DocumentCode :
1847771
Title :
Analysis of HTTP2P botnet: case study waledac
Author :
Jang, Dae-il ; Kim, Minsoo ; Jung, Hyun-Chul ; Noh, Bong-Nam
Author_Institution :
Syst. Security Res. Center, Chonnam Nat. Univ., Gwangju, South Korea
fYear :
2009
fDate :
15-17 Dec. 2009
Firstpage :
409
Lastpage :
412
Abstract :
Malicious botnet is evolving very quickly and using the many ways to evade detection system. The change of protocol is the most important part of the malicious botnet´s evolution and evasion techniques. The initial malicious botnet was using the IRC protocol for communication between the command and contorl server and the zombie system. After that they use the HTTP protocol on the firewall-friendly and the P2P protocol to escape a Client/Server architecture. Because Many researchers studied malicious HTTP or P2P botnet for detection, the malicious botnet began to use the distorted communication method called HTTP2P. In this paper, we study the malicious HTTP2P botnet, and we will give to help malicious HTTP2P botnet detection by analyzing waledac botnet.
Keywords :
client-server systems; peer-to-peer computing; security of data; transport protocols; HTTP protocol; HTTP2P botnet; IRC protocol; P2P protocol; Waledac case study; client-server architecture; distorted communication method; malicious botnet; zombie system; Communication system security; Information analysis; Information security; Internet; National security; Network servers; Protocols; Telecommunication traffic; Topology; Web server; Analysis; Botnet; Detection; HTTP2P; Waledac;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications (MICC), 2009 IEEE 9th Malaysia International Conference on
Conference_Location :
Kuala Lumpur
Print_ISBN :
978-1-4244-5531-7
Type :
conf
DOI :
10.1109/MICC.2009.5431541
Filename :
5431541
Link To Document :
بازگشت