On the Resilience of P2P-based Botnet Graphs

被引:0
|
作者
Haas, Steffen [1 ]
Karuppayah, Shankar [2 ,3 ]
Manickam, Selvakumar [3 ]
Mhlhuser, Tmax [2 ]
Fischer, Mathias [1 ]
机构
[1] Univ Munster, IT Secur Grp, Munster, Germany
[2] Tech Univ Darmstadt, CASED, Telecooperat Grp, Darmstadt, Germany
[3] Univ Sains Malaysia, Natl Adv Ctr IPv6, Gelugor, Penang, Malaysia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
P2P botnets represent another escalation level in the race of arms between criminals and the research community. By utilizing a distributed P2P architecture they are resilient against random failures and attacks and overcome the Iimitations of a central command and control server. For this reason, it is important to monitor them to gather information for potential takedown attempts. In this paper, we introduce our high-frequency crawling tool Strobo-Crawler that can carry out a fine-grained node enumeration. Furthermore, we propose mechanisms to derive accurate snapshots of the botnet graph on the basis of restricted monitoring data. We applied Strobo-Crawler in a two week crawling campaign in the P2P botnets Sality and ZeroAccess and describe the resuIts along with a careful evaluation of our graph reconstruction. Furthermore, we provide a thorough analysis of the resuIting botnet graphs and also provide these graphs to the public. Our resuIts indicate that they are highly resilient against node churn, but also against targeted attacks. Bots are highly interconnected and the graphs are characterized by a high cIustering coefficient, high density, and low diameter.
引用
收藏
页码:225 / 233
页数:9
相关论文
共 50 条
  • [1] DUSTBot: A duplex and stealthy P2P-based botnet in the Bitcoin network
    Zhong, Yi
    Zhou, Anmin
    Zhang, Lei
    Jing, Fan
    Zuo, Zheng
    [J]. PLOS ONE, 2019, 14 (12):
  • [2] P2P-Based Single Sign-On
    Ma, Yong
    Chen, Xuewen
    Li, Ling
    Luo, Yaoming
    [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 845 - +
  • [3] On the resilience of P2P botnet footprints in the presence of legitimate P2P traffic
    Daneshgar, Fateme Faraji
    Abbaspour, Maghsoud
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (13)
  • [4] Technical trends in P2P-based communications
    Sunaga, H
    Hoshiai, T
    Kamei, S
    Kimura, S
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (10) : 2831 - 2846
  • [5] A Trusted Infrastructure for P2P-Based Marketplaces
    Dinh, Tien Tuan Anh
    Chothia, Tom
    Ryan, Mark
    [J]. 2009 IEEE NINTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P 2009), 2009, : 151 - 154
  • [6] P2P-based software engineering management
    Zhao, LN
    Zhang, Y
    Zhang, SY
    Ye, XZ
    [J]. NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 491 - 500
  • [7] P2P-based Mobile Social Networks
    Cho, Sung Woo
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 141 - 145
  • [8] P2P-Based Distributed QoS Monitoring Systems
    Chou, Li-Der
    Liang, Hong-Han
    Chen, Shing-Kuang
    Wang, Yung-Shih
    Yang, Che-Nan
    Chen, Min
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2008, 9 (02): : 153 - 159
  • [9] A Hybrid P2P-based Rendering System on WAN
    Cao, Yizhen
    Lin, Yilin
    Wang, Yan
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC & MECHANICAL ENGINEERING AND INFORMATION TECHNOLOGY (EMEIT-2012), 2012, 23
  • [10] P2P-based middleware for EAI process integration
    Sakaryan, German
    Unger, Herwig
    [J]. PROCEEDINGS OF THE FIFTH IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INTERNET, AND INFORMATION TECHNOLOGY, 2006, : 277 - +