Botnet economics and devising defence schemes from attackers own reward processes

نویسنده

  • L.-F. Pau
چکیده

This paper focuses on botnet economics and design of defensive strategies. It takes the view that by combining scarce information on the attackers’ business models, with rational economic analysis of these business processes, one can identify design rules for economic defense mechanisms which the target can implement, often in a cheap way in addition to technical means. A short survey of game theory in the security area, is followed by a real case of an Internet casino. This leads to develop a model, applicable to this case and others, which is presented first qualitatively then quantitatively. This allows carrying out different analyses based on different equilibrium or termination principles; the ones studied are reward break-even analysis, and Max-Min analysis from game theory, for the target and the attackers. On that basis, a number of specific economic and information led defense strategies are identified which can be further studied using the model and specific adaptations to other data or cases.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Botnet Economics: Uncertainty Matters

Botnets have become an increasing security concern in today’s Internet. Thus far the mitigation to botnet attacks is a never ending arms race focusing on technical approaches. In this paper, we model botnet-related cybercrimes as a result of profit-maximizing decision-making from the perspectives of both botnet masters and renters/attackers. From this economic model, we can understand the effec...

متن کامل

Honeypot detection in advanced botnet attacks

Botnets have become one of the major attacks in current Internet due to their illicit profitable financial gain. Meanwhile, honeypots have been successfully deployed in many computer security defense systems. Since honeypots set up by security defenders can attract botnet compromises and become spies in exposing botnet membership and botnet attacker behaviors, they are widely used by security d...

متن کامل

SMS-Based Mobile Botnet Detection Framework Using Intelligent Agents

Along with increasing security measures in Android platforms, the amount of Android malware that use remote exploits has grown significantly. Using mobile botnets, attackers concentrate on reliable attack vectors such as SMS messages. Short Message Service (SMS) has been increasingly targeted by a number of malicious applications (“apps”) that have the ability to abuse SMS features in order to ...

متن کامل

BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle

Nowadays, botnets are considered as essential tools for planning serious cyberattacks. Botnets are used to perform various malicious activities such as DDoSattacks and sending spam emails. Different approaches are presented to detectbotnets; however most of them may be ineffective when there are only a fewinfected hosts in monitored network, as they rely on similarity in...

متن کامل

Study of DNS Based On the Command and Control

Attackers, in particular botnet controllers, use secret messaging systems to set up large-scale command and control. In order to systematically understand the potential capability of attackers, we investigate the practicable of using domain name service (DNS) as a stealthy botnet command-and-control channel. We explain and quantitatively analyze several techniques that can be used to effectivel...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1309.0522  شماره 

صفحات  -

تاریخ انتشار 2013