Research of Key Nodes of Botnet Based on P2P

Article Preview

Abstract:

The paper applies the segmentation of peer-to- peer network to the defense process of P2P-based botnet, in order to cause the greatest damage on the P2P network. A lot of papers have been researching how to find the key nodes in P2P networks. To solve this problem, this paper proposes distributed detection algorithm NEI and centralized detection algorithm COR for detecting cut vertex, NEI algorithm not only apply to detect cut vertex of directed graph but also to the undirected graph. COR algorithm can reduce the additional communication. Then, this paper carries out simulation on P2P botnet, the simulation results show that the maximum damage on the botnet can be achieved by destructing key nodes.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

386-390

Citation:

Online since:

August 2011

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Ping Wang, Lei Wu, Baber Aslam and Cliff C. Zou, A Systematic Study on Peer-to-peer Botnet.

Google Scholar

[2] T. Holz, M. Steiner, F. Dahl, E.W. Biersack, and F. Freiling, Measurements and mitigation of peer-to-peer-based botnet: A case study on storm worm, In Proc. Of the 1st Usenix Workshop on Large-scale Exploits and Emergent Threats(LEET'08), (2008).

Google Scholar

[3] P. Wang, S. Sparks, and C.C. Zou, An advanced hybrid peer-to-peer botnet, In Proc. Of the 1st USENIX Workshop on Hot Topics in Understanding Botnet(HotBots'07), April (2007).

Google Scholar

[4] I. Arce and E. Levy, An analysis of the slapper worm, IEEE Security & Privacy Magazine, Jan-Feb. (2003).

Google Scholar

[5] Sinit P2P Trojan analysis, Http: /www. lurhq. com/sinit. html.

Google Scholar

[6] Phatbot Trojan analysis, Http: /www. lurhq. com/phatbot. html.

Google Scholar

[7] LI Zhen-Hua, CHEN Gui-Hai, QIU Tong-Qing. Partition Nodes: Topologically-Critical Nodes of Unstructured Peer-to-Peer Networks, Journal of Software, Vol. 19, No. 9, September 2008, pp.2376-2388.

DOI: 10.3724/sp.j.1001.2008.02376

Google Scholar

[8] M A Rajab, F Monrose and A Terzis. On the impact of dynamic addressing on malware propagation. ACM WORM'08. 2006. 51-56.

DOI: 10.1145/1179542.1179554

Google Scholar

[9] YIN Ling-yun, FENG Deng-guo, SU Pu-rui. P2P-Based Super Botnet: Threats and Defenses. Acta Electronica Sinica.

Google Scholar