AppBot: a novel P2P botnet architecture resistant to graph-based tracking

被引:0
|
作者
Yin, Tao [1 ]
Zhang, Yongzheng [1 ]
Li, Jia [2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Natl Comp Network Emergency Response Tech Team, Coordinat Ctr China, Beijing, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
D O I
10.1109/TrustCom.2016.116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
P2P architectures have been widely adopted by botnets for their high robustness. As the complex Command and Control (C&C) mechanism inevitably leads to too many interactions among bots, the P2P topology characteristics of traditional P2P botnet architectures is likely to be exposed to defenders, which makes them vulnerable to graph-based tracking. Inspired by the infeasibility of monitoring the global Internet and the diffculty of IP traceback problem, we propose a novel P2P botnet architecture, called AppBot, which is resistant to graph-based tracking. The key idea behind our proposal is two-folds: i) interactions are strictly restricted across different domains, and ii) IP spoofing is used to hide the origins of bots' interactions. Based on the real botnet distribution and background traffic of mainland China, we provide a realistic scenario for our experiments. In order to systematically evaluate AppBot, we compare it with two other typical P2P botnet architectures (HppBot and KppBot) in terms of the performance against one of the best graph-based tracking methods. We repeat our experiments by varying the botnet distribution (Gafgyt distribution and IMDDOS distribution). Each experiment is conducted on the mixture of synthetic botnet traffic and real background traffic of Xinjiang domain and Hainan domain, respectively. Experimental results show that AppBot shows a significantly high anti-tracking performance over all experimental settings. The average anti-tracking performances of AppBot, HppBot and KppBot are 46.88%, 20.45% and 24.28%, respectively.
引用
收藏
页码:615 / 622
页数:8
相关论文
共 50 条
  • [41] A Statistical P2P Botnet Detection Resilient to Mimicry Attacks
    Daneshgar, Fateme Faraji
    Mohammadkhani, Atiye
    Abbaspour, Maghsoud
    International Journal of Network Security, 2022, 24 (03) : 416 - 427
  • [42] Research on Network Architecture of CSTA Based on P2P
    Wang, Wei Kui
    Huang, Qiang
    Zhang, Xiao Hu
    MECHATRONICS AND MATERIALS PROCESSING I, PTS 1-3, 2011, 328-330 : 2296 - 2299
  • [43] Performance Analysis of MDN Based on P2P Architecture
    Zheng Quan
    Zheng Xiao-Le
    Li Jun
    Xiong Qing-Chang
    Wu Gang
    2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 111 - 115
  • [44] A P2P Network Based Architecture for Web Service
    Wang, Zhenqi
    Hu, Yuanyuan
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 3446 - 3449
  • [45] TreeP: A tree based P2P network architecture
    Hudzia, Benoit
    Kechadi, M-Tahar
    Ottewill, Adrian
    2005 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER), 2006, : 521 - +
  • [46] ECSP: An efficient cluster based P2P architecture
    Vuong, ST
    Li, J
    IC'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS 1 AND 2, 2003, : 860 - 865
  • [47] eBot: Approach towards modeling an advanced P2P Botnet
    Tetarave, Sumit Kumar
    Tripathy, Somanath
    Kalaimannan, Ezhil
    John, Caroline
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 391 - 396
  • [48] A spam filter system based on P2P architecture
    Dong, Dafan
    Zhang, Jianzhong
    Wu, Ying
    Lu, Hongbo
    Wu, Gongyi
    PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 155 - 156
  • [49] Reconstruction of C&C channel for P2P botnet
    Dehkordi, Mohammad Jafari
    Sadeghiyan, Babak
    IET COMMUNICATIONS, 2020, 14 (08) : 1318 - 1326
  • [50] Ichnaea: Effective P2P Botnet Detection Approach Based on Analysis of Network Flows
    Khodadadi, Rahimeh
    Akbari, Behzad
    2014 7th International Symposium on Telecommunications (IST), 2014, : 934 - 940