Peer-to-peer botnets: overview and case study

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

Peer-to-peer botnets: overview and case study
TimelineP2P.png
Botnet
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol P2P
Date 2007 / 2007
Editor/Conference Usenix
Link http://static.usenix.org/event/hotbots07/tech/full papers/grizzard/grizzard.pdf usenix.org (usenix.org Archive copy)
Author Julian B. Grizzard, Vikram Sharma, Chris Nunnery, Brent ByungHoon Kang, David Dagon
Type

Abstract

Botnets have recently been identified as one of the most important threats to the security of the Internet. Traditionally, botnets organize themselves in an hierarchical manner with a central command and control location. This location can be statically defined in the bot, or it can be dynamically defined based on a directory server. Presently, the centralized characteristic of botnets is useful to security professionals because it offers a central point of failure for the botnet. In the near future, we believe attackers will move to more resilient architectures. In particular, one class of botnet structure that has entered initial stages of development is peer-to-peer based architectures. In this paper, we present an overview of peer-to-peer botnets. We also present a case study of a Kademlia-based Trojan.Peacomm bot. http://static.usenix.org/event/hotbots07/tech/

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2007BFR917,
   editor = {Usenix},
   author = {Julian B. Grizzard, Vikram Sharma, Chris Nunnery, Brent ByungHoon Kang, David Dagon},
   title = {Peer-to-peer botnets: overview and case study},
   date = {24},
   month = Apr,
   year = {2007},
   howpublished = {\url{http://static.usenix.org/event/hotbots07/tech/full_papers/grizzard/grizzard.pdf usenix.org}},
 }