180 likes | 193 Views
This presentation explores the threat of botnets and the different types of bots used, focusing on the Mosquito Breeding Attack which combines both centralized and peer-to-peer architectures. The simulation demonstrates the bot conversion process and the advantages of this hybrid approach.
E N D
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA
INTRODUCTION • Major threat to the security of internet • Botnet is a collection of compromised computer under a control of single identity known as the bot controller • Botnet uses vulnerability like other malwares to infect other machines in the network • Different types of bots: Agobot, Sdbot, Spybot, GTbot
HOW BOTNETS WORK • A botnet operator sends worm continuously infecting ordinary users • The bot on the infected PC logs into a web server called Command & Control server(C&C) • The botnet operator send instructions via server to the infected PC’s • Used as a platform for DDOS and Spam attacks
Different types of Bot communication • Centralized Communication Group of bots connected to C&C server Weaknesses: • They can be easier because many clients connect the same point • Discovery of the central location can compromise the whole system
botmaster C&C C&C bot bot bot Centralized Botnet
Hybrid P2P Botnet • Decentralized communication: Each bots connected to its peer list Only servent bots are in the peer list • Weaknesses: Even though defenders may not be able to capture a botnet sensor before its botmaster destroying the sensor (after completing botmaster's monitoring task), they still could use the captured traffic log to figure out the IP addresses of potential bots who contacted the sensor in the past
Servent bots Client bots Hybrid P2P Botnet Hybrid P2P
Mosquito Breeding Attack • New attack using both Peer2Peer architecture and centralized architecture • A centralized bots will generate many P2P bots inside the internet • These P2P bots will start a separate network and get new peers for its new network
Mosquito Breeding Attack C&C BOTS
Mosquito Breeding Attack C&C BOTS
SIMULATION • Platform: Windows/Linux • Tools: Eclipse • Source Code: Java/Applet • File: Random.java
Algorithm • Step1: Simulate Arbitrary Servers/Attackers • Step2: Simulate Random Number Of clients(bots) • Step3: Generate Botnet attacks from the attackers to the client • Step4: The server loads the code into any randomly chosen client • Step5: The client inturn becomes the server • Step6: New bot continues breeding the code among the new clients
Bot Conversion Model • Bots gets converted from client to server is identified • Time taken for each bot to change from client to server is calculated • A graph is drawn using bots in the X-axis and time taken for conversion in the Y-axis
Botnet Conversion Study Conversion time in seconds Number of Bots converted from clients to servers
ADVANTAGES • To overcome the problem of C&C center in botnet • Capturing of one C&C doesn’t affect the architecture • It works independently • More robust and more probing
CONCLUSION • This shows how bots may work in the future • We have shown by simulation how attack propagate • We have also shown the conversion time of bots into c&c server