DocumentCode
1847771
Title
Analysis of HTTP2P botnet: case study waledac
Author
Jang, Dae-il ; Kim, Minsoo ; Jung, Hyun-Chul ; Noh, Bong-Nam
Author_Institution
Syst. Security Res. Center, Chonnam Nat. Univ., Gwangju, South Korea
fYear
2009
fDate
15-17 Dec. 2009
Firstpage
409
Lastpage
412
Abstract
Malicious botnet is evolving very quickly and using the many ways to evade detection system. The change of protocol is the most important part of the malicious botnet´s evolution and evasion techniques. The initial malicious botnet was using the IRC protocol for communication between the command and contorl server and the zombie system. After that they use the HTTP protocol on the firewall-friendly and the P2P protocol to escape a Client/Server architecture. Because Many researchers studied malicious HTTP or P2P botnet for detection, the malicious botnet began to use the distorted communication method called HTTP2P. In this paper, we study the malicious HTTP2P botnet, and we will give to help malicious HTTP2P botnet detection by analyzing waledac botnet.
Keywords
client-server systems; peer-to-peer computing; security of data; transport protocols; HTTP protocol; HTTP2P botnet; IRC protocol; P2P protocol; Waledac case study; client-server architecture; distorted communication method; malicious botnet; zombie system; Communication system security; Information analysis; Information security; Internet; National security; Network servers; Protocols; Telecommunication traffic; Topology; Web server; Analysis; Botnet; Detection; HTTP2P; Waledac;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications (MICC), 2009 IEEE 9th Malaysia International Conference on
Conference_Location
Kuala Lumpur
Print_ISBN
978-1-4244-5531-7
Type
conf
DOI
10.1109/MICC.2009.5431541
Filename
5431541
Link To Document