• DocumentCode
    160675
  • Title

    Statistical Assessment of Sybil-Placement Strategies within DHT-Structured Peer-to-Peer Botnets

  • Author

    Arora, D. ; Verigin, Adam ; Godkin, Teghan ; Neville, Stephen

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Univ. of Victoria, Victoria, BC, Canada
  • fYear
    2014
  • fDate
    13-16 May 2014
  • Firstpage
    821
  • Lastpage
    828
  • Abstract
    Botnets are a well recognized global cyber-security threat as they enable attack communities to command large collections of compromised computers (bots) on-demand. Peer to-peer (P2P) distributed hash tables (DHT) have become particularly attractive botnet command and control (C & C) solutions due to the high level resiliency gained via the diffused random graph overlays they produce. The injection of Sybils, computers pretending to be valid bots, remains a key defensive strategy against DHT-structured P2P botnets. This research uses packet level network simulations to explore the relative merits of random, informed, and partially informed Sybil placement strategies. It is shown that random placements perform nearly as effectively as the tested more informed strategies, which require higher levels of inter-defender co-ordination. Moreover, it is shown that aspects of the DHT-structured P2P botnets behave as statistically nonergodic processes, when viewed from the perspective of stochastic processes. This suggests that although optimal Sybil placement strategies appear to exist they would need carefully tuning to each specific P2P botnet instance.
  • Keywords
    command and control systems; computer network security; invasive software; peer-to-peer computing; statistical analysis; stochastic processes; C&C solutions; DHT-structured P2P botnets; DHT-structured peer-to-peer botnets; Sybil placement strategy statistical assessment; botnet command and control solution; compromised computer on-demand collections; cyber security threat; diffused random graph; interdefender coordination; packet level network simulation; peer-to-peer distributed hash tables; stochastic process; Computational modeling; Computers; Internet; Network topology; Peer-to-peer computing; Routing; Topology;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on
  • Conference_Location
    Victoria, BC
  • ISSN
    1550-445X
  • Print_ISBN
    978-1-4799-3629-8
  • Type

    conf

  • DOI
    10.1109/AINA.2014.100
  • Filename
    6838749