Junfeng Yu, Zhitang Li, Jun Hu, Feng Liu, Lingyun Zhou
{"title":"利用仿真表征点对点僵尸网络的拓扑结构","authors":"Junfeng Yu, Zhitang Li, Jun Hu, Feng Liu, Lingyun Zhou","doi":"10.1109/ICCMS.2009.61","DOIUrl":null,"url":null,"abstract":"Future network intruders are constantly changing, improving and extending the capabilities of their botnets. Peer to peer bots are now under widespread development and are quickly evolving into a much tougher species to kill. However, partly due to the lack of understanding of the structural potential of command and control mechanism a botnets can have, countering peer to peer botnets has been ineffective. In this paper, we explore the characteristic of communication networks created by peer to peer botnets. We propose a simulation approach to characterize the structural properties and robustness of P2P botnets, corresponding to different paradigms of forming botnets. Through calculation and simulation for topology construction procedures, we show that extremely resilient peer to peer botnets can be formed to deliver attack code quickly. Such a theory would help predict botnets containment for a given topology and help develop strategies to improve defense against P2P botnets, because applying those strategies can always translate into some network topology transformation.","PeriodicalId":325964,"journal":{"name":"2009 International Conference on Computer Modeling and Simulation","volume":"110 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Using Simulation to Characterize Topology of Peer to Peer Botnets\",\"authors\":\"Junfeng Yu, Zhitang Li, Jun Hu, Feng Liu, Lingyun Zhou\",\"doi\":\"10.1109/ICCMS.2009.61\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Future network intruders are constantly changing, improving and extending the capabilities of their botnets. Peer to peer bots are now under widespread development and are quickly evolving into a much tougher species to kill. However, partly due to the lack of understanding of the structural potential of command and control mechanism a botnets can have, countering peer to peer botnets has been ineffective. In this paper, we explore the characteristic of communication networks created by peer to peer botnets. We propose a simulation approach to characterize the structural properties and robustness of P2P botnets, corresponding to different paradigms of forming botnets. Through calculation and simulation for topology construction procedures, we show that extremely resilient peer to peer botnets can be formed to deliver attack code quickly. Such a theory would help predict botnets containment for a given topology and help develop strategies to improve defense against P2P botnets, because applying those strategies can always translate into some network topology transformation.\",\"PeriodicalId\":325964,\"journal\":{\"name\":\"2009 International Conference on Computer Modeling and Simulation\",\"volume\":\"110 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-02-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Computer Modeling and Simulation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCMS.2009.61\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Computer Modeling and Simulation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMS.2009.61","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Using Simulation to Characterize Topology of Peer to Peer Botnets
Future network intruders are constantly changing, improving and extending the capabilities of their botnets. Peer to peer bots are now under widespread development and are quickly evolving into a much tougher species to kill. However, partly due to the lack of understanding of the structural potential of command and control mechanism a botnets can have, countering peer to peer botnets has been ineffective. In this paper, we explore the characteristic of communication networks created by peer to peer botnets. We propose a simulation approach to characterize the structural properties and robustness of P2P botnets, corresponding to different paradigms of forming botnets. Through calculation and simulation for topology construction procedures, we show that extremely resilient peer to peer botnets can be formed to deliver attack code quickly. Such a theory would help predict botnets containment for a given topology and help develop strategies to improve defense against P2P botnets, because applying those strategies can always translate into some network topology transformation.