AN ADVANCED HYBRID P2P BOTNET 2.0
Ta-Te Lu, Hung-Yi Liao, Ming-Feng Chen
2011
Abstract
Recently, malware attacks have become more serious over the Internet by e-mail, denial of service (DoS) or distributed denial of service (DDoS). The Botnets have become a significant part of the Internet malware attacks. The traditional botnets include three parts – botmaster, command and control (C&C) servers and bots. The C&C servers receive commands from botmaster and control the distributions of computers remotely. Bots use DNS to find the positions of C&C server. In this paper, we propose an advanced hybrid peer-to-peer (P2P) botnet 2.0 (AHP2P botnet 2.0) using web 2.0 technology to hide the instructions from botmaster into social sites, which are regarded as C&C servers. Servent bots are regarded as sub-C&C servers to get the instructions from social sites. The AHP2P botnet 2.0 can evaluate the performance of servent bots, reduce DNS traffics from bots to C&C servers, and achieve harder detection bots actions than IRC-based botnets over the Internet.
References
- Morales, J. A., Xu, S. and Sandhu, R., 2009, 'Analyzing DNS Activities of Bot Processes', in Proc. IEEE Int. Conf. Malicious and Unwanted Software, pp. 98-103.
- Morales, J. A., Xu, S. and Sandhu, R., 2009, 'Analyzing DNS Activities of Bot Processes', in Proc. IEEE Int. Conf. Malicious and Unwanted Software, pp. 98-103.
- Jang, D. I., Kim, M., Jung, H. C. and Noh, B. N., 2009, 'Analysis of HTTP2P Botnet: Case Study Waledac', in Proc. IEEE Int. Conf. Communications, pp. 409- 412.
- Jang, D. I., Kim, M., Jung, H. C. and Noh, B. N., 2009, 'Analysis of HTTP2P Botnet: Case Study Waledac', in Proc. IEEE Int. Conf. Communications, pp. 409- 412.
- Gizzard, J. B., Sharma, V., Nunnery, C., Kang, B. B. and Dagon, D., 2007, 'Peer-to-peer botnets: Overview and case study', in Proce. Hot Topics in Understanding Botnets, pp. 1-8.
- Gizzard, J. B., Sharma, V., Nunnery, C., Kang, B. B. and Dagon, D., 2007, 'Peer-to-peer botnets: Overview and case study', in Proce. Hot Topics in Understanding Botnets, pp. 1-8.
- Chang, S., Zhang, L., Guan, Y. and Daniels, T. E., 2009, 'A Framework for P2P Botnets', in Proc. IEEE Int. Conf. Communications and Mobile Computing, pp 594-599.
- Chang, S., Zhang, L., Guan, Y. and Daniels, T. E., 2009, 'A Framework for P2P Botnets', in Proc. IEEE Int. Conf. Communications and Mobile Computing, pp 594-599.
- Jian, G., Yang, Y., Zheng, K. F. and Hu, Z. M., 2010, 'Research of An Innovative P2P-Based Botnet', in Proc. IEEE Int. Conf. Machine Vision and Humanmachine Interface, pp 214-218.
- Jian, G., Yang, Y., Zheng, K. F. and Hu, Z. M., 2010, 'Research of An Innovative P2P-Based Botnet', in Proc. IEEE Int. Conf. Machine Vision and Humanmachine Interface, pp 214-218.
- Wang, P., Sparks, S. and Zou, C. C., 2010, 'An Advanced Hybrid Peer-to-Peer Botnet' IEEE Trans. Dependable and Computing, vol. 7, no. 2, pp. 113-127
- Wang, P., Sparks, S. and Zou, C. C., 2010, 'An Advanced Hybrid Peer-to-Peer Botnet' IEEE Trans. Dependable and Computing, vol. 7, no. 2, pp. 113-127
- Xie, J. and Tan, L., 2009, 'Detection Methods Research of Half Distributed P2P Botnet', Application Research of Computers, vol. 26, no. 10, pp. 3925-3928
- Xie, J. and Tan, L., 2009, 'Detection Methods Research of Half Distributed P2P Botnet', Application Research of Computers, vol. 26, no. 10, pp. 3925-3928
- Hung, P. and Tan, L., 2009, 'Design and Implementation of Partially Decentralized P2P Botnet Control', Journal of Computer Applications, vol. 29, no. 9, pp. 2446-2449.
- Hung, P. and Tan, L., 2009, 'Design and Implementation of Partially Decentralized P2P Botnet Control', Journal of Computer Applications, vol. 29, no. 9, pp. 2446-2449.
- Nguyen, H., Josef, P., 2010, 'Protecting Web 2.0 Services from Botnet Exploitations', in Proc. IEEE Int. Conf. Cybercrime and Trustworthy Computing Workshop, pp.18-28.
- Nguyen, H., Josef, P., 2010, 'Protecting Web 2.0 Services from Botnet Exploitations', in Proc. IEEE Int. Conf. Cybercrime and Trustworthy Computing Workshop, pp.18-28.
Paper Citation
in Harvard Style
Lu T., Liao H. and Chen M. (2011). AN ADVANCED HYBRID P2P BOTNET 2.0 . In Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 978-989-8425-55-3, pages 273-276. DOI: 10.5220/0003504102730276
in Harvard Style
Lu T., Liao H. and Chen M. (2011). AN ADVANCED HYBRID P2P BOTNET 2.0 . In Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 978-989-8425-55-3, pages 273-276. DOI: 10.5220/0003504102730276
in Bibtex Style
@conference{iceis11,
author={Ta-Te Lu and Hung-Yi Liao and Ming-Feng Chen},
title={AN ADVANCED HYBRID P2P BOTNET 2.0},
booktitle={Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2011},
pages={273-276},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003504102730276},
isbn={978-989-8425-55-3},
}
in Bibtex Style
@conference{iceis11,
author={Ta-Te Lu and Hung-Yi Liao and Ming-Feng Chen},
title={AN ADVANCED HYBRID P2P BOTNET 2.0},
booktitle={Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2011},
pages={273-276},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003504102730276},
isbn={978-989-8425-55-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - AN ADVANCED HYBRID P2P BOTNET 2.0
SN - 978-989-8425-55-3
AU - Lu T.
AU - Liao H.
AU - Chen M.
PY - 2011
SP - 273
EP - 276
DO - 10.5220/0003504102730276
in EndNote Style
TY - CONF
JO - Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - AN ADVANCED HYBRID P2P BOTNET 2.0
SN - 978-989-8425-55-3
AU - Lu T.
AU - Liao H.
AU - Chen M.
PY - 2011
SP - 273
EP - 276
DO - 10.5220/0003504102730276