DocumentCode :
3516225
Title :
On the effectiveness of structural detection and defense against P2P-based botnets
Author :
Ha, Duc T. ; Yan, Guanhua ; Eidenbenz, Stephan ; Ngo, Hung Q.
Author_Institution :
Dept. of Comput. Sci. & Eng., Univ. at Buffalo, Buffalo, NY, USA
fYear :
2009
fDate :
June 29 2009-July 2 2009
Firstpage :
297
Lastpage :
306
Abstract :
Recently, peer-to-peer (P2P) networks have emerged as a covert communication platform for malicious programs known as bots. As popular distributed systems, they allow bots to communicate easily while protecting the botmaster from being discovered. Existing work on P2P-based botnets mainly focuses on measurement-based studies of botnet behaviors. In this work, through simulation, we study extensively the structure of P2P networks running Kademlia, one of a few widely used P2P protocols in practice. Our simulation testbed not only incorporates the actual code of a real Kademlia client software to achieve high realism, but also applies distributed event-driven simulation techniques to achieve high scalability. Using this testbed, we analyze the scaling, clustering, reachability, and various centrality properties of P2P-based botnets from a graph-theoretical perspective. We further demonstrate experimentally and theoretically that monitoring bot activities in a P2P network is difficult, suggesting that the P2P mechanism indeed helps botnets hide their communication effectively. Finally, we evaluate the effectiveness of some potential mitigation techniques, such as content poisoning, sybil-based and eclipse-based mitigation. Conclusions drawn from this work shed light on the structure of P2P botnets, how to monitor bot activities in P2P networks, and how to mitigate botnet operations effectively.
Keywords :
peer-to-peer computing; protocols; telecommunication security; Kademlia P2P protocol; P2P-based botnet; botmaster protection; covert communication platform; distributed system; malicious program; peer-to-peer network; structural detection; Bluetooth; Cellular phones; Computer worms; IP networks; Information security; Laboratories; Mathematical model; Personal digital assistants; Sequential analysis; Statistical analysis; Botnets; Kademlia; mitigation; monitoring; structural analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Dependable Systems & Networks, 2009. DSN '09. IEEE/IFIP International Conference on
Conference_Location :
Lisbon
Print_ISBN :
978-1-4244-4422-9
Electronic_ISBN :
978-1-4244-4421-2
Type :
conf
DOI :
10.1109/DSN.2009.5270322
Filename :
5270322
Link To Document :
بازگشت