Overcoming reputation and proof-of-work systems in botnets

From Botnets.fr
Revision as of 17:14, 5 February 2012 by Eric.freyssinet (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

Overcoming reputation and proof-of-work systems in botnets
Botnet Storm
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2010 / NSS 2010
Editor/Conference IEEE
Link http://eprints.qut.edu.au/35657/ eprints.qut.edu.au (eprints.qut.edu.au Archive copy)
Author Andrew White, Alan Tickle, Andrew Clark
Type

Abstract

Reputation and proof-of-work systems have been outlined as methods bot masters will soon use to defend their

peer-to-peer botnets. These techniques are designed to prevent sybil attacks, such as those that led to the downfall of the Storm botnet. To evaluate the effectiveness of these techniques, a botnet that employed these techniques was simulated, and the amount of resources required to stage a successful sybil attack against it measured. While the proof-of-work system was found to increase the resources required for a successful sybil attack, the reputation system was found to lower the amount of resources required to disable the botnet.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2010BFR858,
   editor = {IEEE},
   author = {Andrew White, Alan Tickle, Andrew Clark},
   title = {Overcoming reputation and proof-of-work systems in botnets},
   date = {Error: Invalid time.},
   month = Error: Invalid time.,
   year = {2010},
   howpublished = {\url{http://eprints.qut.edu.au/35657/ eprints.qut.edu.au}},
 }