internet Threat

A “botnet” consists of a network of compromised computers controlled by an attacker often called botmaster. Recently, botnets have become the root cause of many Internet attacks. To be well-prepared for future attacks, it is not only study how to detect and defend against the botnets that have appeared in the past. More importantly, we should study advanced botnet designs that could be develope...

متن کامل

TAC: A Topology-Aware Chord-based Peer-to-Peer Network

Among structured Peer-to-Peer systems, Chord has a general popularity due to its salient features like simplicity, high scalability, small path length with respect to network size, and flexibility on node join and departure. However, Chord doesn’t take into account the topology of underlying physical network when a new node is being added to the system, thus resulting in high routing late...

متن کامل

A Survey of Botnet Detection Techniques by Command and Control Infrastructure

Botnets have evolved to become one of the most serious threats to the Internet and there is substantial research on both botnets and botnet detection techniques. This survey reviewed the history of botnets and botnet detection techniques. The survey showed traditional botnet detection techniques rely on passive techniques, primarily honeypots, and that honeypots are not effective at detecting p...

متن کامل

The Next Generation Botnet Attacks And Defenses

A “botnet” is a network of compromised computers (bots) that are controlled by an attacker (botmasters). Botnets are one of the most serious threats to today’s Internet; they are the root cause of many current Internet attacks, such as email spam, distributed denial of service (DDoS) attacks , click fraud, etc. There have been many researches on how to detect, monitor, and defend against botnet...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010