Walowdac - Analysis of a Peer-to-Peer Botnet

Ben Stock, Jan Göbel, Markus Engelberth, F. Freiling, Thorsten Holz
{"title":"Walowdac - Analysis of a Peer-to-Peer Botnet","authors":"Ben Stock, Jan Göbel, Markus Engelberth, F. Freiling, Thorsten Holz","doi":"10.1109/EC2ND.2009.10","DOIUrl":null,"url":null,"abstract":"A botnet is a network of compromised machines under the control of an attacker. Botnets are the driving force behind several misuses on the Internet, for example spam mails or automated identity theft. In this paper, we study the most prevalent peer-to-peer botnet in 2009: Waledac. We present our in ltration of the Waledac botnet, which can be seen as the successor of the Storm Worm botnet. To achieve this we implemented a clone of the Waledac bot named Walowdac. It implements the communication features of Waledac but does not cause any harm, i.e., no spam emails are sent and no other commands are executed. With the help of this tool we observed a minimum daily population of 55,000 Waledac bots and a total of roughly 390,000 infected machines throughout the world. Furthermore, we gathered internal information about the success rates of spam campaigns and newly introduced features like the theft of cre- dentials from victim machines.","PeriodicalId":269435,"journal":{"name":"2009 European Conference on Computer Network Defense","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"102","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 European Conference on Computer Network Defense","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EC2ND.2009.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 102

Abstract

A botnet is a network of compromised machines under the control of an attacker. Botnets are the driving force behind several misuses on the Internet, for example spam mails or automated identity theft. In this paper, we study the most prevalent peer-to-peer botnet in 2009: Waledac. We present our in ltration of the Waledac botnet, which can be seen as the successor of the Storm Worm botnet. To achieve this we implemented a clone of the Waledac bot named Walowdac. It implements the communication features of Waledac but does not cause any harm, i.e., no spam emails are sent and no other commands are executed. With the help of this tool we observed a minimum daily population of 55,000 Waledac bots and a total of roughly 390,000 infected machines throughout the world. Furthermore, we gathered internal information about the success rates of spam campaigns and newly introduced features like the theft of cre- dentials from victim machines.
Walowdac -点对点僵尸网络的分析
僵尸网络是攻击者控制下的受感染计算机网络。僵尸网络是互联网上一些滥用行为背后的驱动力,例如垃圾邮件或自动身份盗窃。本文研究了2009年最流行的点对点僵尸网络:Waledac。我们介绍了我们的渗透Waledac僵尸网络,它可以被视为风暴蠕虫僵尸网络的继承者。为了实现这一点,我们实现了Waledac bot的克隆,名为Walowdac。它实现了Waledac的通信特性,但不会造成任何危害,即不会发送垃圾邮件,也不会执行其他命令。在这个工具的帮助下,我们观察到全世界每天至少有55000个Waledac机器人和大约390,000个受感染的机器。此外,我们还收集了有关垃圾邮件活动成功率的内部信息和新引入的功能,如从受害机器窃取证书。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信