DocumentCode
565392
Title
Case study of the Miner Botnet
Author
Plohmann, Daniel ; Gerhards-Padilla, Elmar
Author_Institution
Cyber Defense Res. Group, Fraunhofer FKIE, Wachtberg, Germany
fYear
2012
fDate
5-8 June 2012
Firstpage
1
Lastpage
16
Abstract
Malware and botnets are one of the most serious threats to today´s Internet security. In this paper, we characterise the so-called &Miner Botnet”. It received major media attention after massive distributed denial of service attacks against a wide range of German and Russian websites, mainly during August and September 2011. We use our insights on this botnet to outline current botnet-related money-making concepts and to show that multiple activities of this botnet are actually centred on the virtual anonymised currency Bitcoin, thus justifying the name. Furthermore, we provide a binary-level analysis of the malware´s design and components to illustrate the modularity of the previously mentioned concepts. We give an overview of the structure of the command-and-control protocol as well as of the botnet´s architecture. Both centralised as well as distributed infrastructure aspects realised through peer-to-peer are present to run the botnet, the latter for increasing its resiliency. Finally, we provide the results of our ongoing tracking efforts that started in September 2011, focusing on the development of the botnet´s size and geographic distribution. In addition we point out the challenge that is generally connected with size measurements of botnets due to the reachability of individual nodes and the persistence of IP addresses over time.
Keywords
IP networks; Internet; Web sites; command and control systems; computer network security; invasive software; peer-to-peer computing; protocols; Bitcoin; German Web sites; IP addresses; Internet security; Miner Botnet; Russian Web sites; binary-level analysis; botnet architecture; botnet-related money-making concepts; command and control protocol; geographic distribution; malware design; massive distributed denial of service attacks; peer-to-peer network; size distribution; size measurements; virtual anonymised currency; Computer crime; IP networks; Internet; Malware; Peer to peer computing; Protocols; Servers; botnet analysis; cybercrime; miner botnet;
fLanguage
English
Publisher
ieee
Conference_Titel
Cyber Conflict (CYCON), 2012 4th International Conference on
Conference_Location
Tallinn
Print_ISBN
978-1-4673-1270-7
Type
conf
Filename
6243985
Link To Document