AppBot: a novel P2P botnet architecture resistant to graph-based tracking

被引:0
|
作者
Yin, Tao [1 ]
Zhang, Yongzheng [1 ]
Li, Jia [2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Natl Comp Network Emergency Response Tech Team, Coordinat Ctr China, Beijing, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
D O I
10.1109/TrustCom.2016.116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
P2P architectures have been widely adopted by botnets for their high robustness. As the complex Command and Control (C&C) mechanism inevitably leads to too many interactions among bots, the P2P topology characteristics of traditional P2P botnet architectures is likely to be exposed to defenders, which makes them vulnerable to graph-based tracking. Inspired by the infeasibility of monitoring the global Internet and the diffculty of IP traceback problem, we propose a novel P2P botnet architecture, called AppBot, which is resistant to graph-based tracking. The key idea behind our proposal is two-folds: i) interactions are strictly restricted across different domains, and ii) IP spoofing is used to hide the origins of bots' interactions. Based on the real botnet distribution and background traffic of mainland China, we provide a realistic scenario for our experiments. In order to systematically evaluate AppBot, we compare it with two other typical P2P botnet architectures (HppBot and KppBot) in terms of the performance against one of the best graph-based tracking methods. We repeat our experiments by varying the botnet distribution (Gafgyt distribution and IMDDOS distribution). Each experiment is conducted on the mixture of synthetic botnet traffic and real background traffic of Xinjiang domain and Hainan domain, respectively. Experimental results show that AppBot shows a significantly high anti-tracking performance over all experimental settings. The average anti-tracking performances of AppBot, HppBot and KppBot are 46.88%, 20.45% and 24.28%, respectively.
引用
收藏
页码:615 / 622
页数:8
相关论文
共 50 条
  • [21] Botyacc: Unified P2P Botnet Detection Using Behavioural Analysis and Graph Analysis
    Nagaraja, Shishir
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 439 - 456
  • [22] Research of botnet base on P2P protocol
    Li Yue
    Fan Ya-qin
    Yang Duo
    Zheng Kai-yuan
    ENERGY DEVELOPMENT, PTS 1-4, 2014, 860-863 : 2758 - +
  • [23] An advanced hybrid P2p botnet 2.0
    Lu, T.T.
    Liao, H.Y.
    Chen, M.F.
    World Academy of Science, Engineering and Technology, 2011, 81 : 595 - 597
  • [24] Revisiting Node Injection of P2P Botnet
    Yan, Jia
    Ying, Lingyun
    Yang, Yi
    Su, Purui
    Li, Qi
    Kong, Hui
    Feng, Dengguo
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 124 - 137
  • [25] GroupNET:A Novel P2P Grouping Network Based On Cayley Graph
    Liu, Hao
    Zhang, Lian-Ming
    Zeng, Bing
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 557 - +
  • [26] A novel graph-based approach for IoT botnet detection
    Huy-Trung Nguyen
    Quoc-Dung Ngo
    Van-Hoang Le
    International Journal of Information Security, 2020, 19 : 567 - 577
  • [27] A novel graph-based approach for IoT botnet detection
    Huy-Trung Nguyen
    Quoc-Dung Ngo
    Van-Hoang Le
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (05) : 567 - 577
  • [28] P2P Botnet Detection Based on Nodes Correlation by the Mahalanobis Distance
    Yang, Zhixian
    Wang, Buhong
    INFORMATION, 2019, 10 (05)
  • [29] 基于流角色检测P2P botnet
    宋元章
    何俊婷
    张波
    王俊杰
    王安邦
    通信学报 , 2012, (S1) : 262 - 269
  • [30] Detecting P2P Botnet in Software Defined Networks
    Su, Shang-Chiuan
    Chen, Yi-Ren
    Tsai, Shi-Chun
    Lin, Yi-Bing
    SECURITY AND COMMUNICATION NETWORKS, 2018,