An advanced hybrid P2p botnet 2.0

被引:0
|
作者
Lu, T.T. [1 ]
Liao, H.Y. [2 ]
Chen, M.F. [1 ]
机构
[1] The Department of Computer Science and Information Engineering, University of Ching Yun, Chung-Li, Taoyuan County 320, Taiwan
[2] The Department of Institute of Computer, Communication, and System Engineering, University of Ching Yun, Chung-Li, Taoyuan County 320, Taiwan
关键词
Denial-of-service attack - Malware - Hierarchical systems - Network security - Internet protocols;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, malware attacks have become more serious over the Internet by e-mail, denial of service (DoS) or distributed denial of service (DDoS). The Botnets have become a significant part of the Internet malware attacks. The traditional botnets include three parts - botmaster, command and control (C&C) servers and bots. The C&C servers receive commands from botmaster and control the distributions of computers remotely. Bots use DNS to find the positions of C&C server. In this paper, we propose an advanced hybrid peer-to-peer (P2P) botnet 2.0 (AHP2P botnet 2.0) using web 2.0 technology to hide the instructions from botmaster into social sites, which are regarded as C&C servers. Servent bots are regarded as sub-C&C servers to get the instructions from social sites. The AHP2P botnet 2.0 can evaluate the performance of servent bots, reduce DNS traffics from bots to C&C servers, and achieve harder detection bots actions than IRC-based botnets over the Internet.
引用
收藏
页码:595 / 597
相关论文
共 50 条
  • [21] A Mobile Botnet Model Based on P2P Grid
    Simon, Marek
    Huraj, Ladislav
    Hostovecky, Marian
    CREATIVITY IN INTELLIGENT TECHNOLOGIES AND DATA SCIENCE, (CIT&DS), 2017, 754 : 604 - 615
  • [22] P2P as botnet command and control: a deeper insight
    Dittrich, David
    Dietrich, Sven
    MALWARE 2008: PROCEEDINGS OF THE 2008 3RD INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, 2008, : 46 - +
  • [23] Adaptive traffic sampling for P2P botnet detection
    He, Jie
    Yang, Yuexiang
    Wang, Xiaolei
    Tan, Zhiguo
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2017, 27 (05)
  • [24] A Statistical P2P Botnet Detection Resilient to Mimicry Attacks
    Daneshgar, Fateme Faraji
    Mohammadkhani, Atiye
    Abbaspour, Maghsoud
    International Journal of Network Security, 2022, 24 (03) : 416 - 427
  • [25] A Reputation-Based Resilient and Recoverable P2P Botnet
    Yin, Jie
    Cui, Xiang
    Li, Ke
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 275 - 282
  • [26] P2P Botnet Detection Method Based on Data Flow
    Wang Jiajia
    Chen Yu
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL SYMPOSIUM ON ADVANCES IN ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (ISAEECE 2017), 2017, 124 : 235 - 239
  • [27] Reconstruction of C&C channel for P2P botnet
    Dehkordi, Mohammad Jafari
    Sadeghiyan, Babak
    IET COMMUNICATIONS, 2020, 14 (08) : 1318 - 1326
  • [28] P2P botnet Detection based on Irregular Phased Similarity
    Li, Huabo
    Hu, Guyu
    Yuan, Jian
    Lai, Haiguang
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 79 - 82
  • [29] P2P botnet detection using min-vertex cover
    Xu, Lei
    Xu, Xiaolong
    Zhuo, Yue
    Journal of Networks, 2012, 7 (08) : 1176 - 1181
  • [30] Detecting New P2P Botnet with Multi-chart CUSUM
    Kang, Jian
    Zhang, Jun-Yao
    Li, Qiang
    Li, Zhuo
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 688 - 691