Classification of Botnets and Botnet Defense Techniques

Article Preview

Abstract:

As an effective platform for networking attacking, the botnet brings the most serious threats. In this paper, botnets are categorized into three classes based on network structure. They are centralized botnet, distributed (P2P) bornet and hybrid botnet. This paper divides botnet defense techniques into three fields: detection, measurement and restraint. It analyzes each field in detail, and discusses that which defense technique is suitable for what kind of botnet.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1665-1669

Citation:

Online since:

August 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Fang Binxing, Cui Xiang, Wang Wei. Survey of Betnots[J]. Journal of Computer Research and Debelopment, 2011, 48(8): 1315-1331 (in Chinese).

Google Scholar

[2] Ollmann Gunter. Botnet communication topologies. Atlanta, GA: Damballa Inc, Technical Report: 2009-06-04, (2009).

Google Scholar

[3] Wang Ping, Sparks Sherri, Zou Cliff C. An advanced hybrid peer-to-peer botnet. IEEE Transactions on Dependable and Secure Computing, VOL. 7, NO. 2, APRIL-JUNE (2010).

DOI: 10.1109/tdsc.2008.35

Google Scholar

[4] Vogt Ryan, Aycock John, Michael J Jacobson Jr. Army of botnets/Proceedings of the 14th Annual Network and Distributed system Security Symposium. San Diego, USA, 2007: 111-123.

Google Scholar

[5] Ian Clarke, Oskar Sandberg, Brandon Wiley and Theodore W. Hong. Freenet: A distributed anonymous information storage and retrieval system. Lecture Notes in Computer Science, (2009).

DOI: 10.1007/3-540-44702-4_4

Google Scholar

[6] Lance Spitzner. The Honeynet Project: Trapping the Hackers [J]. IEEE Security & privacy, 2003, 1(2): 15-23.

DOI: 10.1109/msecp.2003.1193207

Google Scholar

[7] Baecher P,Koetter M, Holz T, et a1. The nepenthes platform:An efficient approach to collect malware[C]/Proceedings of Int Symp on Recent Advances in Intrusion Detection.Berlin: Springer,2006:165-184.

DOI: 10.1007/11856214_9

Google Scholar

[8] Zhuge Jianwei, Han Xinhui, Zhou Yonglin et al. HoneyBow: an automated malware collection tool based on the high-interaction honeypot principle [J]. Journal on Communications, 2007, 28(12): 8-13 (in Chinese).

Google Scholar

[9] B. Saha and A, Gairola. Botnet: An overview. CERT-In White PaperCIWP-2005-05, (2005).

Google Scholar

[10] Wang Tianzuo, Wang Huaimin, Liu Bo and Shi Peichang. Some Critical Problems of Botnets. Chinese Journal of Computers, 2012, 35(6): 1192-1208 (in Chinese).

DOI: 10.3724/sp.j.1016.2012.01192

Google Scholar

[11] M. Fabian, M. A. Terzis. My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging/Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots 2007), (2007).

Google Scholar

[12] Rajab Moheeb Abu, Zarfoss Jay, Monrose Fabian, Terzis Andreas. A multifaceted approach to understanding the botnet phenomenon/Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement. Rio de Janeriro Brazil, 2006: 41-52.

DOI: 10.1145/1177080.1177086

Google Scholar

[13] Holz Thorsten, Steiner Moritz, Dahl Fredric, Biersack Ernst, Freiling Felix. Measurements and mitigation of peer to peer based botnets: A case study on storm worm/Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats. San Francisco, USA, 2008: NO. 9.

Google Scholar

[14] Stone-Gross Brett, Cova Marco, Cavallaro Lorenzo, Gilbert Bob, Szydlowski Martin, Kemmerer Richard, Kruegel Christopher, Vigna Giovanni. Your botnet is my botnet: Analysis of a botnet takeover/Proceedings of the 16th ACM conference on Computer and Communications Security. Chicago, USA, 2009: 635-647.

DOI: 10.1145/1653662.1653738

Google Scholar

[15] Davis Carlton R, Ferandez Jose M, Neville Stephen, Mchugh Jonh. Sybil attacks as a mitigation strategy against the storm botnet/Proceedings of the 3rd Internal Conference on Malicious and Unwanted Software, Alexandria, USA, 2008: 32-40.

DOI: 10.1109/malware.2008.4690855

Google Scholar

[16] Stock B, Engelberth M, Freiling F C, et al. Walowdac analysis of a peer-to-peer botnet/Proceedings of the 2009 European Conf on Computer Network Defense. Washington,DC: IEEE Computer Society, 2009: 13-20.

DOI: 10.1109/ec2nd.2009.10

Google Scholar