AppBot: a novel P2P botnet architecture resistant to graph-based tracking

被引:0
|
作者
Yin, Tao [1 ]
Zhang, Yongzheng [1 ]
Li, Jia [2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Natl Comp Network Emergency Response Tech Team, Coordinat Ctr China, Beijing, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
D O I
10.1109/TrustCom.2016.116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
P2P architectures have been widely adopted by botnets for their high robustness. As the complex Command and Control (C&C) mechanism inevitably leads to too many interactions among bots, the P2P topology characteristics of traditional P2P botnet architectures is likely to be exposed to defenders, which makes them vulnerable to graph-based tracking. Inspired by the infeasibility of monitoring the global Internet and the diffculty of IP traceback problem, we propose a novel P2P botnet architecture, called AppBot, which is resistant to graph-based tracking. The key idea behind our proposal is two-folds: i) interactions are strictly restricted across different domains, and ii) IP spoofing is used to hide the origins of bots' interactions. Based on the real botnet distribution and background traffic of mainland China, we provide a realistic scenario for our experiments. In order to systematically evaluate AppBot, we compare it with two other typical P2P botnet architectures (HppBot and KppBot) in terms of the performance against one of the best graph-based tracking methods. We repeat our experiments by varying the botnet distribution (Gafgyt distribution and IMDDOS distribution). Each experiment is conducted on the mixture of synthetic botnet traffic and real background traffic of Xinjiang domain and Hainan domain, respectively. Experimental results show that AppBot shows a significantly high anti-tracking performance over all experimental settings. The average anti-tracking performances of AppBot, HppBot and KppBot are 46.88%, 20.45% and 24.28%, respectively.
引用
收藏
页码:615 / 622
页数:8
相关论文
共 50 条
  • [31] 双层架构的P2P Botnet研究
    方圆
    吴灏
    杨利明
    计算机工程与设计, 2008, (11) : 2724 - 2726+2747
  • [32] Research on P2P Botnet Network Behaviors and Modeling
    Li, Huabo
    Hu, Guyu
    Yang, Yun
    INFORMATION COMPUTING AND APPLICATIONS, PT 1, 2012, 307 : 82 - 89
  • [33] P2P as botnet command and control: a deeper insight
    Dittrich, David
    Dietrich, Sven
    MALWARE 2008: PROCEEDINGS OF THE 2008 3RD INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, 2008, : 46 - +
  • [34] Adaptive traffic sampling for P2P botnet detection
    He, Jie
    Yang, Yuexiang
    Wang, Xiaolei
    Tan, Zhiguo
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2017, 27 (05)
  • [35] BotCluster: A session-based P2P botnet clustering system on NetFlow
    Wang, Chun-Yu
    Ou, Chi-Lung
    Zhang, Yu-En
    Cho, Feng-Min
    Chen, Pin-Hao
    Chang, Jyh-Biau
    Shieh, Ce-Kuen
    COMPUTER NETWORKS, 2018, 145 : 175 - 189
  • [36] AutoBotCatcher: Blockchain-based P2P Botnet Detection for the Internet of Things
    Sagirlar, Gokhan
    Carminati, Barbara
    Ferrari, Elena
    2018 4TH IEEE INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2018), 2018, : 1 - 8
  • [37] P2P botnet detection based on correlation of flow and information fusion theory
    Song, Yuanzhang
    Chen, Yuan
    Wang, Anbang
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2014, 42 (11): : 57 - 62
  • [38] ASP2P: An Advanced Botnet Based on Social Networks over Hybrid P2P
    Cao, Lei
    Qiu, Xiaofeng
    2013 22ND WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC 2013), 2013, : 677 - 682
  • [39] Graph based modeling of P2P streaming systems
    Carra, Damiano
    Lo Cigno, Renato
    Biersack, Ernst W.
    NETWORKING 2007: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2007, 4479 : 594 - +
  • [40] Detecting P2P Traffic from the P2P Flow Graph
    Kim, Jonghyun
    Shah, Khushboo
    Bohacek, Stephan
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 1795 - 1800