A Taxonomy of Botnets

نویسندگان

  • David Dagon
  • Guofei Gu
  • Cliff Zou
  • Julian Grizzard
  • Sanjeev Dwivedi
  • Wenke Lee
  • Richard Lipton
چکیده

Attackers are increasingly using large networks of compromised machines to carry out further attacks (e.g., using botnets, or enormous groups of compromised hosts under the control of a single attacker). We consider the problem of responding to entire networks of attacking computers. We identify key metrics for measuring the utility of a botnet, and describe various topological structures they may use to coordinate attacks. Using the performance metrics, we consider the ability of different response techniques to degrade or disrupt botnets. Our models show that for scale free botnets, targeted responses are particularly effective. Further, botmasters’ efforts to improve the robustness of scale free networks comes at a cost of diminished transitivity. Botmasters do not appear to have any structural solutions to this problem in scale free networks. Our models also show that random graph botnets (e.g., those using structured P2P formations) are highly resistant to both random and targeted responses. This suggests the urgent need for further research into response strategies. We validated our model on a particular class of botnets using star topologies. After tracking dozens of botnets over months, we located and performed a targeted response on a very large (100K member) botnet. This resulted in an over 90% reduction in the botnet population, and confirmed the utility of our taxonomy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues

The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. The implications of botnets have inspired attention from the academia and the industry alike, which includes vendors, investors, hackers, and researcher community. Above all, the capability of botnets is uncovered through a wide range of malicious activities, such as distributed denial of service ...

متن کامل

A Browser Malware Taxonomy

This restriction of IP space for mail solves one problem but it doesn’t solve others. On the one hand, it makes management of IPs scalable for machines that are bots. Today, most spam is sent from botnets. However, botnets do not always send out all of their spam directly – many bots compromise legitimate mail hosts or email accounts and send out spam that way, or create a throwaway account at ...

متن کامل

Botnet Detection by Monitoring Similar Communication Patterns

Botnet is most widespread and occurs commonly in today‘s cyber attacks, resulting in serious threats to our network assets and organization’s properties. Botnets are collections of compromised computers (Bots) which are remotely controlled by its originator (BotMaster) under a common Command-andControl (C&C) infrastructure. They are used to distribute commands to the Bots for malicious activiti...

متن کامل

BotOnus: an online unsupervised method for Botnet detection

Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...

متن کامل

A Comprehensive Measurement Study of Domain Generating Malware

Recent years have seen extensive adoption of domain generation algorithms (DGA) by modern botnets. The main goal is to generate a large number of domain names and then use a small subset for actual C&C communication. This makes DGAs very compelling for botmasters to harden the infrastructure of their botnets and make it resilient to blacklisting and attacks such as takedown efforts. While early...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005