DUSTBot: A duplex and stealthy P2P-based botnet in the Bitcoin network

被引:3
|
作者
Zhong, Yi [1 ]
Zhou, Anmin [1 ]
Zhang, Lei [1 ]
Jing, Fan [1 ]
Zuo, Zheng [2 ]
机构
[1] Sichuan Univ, Coll Cybersecur, Chengdu, Sichuan, Peoples R China
[2] Sichuan Univ, Coll Elect & Informat Engn, Chengdu, Sichuan, Peoples R China
来源
PLOS ONE | 2019年 / 14卷 / 12期
关键词
D O I
10.1371/journal.pone.0226594
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
As the root cause of illegal cyber activities, botnets are evolving continuously over the last two decades. Current researches on botnet command and control mechanism based on blockchain network suffer from high economic cost, single point of failure, and limited scal-ability. In this paper, we present DUSTBot, a novel P2P botnet model based on Bitcoin transactions to prepare for new cyber threats. Specifically, a covert, duplex, and low-cost command and control (C&C) channel in the Bitcoin network is presented in our work. DUSTBot uses the Bitcoin main network as the downstream channel while using the Bitcoin test-net as the upstream channel. Furthermore, the peer list exchange algorithm based on the Ethereum block hash proposed in this paper is effective against routing table poisoning attack and P2P botnet crawling. The robustness of DUSTBot against node removal is studied through constructing the botnet with a P2P simulator. We deploy the implementation of DUSTBot on cloud platforms to test its feasibility and performance. Moreover, the stealthiness of DUSTBot and the effectiveness of the proposed peer list exchange algorithm are evaluated. The results demonstrate the feasibility, performance, stealthiness, and robustness of DUSTBot. In the end, possible countermeasures are discussed to mitigate similar threats in the future.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] On the Resilience of P2P-based Botnet Graphs
    Haas, Steffen
    Karuppayah, Shankar
    Manickam, Selvakumar
    Mhlhuser, Tmax
    Fischer, Mathias
    [J]. 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 225 - 233
  • [2] Towards P2P-based Computer Network Management
    Xu, Hui
    Xiao, Debao
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2009, 2 (01): : 25 - 32
  • [3] Building a Scalable System for Stealthy P2P-Botnet Detection
    Zhang, Junjie
    Perdisci, Roberto
    Lee, Wenke
    Luo, Xiapu
    Sarfraz, Unum
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (01) : 27 - 38
  • [4] A P2P-based framework for distributed network management
    Binzenhoefer, Andreas
    Tutschku, Kurt
    Graben, Bjoern auf dem
    Fiedler, Markus
    Arlos, Patrik
    [J]. WIRELESS SYSTEMS AND NETWORK ARCHITECTURES IN NEXT GENERATION INTERNET, 2006, 3883 : 198 - 210
  • [5] Towards a P2P-Based Deployment of Network Management Information
    Makhloufi, Rafik
    Bonnet, Gregory
    Doyen, Guillaume
    Gaiti, Dominique
    [J]. MECHANISMS FOR AUTONOMOUS MANAGEMENT OF NETWORKS AND SERVICES, 2010, 6155 : 26 - 37
  • [6] A Network Adaptive Fragmentation Algorithm for P2P-Based CDN
    Zheng, Yunyi
    Chen, Jianxin
    Cheng, Yi
    [J]. 2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 1031 - 1036
  • [7] Modeling and analysis for the P2P-based media delivery network
    Yin, Bao-Qun
    Guo, Dong
    Huang, Jing
    Wu, Xu-Min
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (3-4) : 1529 - 1539
  • [8] Admission Control for P2P-Based Media Delivery Network
    Lu Shan
    Yin Baoqun
    Guo Dong
    [J]. PROCEEDINGS OF THE 29TH CHINESE CONTROL CONFERENCE, 2010, : 1494 - 1499
  • [9] The Bitcoin P2P Network
    Donet Donet, Joan Antoni
    Perez-Sola, Cristina
    Herrera-Joancomarti, Jordi
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014, 2014, 8438 : 87 - 102
  • [10] P2P-based collaborative media streaming for heterogeneous network terminals
    Mushtaq, M.
    Ahmed, T.
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS (AQTR 2008), THETA 16TH EDITION, VOL I, PROCEEDINGS, 2008, : 330 - 335