Tsunami : A parasitic , indestructible botnet on
نویسندگان
چکیده
While current botnets rely on a central server or bootstrap nodes for their operations, in this paper we identify and investigate a new type of botnet, called Tsunami, in which no such bottleneck nodes exist. In particular, we study how a Tsunami botnet can build a parasitic relationship with a widely deployed P2P system, Kad, to successfully issue commands to its bots, launch various attacks, including distributed denial of service (DDoS) and spam, at ease, as well as receive responses from the bots. Our evaluation shows that in a Kad network with four million nodes, even with only 6 % nodes being Tsunami bots, Tsunami can reach 75 % of its bots in less than 4 min and receive responses from 99 % of bots. We further propose how we may defend against Tsunami and evaluate the defense solution.
منابع مشابه
Tsunami: A parasitic, indestructible botnet on Kad
While current botnets rely on a central server or bootstrap nodes for their operations, in this paper we identify and investigate a new type of botnet, called Tsunami, in which no such bottleneck nodes exist. In particular, we study how a Tsunami botnet can build a parasitic relationship with a widely deployed P2P system, Kad, to successfully issue commands to its bots, launch various attacks, ...
متن کاملBotOnus: an online unsupervised method for Botnet detection
Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...
متن کاملBotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle
Nowadays, botnets are considered as essential tools for planning serious cyberattacks. Botnets are used to perform various malicious activities such as DDoSattacks and sending spam emails. Different approaches are presented to detectbotnets; however most of them may be ineffective when there are only a fewinfected hosts in monitored network, as they rely on similarity in...
متن کاملThree Dimensional Numerical Simulation of Tsunami Generation and Propagation Due to Makran Subduction and run-up on Chabahar Bay and Makran Coasts
Makran subduction located at the northwest of the Indian Ocean nearby the southern coast of Iran and Pakistan. Makran subduction is the source of tsunamis that threaten southern coast of Iran. In this article, generation and propagation of 1945’s tsunami initiated by Makran subduction is simulated. For the three dimensional generation of the wave, advanced algorithm of Okada is adopted. The CFD...
متن کاملNumerical Modeling of Tsunami Waves Associated With Worst Earthquake Scenarios of the Makran Subduction Zone in the Jask Port, Iran
The recent studies show that the past researches may have significantly underestimated earthquake and tsunami hazard in the Makran Subduction Zone (MSZ) and this region is potentially capable of producing major earthquakes. In this study, the worst case possible earthquake scenarios of the MSZ are simulated using fully nonlinear boussinesq model to investigate tsunami hazards on the Jask Port, ...
متن کامل