Title :
The New Architecture of P2P-Botnet
Author :
Sun, Donghong ; Li, Xuefeng ; Liu, Wu ; Wu, Jianping
Author_Institution :
Beijing Inst. of Technol., Beijing, China
Abstract :
A widespread botnet is often used to carry cyber attacks, which results in serious threats to networks and properties. The application of combining botnets and P2P technology is powerful but complicated. This paper shows the differences of control mechanisms, running functions and working performance between central-controlled botnets and P2P-conctrolled botnets by analysis of several famous botnets. Futher more, This paper also reseaches on Command-and- Control (C&C) mechanism which works as the core component of botnets´ architecture, giving out the definition and evaluation parameters of this mechanism, finally proposing a new architecture. It is useful to finding vulnerabilities of P2P botnets and guiding defenders to design effective detection and defending methods.
Keywords :
command and control systems; computer crime; peer-to-peer computing; P2P-Botnet architecture; central-controlled botnets; command-and-control mechanism; control mechanisms; cyber attacks; running functions; Command and control systems; Computer architecture; Cryptography; Internet; Protocols; Servers; Command-and-Control; P2P-conctrolled; P2Pbotnet; architecture;
Conference_Titel :
Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second
Conference_Location :
Ballarat, VIC
Print_ISBN :
978-1-4244-8054-8
Electronic_ISBN :
978-0-7695-4186-0
DOI :
10.1109/CTC.2010.16