AN ADVANCED HYBRID P2P BOTNET 2.0

Ta-Te Lu, Hung-Yi Liao, Ming-Feng Chen

2011

Abstract

Recently, malware attacks have become more serious over the Internet by e-mail, denial of service (DoS) or distributed denial of service (DDoS). The Botnets have become a significant part of the Internet malware attacks. The traditional botnets include three parts – botmaster, command and control (C&C) servers and bots. The C&C servers receive commands from botmaster and control the distributions of computers remotely. Bots use DNS to find the positions of C&C server. In this paper, we propose an advanced hybrid peer-to-peer (P2P) botnet 2.0 (AHP2P botnet 2.0) using web 2.0 technology to hide the instructions from botmaster into social sites, which are regarded as C&C servers. Servent bots are regarded as sub-C&C servers to get the instructions from social sites. The AHP2P botnet 2.0 can evaluate the performance of servent bots, reduce DNS traffics from bots to C&C servers, and achieve harder detection bots actions than IRC-based botnets over the Internet.

References

  1. Morales, J. A., Xu, S. and Sandhu, R., 2009, 'Analyzing DNS Activities of Bot Processes', in Proc. IEEE Int. Conf. Malicious and Unwanted Software, pp. 98-103.
  2. Morales, J. A., Xu, S. and Sandhu, R., 2009, 'Analyzing DNS Activities of Bot Processes', in Proc. IEEE Int. Conf. Malicious and Unwanted Software, pp. 98-103.
  3. Jang, D. I., Kim, M., Jung, H. C. and Noh, B. N., 2009, 'Analysis of HTTP2P Botnet: Case Study Waledac', in Proc. IEEE Int. Conf. Communications, pp. 409- 412.
  4. Jang, D. I., Kim, M., Jung, H. C. and Noh, B. N., 2009, 'Analysis of HTTP2P Botnet: Case Study Waledac', in Proc. IEEE Int. Conf. Communications, pp. 409- 412.
  5. Gizzard, J. B., Sharma, V., Nunnery, C., Kang, B. B. and Dagon, D., 2007, 'Peer-to-peer botnets: Overview and case study', in Proce. Hot Topics in Understanding Botnets, pp. 1-8.
  6. Gizzard, J. B., Sharma, V., Nunnery, C., Kang, B. B. and Dagon, D., 2007, 'Peer-to-peer botnets: Overview and case study', in Proce. Hot Topics in Understanding Botnets, pp. 1-8.
  7. Chang, S., Zhang, L., Guan, Y. and Daniels, T. E., 2009, 'A Framework for P2P Botnets', in Proc. IEEE Int. Conf. Communications and Mobile Computing, pp 594-599.
  8. Chang, S., Zhang, L., Guan, Y. and Daniels, T. E., 2009, 'A Framework for P2P Botnets', in Proc. IEEE Int. Conf. Communications and Mobile Computing, pp 594-599.
  9. Jian, G., Yang, Y., Zheng, K. F. and Hu, Z. M., 2010, 'Research of An Innovative P2P-Based Botnet', in Proc. IEEE Int. Conf. Machine Vision and Humanmachine Interface, pp 214-218.
  10. Jian, G., Yang, Y., Zheng, K. F. and Hu, Z. M., 2010, 'Research of An Innovative P2P-Based Botnet', in Proc. IEEE Int. Conf. Machine Vision and Humanmachine Interface, pp 214-218.
  11. Wang, P., Sparks, S. and Zou, C. C., 2010, 'An Advanced Hybrid Peer-to-Peer Botnet' IEEE Trans. Dependable and Computing, vol. 7, no. 2, pp. 113-127
  12. Wang, P., Sparks, S. and Zou, C. C., 2010, 'An Advanced Hybrid Peer-to-Peer Botnet' IEEE Trans. Dependable and Computing, vol. 7, no. 2, pp. 113-127
  13. Xie, J. and Tan, L., 2009, 'Detection Methods Research of Half Distributed P2P Botnet', Application Research of Computers, vol. 26, no. 10, pp. 3925-3928
  14. Xie, J. and Tan, L., 2009, 'Detection Methods Research of Half Distributed P2P Botnet', Application Research of Computers, vol. 26, no. 10, pp. 3925-3928
  15. Hung, P. and Tan, L., 2009, 'Design and Implementation of Partially Decentralized P2P Botnet Control', Journal of Computer Applications, vol. 29, no. 9, pp. 2446-2449.
  16. Hung, P. and Tan, L., 2009, 'Design and Implementation of Partially Decentralized P2P Botnet Control', Journal of Computer Applications, vol. 29, no. 9, pp. 2446-2449.
  17. Nguyen, H., Josef, P., 2010, 'Protecting Web 2.0 Services from Botnet Exploitations', in Proc. IEEE Int. Conf. Cybercrime and Trustworthy Computing Workshop, pp.18-28.
  18. Nguyen, H., Josef, P., 2010, 'Protecting Web 2.0 Services from Botnet Exploitations', in Proc. IEEE Int. Conf. Cybercrime and Trustworthy Computing Workshop, pp.18-28.
Download


Paper Citation


in Harvard Style

Lu T., Liao H. and Chen M. (2011). AN ADVANCED HYBRID P2P BOTNET 2.0 . In Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 978-989-8425-55-3, pages 273-276. DOI: 10.5220/0003504102730276


in Harvard Style

Lu T., Liao H. and Chen M. (2011). AN ADVANCED HYBRID P2P BOTNET 2.0 . In Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 978-989-8425-55-3, pages 273-276. DOI: 10.5220/0003504102730276


in Bibtex Style

@conference{iceis11,
author={Ta-Te Lu and Hung-Yi Liao and Ming-Feng Chen},
title={AN ADVANCED HYBRID P2P BOTNET 2.0},
booktitle={Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2011},
pages={273-276},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003504102730276},
isbn={978-989-8425-55-3},
}


in Bibtex Style

@conference{iceis11,
author={Ta-Te Lu and Hung-Yi Liao and Ming-Feng Chen},
title={AN ADVANCED HYBRID P2P BOTNET 2.0},
booktitle={Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2011},
pages={273-276},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003504102730276},
isbn={978-989-8425-55-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - AN ADVANCED HYBRID P2P BOTNET 2.0
SN - 978-989-8425-55-3
AU - Lu T.
AU - Liao H.
AU - Chen M.
PY - 2011
SP - 273
EP - 276
DO - 10.5220/0003504102730276


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - AN ADVANCED HYBRID P2P BOTNET 2.0
SN - 978-989-8425-55-3
AU - Lu T.
AU - Liao H.
AU - Chen M.
PY - 2011
SP - 273
EP - 276
DO - 10.5220/0003504102730276