Peer-to-peer botnets: overview and case study
(Publication) Google search: [1]
Peer-to-peer botnets: overview and case study | |
---|---|
![]() | |
Botnet | |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | P2P |
Date | 2007 / 2007 |
Editor/Conference | Usenix |
Link | http://static.usenix.org/event/hotbots07/tech/full papers/grizzard/grizzard.pdf usenix.org (usenix.org Archive copy) |
Author | Julian B. Grizzard, Vikram Sharma, Chris Nunnery, Brent ByungHoon Kang, David Dagon |
Type |
Abstract
“ Botnets have recently been identified as one of the most important threats to the security of the Internet. Traditionally, botnets organize themselves in an hierarchical manner with a central command and control location. This location can be statically defined in the bot, or it can be dynamically defined based on a directory server. Presently, the centralized characteristic of botnets is useful to security professionals because it offers a central point of failure for the botnet. In the near future, we believe attackers will move to more resilient architectures. In particular, one class of botnet structure that has entered initial stages of development is peer-to-peer based architectures. In this paper, we present an overview of peer-to-peer botnets. We also present a case study of a Kademlia-based Trojan.Peacomm bot. http://static.usenix.org/event/hotbots07/tech/
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2007BFR917, editor = {Usenix}, author = {Julian B. Grizzard, Vikram Sharma, Chris Nunnery, Brent ByungHoon Kang, David Dagon}, title = {Peer-to-peer botnets: overview and case study}, date = {01}, month = May, year = {2007}, howpublished = {\url{http://static.usenix.org/event/hotbots07/tech/full_papers/grizzard/grizzard.pdf usenix.org}}, }