A Research on New Type of P2P Based Botnet

Article Preview

Abstract:

This research points out the negative effects given by malware attacks first, then put forward that the botnet is the major threaten to the network security especially the new hybrid P2P based botnet. The research mainly focuses on introducing the mechanism of this new type botnet and proposes the defense method in order to construct a safe network platform.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2208-2211

Citation:

Online since:

January 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] S. Kandula, D. Katabi, M. Jacob, and A. Berger, Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds, in 2nd Symposium on Networked Systems Design and Implementation (NSDI), May (2005).

Google Scholar

[2] Information on http: /www. cnn. com/2006/TECH/internet/01/31/furst.

Google Scholar

[3] F. Freiling, T. Holz, and G. Wicherski, Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks, CS Dept. of RWTH Aachen University, Tech. Rep. AIB-2005-07, April (2005).

DOI: 10.1007/11555827_19

Google Scholar

[4] D. Dagon, C. Zou, and W. Lee, Modeling botnet propagation using time zones, in Proceedings of 13th Annual Network and Distributed System Security Symposium (NDSS), Feburary 2006, pp.235-249.

Google Scholar

[5] A. Ramachandran, N. Feamster, and D. Dagon, Revealing botnet membership using dnsbl counter-intelligence, in USENIX 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI 06), June (2006).

DOI: 10.1007/978-0-387-68768-1_7

Google Scholar

[6] E. Cooke, F. Jahanian, and D. McPherson, The zombie roundup: Understanding, detecting, and disrupting botnets, in Proceedings of SRUTI: Steps to Reducing Unwanted Traffic on the Internet, July (2005).

Google Scholar

[7] J. R. Binkley and S. Singh, An algorithm for anomaly-based botnet detection, in USENIX 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI 06), June (2006).

Google Scholar

[8] Information on http: /en. wikipedia. org/wiki/Servent.

Google Scholar

[9] Steven C, Gustufson, Robust estimation of mahalanobis distance in hyper-spectral images [J], Air-Force Institute of Technology, (2006).

Google Scholar

[10] Matthias R H, Holz H T. Towards next-generation botnets[C], 2008 European Conference on Computer Network Defense, Dublin, 2008: 33-40.

DOI: 10.1109/ec2nd.2008.11

Google Scholar

[11] B. McCarty, Botnets: Big and bigger, IEEE Security & Privacy Magazine, Vol. 1, No. 4, July (2003).

Google Scholar

[12] C. Zou and R. Cunningham, Honeypot-aware advanced botnet construction and maintenance, in Proceedings of International Conference on Dependable Systems and Networks (DSN), June (2006).

DOI: 10.1109/dsn.2006.38

Google Scholar

[13] T. Strayer. (2006) Detecting botnets with tight command and control. ARO/DARPA/DHS Special Workshop on Botnet.

Google Scholar

[14] Y. Chen, (2006) IRC-based botnet detection on high-speed routers, ARO/DARPA/DHS Special Workshop on Botnet.

Google Scholar

[15] P. Barford and V. Yegneswaran, An inside Look at Botnets, To appear in Series: Advances in Information Security. Springer, (2006).

DOI: 10.1007/978-0-387-44599-1_8

Google Scholar

[16] R. Vogt, J. Aycock, and M. Jacobson, Army of botnets, " in Proceedings of 14th Annual Network and Distributed System Security Symposium (NDSS)", month = "Feburary", year="2007.

Google Scholar