SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets

作者: C. Rossow , D. Andriesse , T. Werner , B. Stone-Gross , D. Plohmann

DOI: 10.1109/SP.2013.17

关键词:

摘要: Centralized botnets are easy targets for takedown efforts by computer security researchers and law enforcement. Thus, botnet controllers have sought new ways to harden the infrastructures of their botnets. In order meet this objective, some operators (re)designed use Peer-to-Peer (P2P) infrastructures. Many P2P far more resilient attempts than centralized botnets, because they no single points failure. However, subject unique classes attacks, such as node enumeration poisoning. paper, we introduce a formal graph model capture intrinsic properties fundamental vulnerabilities We apply our current assess resilience against attacks. provide assessments on sizes all eleven active showing that families contain over million bots. addition, prototyped several mitigation strategies measure existing believe results from analysis can be used assist in evaluating future

参考文章(21)
Guanhua Yan, Songqing Chen, Stephan Eidenbenz, RatBot: anti-enumeration peer-to-peer botnets international conference on information security. pp. 135- 151 ,(2011) , 10.1007/978-3-642-24861-0_10
Roberto Perdisci, David Dagon, Yacin Nadji, Manos Antonakakis, Nikolaos Vasiloglou, Wenke Lee, Saeed Abu-Nimeh, From throw-away traffic to bots: detecting the rise of DGA-based malware usenix security symposium. pp. 24- 24 ,(2012)
Elmar Gerhards-Padilla, Daniel Plohmann, Case study of the Miner Botnet international conference on cyber conflict. pp. 1- 16 ,(2012)
Geoffrey M. Voelker, Brandon Enright, Chris Kanich, Kirill Levchenko, Stefan Savage, The heisenbot uncertainty problem: challenges in separating bots from chaff LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. pp. 10- ,(2008)
Ting-Fang Yen, Michael K. Reiter, Revisiting botnet models and their implications for takedown strategies principles of security and trust. pp. 249- 268 ,(2012) , 10.1007/978-3-642-28641-4_14
Felix Freiling, Ernst Biersack, Moritz Steiner, Frederic Dahl, Thorsten Holz, Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. pp. 9- ,(2008)
Petter Holme, Beom Jun Kim, Chang No Yoon, Seung Kee Han, None, Attack vulnerability of complex networks Physical Review E. ,vol. 65, pp. 056109- ,(2002) , 10.1103/PHYSREVE.65.056109
Guido Urdaneta, Guillaume Pierre, Maarten Van Steen, A survey of DHT security techniques ACM Computing Surveys. ,vol. 43, pp. 1- 49 ,(2011) , 10.1145/1883612.1883615
Greg Sinclair, Chris Nunnery, Brent ByungHoon Kang, The waledac protocol: The how and why international conference on malicious and unwanted software. pp. 69- 77 ,(2009) , 10.1109/MALWARE.2009.5403015
Guanhua Yan, Duc T. Ha, Stephan Eidenbenz, AntBot: Anti-pollution peer-to-peer botnets Computer Networks. ,vol. 55, pp. 1941- 1956 ,(2011) , 10.1016/J.COMNET.2011.02.006