AN ADVANCED HYBRID P2P BOTNET 2.0
Ta-Te Lu, Hung-Yi Liao and Ming-Feng Chen
Department of Computer Science & Information Engineering, Ching Yun University
Chung-Li, Taoyuan County 320, Taiwan, China
Keywords: Peer-to-peer, Botnets, Botnet 2.0, Hybrid peer-to-peer.
Abstract: Recently, malware attacks have become more serious over the Internet by e-mail, denial of service (DoS) or
distributed denial of service (DDoS). The Botnets have become a significant part of the Internet malware
attacks. The traditional botnets include three parts – botmaster, command and control (C&C) servers and
bots. The C&C servers receive commands from botmaster and control the distributions of computers
remotely. Bots use DNS to find the positions of C&C server. In this paper, we propose an advanced hybrid
peer-to-peer (P2P) botnet 2.0 (AHP2P botnet 2.0) using web 2.0 technology to hide the instructions from
botmaster into social sites, which are regarded as C&C servers. Servent bots are regarded as sub-C&C
servers to get the instructions from social sites. The AHP2P botnet 2.0 can evaluate the performance of
servent bots, reduce DNS traffics from bots to C&C servers, and achieve harder detection bots actions than
IRC-based botnets over the Internet.
1 INTRODUCTION
The Internet is a communication infrastructure that
interconnects the global community of end users and
content servers. In recent years, malware attacks
become more serious over the Internet by e-mail,
denial of service (DoS) or distributed denial of
service (DDoS). The Botnets become a significant
part of the Internet malware attacks.
The traditional botnets consist of three parts -
botmaster, command and control (C&C) servers and
bots. (1) The botmaster sends commands to C&C
servers and do malware attacks. (2) The C&C
servers receive commands from botmaster and
control the distributions of computers remotely. (3)
Bots use DNS to find the positions of C&C server,
and then communicate with C&C servers,
periodically. However, the C&C server is easily
detected or blocked by network manager or firewall
in that the C&C server is a bottleneck in traditional
botnets. Morales et al. (2009) analyze the DNS
traffic to find infected hosts when the infected hosts
first join a botnet. Peer-to-peer (P2P) botnets consist
of three parts – botmaster, servent bots and client
bots. The P2P botnets are distinctive from traditional
botnets in that there is no central C&C server for a
P2P botnet.
The current researchers have focused on
monitoring and detecting the traffic of existing bot-
nets. Jang et al. (2009) and Grizzard et al. (2007)
monitored the Waldac and the Trojan.Peacomm
botnet traffic to detect malicious peer-to-peer botnet,
respectively. Chang et al. (2009) discussed some
mechanisms to detect the existing P2P botnets. Jian
et al. (2010) proposed a neighbour list selecting
mechanism to decrease the connection time from
control nodes to bots in P2P Botnet. Some of
researchers presented specific peer-to-peer botnets
(Wang, Sparks, Zou, 2010; Xie and Tan, 2009;
Hung and Tan, 2009) that they are harder to be
monitor than traditional botnets.
The social websites use Web 2.0 technology to
interact and collaborate with each other in virtual
community, such as blog, video sharing, instant
messaging. Nguyen and Josef (2009) named Bot 2.0
the bots that use Web 2.0 communication methods,
such as when the attacker uses public blog service as
an information temporary storage for C&C server.
Therefore, the motivation of this paper is to
reduce the DNS traffics from bots to C&C servers
and achieve harder detection than traditional botnets
over the Internet. To achieve this, we use social
websites regarded as C&C server to hide the
encryption malware information and index factors to
select the candidates of servent bots. Then, P2P
botnet 2.0 mechanism is applied for botnet structure
to achieve harder detection.
The paper is organized as follows: Section 2 pre-
273
Lu T., Liao H. and Chen M..
AN ADVANCED HYBRID P2P BOTNET 2.0.
DOI: 10.5220/0003504102730276
In Proceedings of the 13th International Conference on Enterprise Information Systems (ICEIS-2011), pages 273-276
ISBN: 978-989-8425-55-3
Copyright
c
2011 SCITEPRESS (Science and Technology Publications, Lda.)