An advanced hybrid P2p botnet 2.0

被引:0
|
作者
Lu, T.T. [1 ]
Liao, H.Y. [2 ]
Chen, M.F. [1 ]
机构
[1] The Department of Computer Science and Information Engineering, University of Ching Yun, Chung-Li, Taoyuan County 320, Taiwan
[2] The Department of Institute of Computer, Communication, and System Engineering, University of Ching Yun, Chung-Li, Taoyuan County 320, Taiwan
关键词
Denial-of-service attack - Malware - Hierarchical systems - Network security - Internet protocols;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, malware attacks have become more serious over the Internet by e-mail, denial of service (DoS) or distributed denial of service (DDoS). The Botnets have become a significant part of the Internet malware attacks. The traditional botnets include three parts - botmaster, command and control (C&C) servers and bots. The C&C servers receive commands from botmaster and control the distributions of computers remotely. Bots use DNS to find the positions of C&C server. In this paper, we propose an advanced hybrid peer-to-peer (P2P) botnet 2.0 (AHP2P botnet 2.0) using web 2.0 technology to hide the instructions from botmaster into social sites, which are regarded as C&C servers. Servent bots are regarded as sub-C&C servers to get the instructions from social sites. The AHP2P botnet 2.0 can evaluate the performance of servent bots, reduce DNS traffics from bots to C&C servers, and achieve harder detection bots actions than IRC-based botnets over the Internet.
引用
收藏
页码:595 / 597
相关论文
共 50 条
  • [1] AN ADVANCED HYBRID P2P BOTH ET 2.0
    Lu, Ta-Te
    Liao, Hung-Yi
    Chen, Ming-Feng
    ICEIS 2011: PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL 3, 2011, : 273 - 276
  • [2] ASP2P: An Advanced Botnet Based on Social Networks over Hybrid P2P
    Cao, Lei
    Qiu, Xiaofeng
    2013 22ND WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC 2013), 2013, : 677 - 682
  • [3] eBot: Approach towards modeling an advanced P2P Botnet
    Tetarave, Sumit Kumar
    Tripathy, Somanath
    Kalaimannan, Ezhil
    John, Caroline
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 391 - 396
  • [4] An Efficient Botnet Detection System for P2P Botnet
    Thangapandiyan, M.
    Anand, P. M. Rubesh
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1217 - 1221
  • [5] Botnet and P2P Botnet Detection Strategies: A Review
    Dhayal, Himanshi
    Kumar, Jitender
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 1077 - 1082
  • [6] Experiments with P2P Botnet Detection
    Riviere, Lionel
    Dietrich, Sven
    IT-INFORMATION TECHNOLOGY, 2012, 54 (02): : 90 - 95
  • [7] P2P and P2P botnet traffic classification in two stages
    Ye, Wujian
    Cho, Kyungsan
    SOFT COMPUTING, 2017, 21 (05) : 1315 - 1326
  • [8] A Longitudinal Measurement and Analysis of Pink, a Hybrid P2P IoT Botnet
    Wang, Binglai
    Sang, Yafei
    Zhang, Yongzheng
    Li, Shuhao
    Ge, Ruihai
    Ding, Yong
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2022, PT II, 2022, 461 : 419 - 436
  • [9] P2P and P2P botnet traffic classification in two stages
    Wujian Ye
    Kyungsan Cho
    Soft Computing, 2017, 21 : 1315 - 1326
  • [10] P2P Network Structure Graph Finding for P2P Botnet Detection
    Yuan, Zhi-chao
    Li, Yuan-long
    Yao, Shan
    Xia, Chun-he
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 697 - 701