Optimal Attack Strategies in a Dynamic Botnet Defense Model

نویسنده

  • Y. Shang
چکیده

Since the number of compromised computers, or botnet, continues to grow, the cyber security problem has become increasingly important and challenging to both academic researchers and industry practitioners. A respect to combat botnet propagation is to understand the attacker’s behaviors based on the whole operation of a system that can be modeled with population models used in epidemiological studies. In this paper, we treat the interaction between the botnet herder and the defender group as a modified SIS epidemic model with external entrance and allowing computers of undetected states. Based on optimal control theory, we derive the optimal strategy of the botnet herder as a feedback on the rate of infection under given levels of entrance and defense. The obtained optimal policies dynamically evolve with time and offer useful insights for ultimately solving the botnet defense problem.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model

Botnets are networks of computers infected with malicious programs that allow cybercriminals/botnet herders to control the infected machines remotely without the user’s knowledge. In many cases, botnet herders are motivated by economic incentives and try to significantly profit from illegal botnet activity while causing significant economic damage to society. To analyze the economic aspects of ...

متن کامل

Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

متن کامل

Sub-Botnet Cordination Using Tokens in a Switched Network

Botnets have evolved to incorporate peer-to-peer communication for the purpose of better hiding the administrative source of the botnet. Current botnet detection mechanisms identify network traffic patterns at strategic locations within a network such as the gateway. As detection techniques improve, botnet design will continue to evolve to evade detection; thus, it is advantageous to identify p...

متن کامل

An Integrated Defense Approach for Distributed Denial of Service Attacks In Mobile Ad-Hoc Network

Distributed Denial-of-Service (DDoS) attacks are a variant of Denial-of-Service (DoS) attacks where an attacker or a group of attackers employ multiple machines to carry out a DoS attack simultaneously, therefore increasing its effectiveness and strength. DDoS attacks in the networks needs to be prevented or handled if it occurs, as early as possible and before reaching the victim. Dealing with...

متن کامل

Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Service Attacks

While the Internet of things (IoT) promises to improve areas such as energy efficiency, health care, and transportation, it is highly vulnerable to cyberattacks. In particular, DDoS attacks work by overflowing the bandwidth of a server. But many IoT devices form part of cyber-physical systems (CPS). Therefore, they can be used to launch a “physical” denial-ofservice attack (PDoS) in which IoT d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011