On the Robustness of the Botnet Topology Formed by Worm Infection

作者: Qian Wang , Zesheng Chen , Chao Chen , Niki Pissinou

DOI: 10.1109/GLOCOM.2010.5684002

关键词:

摘要: Peer-to-peer botnets formed by worm infection have become a real threat to the Internet and are expected rampant in near future. In our previous work, we analyzed underlying botnet topology infection, without considering potential user defenses. this paper, extend study characterize evolution of structure when users patch or clean part infected hosts after all vulnerable machines compromised. Specifically, examine number peers an host size disconnected under random node removal through simulation. We find that patched cleaned, distribution follows closely exponential distribution, whereas isolated is power-law. Moreover, also evaluate simple countermeasure enhances robustness re-infection, show re-infection can significantly mitigate effectiveness patching cleaning on structure. believe such not only provide better understandings both strength weakness botnets, but prepare us for future attacks.

参考文章(11)
Cliff Changchun Zou, Weibo Gong, Don Towsley, Code red worm propagation modeling and analysis Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 138- 147 ,(2002) , 10.1145/586110.586130
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, On the impact of dynamic addressing on malware propagation Proceedings of the 4th ACM workshop on Recurring malcode - WORM '06. pp. 51- 56 ,(2006) , 10.1145/1179542.1179554
Qin Lv, Pei Cao, Edith Cohen, Kai Li, Scott Shenker, Search and replication in unstructured peer-to-peer networks international conference on supercomputing. pp. 84- 95 ,(2002) , 10.1145/2591635.2667182
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, Inside the Slammer worm ieee symposium on security and privacy. ,vol. 1, pp. 33- 39 ,(2003) , 10.1109/MSECP.2003.1219056
C. Shannon, D. Moore, The spread of the Witty worm ieee symposium on security and privacy. ,vol. 2, pp. 46- 50 ,(2004) , 10.1109/MSP.2004.59
David Moore, Colleen Shannon, k claffy, Code-Red: a case study on the spread and victims of an internet worm acm special interest group on data communication. pp. 273- 284 ,(2002) , 10.1145/637201.637244
Ping Wang, Sherri Sparks, Cliff C Zou, An Advanced Hybrid Peer-to-Peer Botnet IEEE Transactions on Dependable and Secure Computing. ,vol. 7, pp. 113- 127 ,(2010) , 10.1109/TDSC.2008.35
Z. Chen, L. Gao, K. Kwiat, Modeling the spread of active worms international conference on computer communications. ,vol. 3, pp. 1890- 1900 ,(2003) , 10.1109/INFCOM.2003.1209211
David Dagon, Guofei Gu, Christopher P. Lee, Wenke Lee, A Taxonomy of Botnet Structures annual computer security applications conference. pp. 325- 339 ,(2007) , 10.1109/ACSAC.2007.44
Ping Wang, Lei Wu, Baber Aslam, Cliff C. Zou, A Systematic Study on Peer-to-Peer Botnets 2009 Proceedings of 18th International Conference on Computer Communications and Networks. pp. 1- 8 ,(2009) , 10.1109/ICCCN.2009.5235360