160 likes | 263 Views
Towards Complete Node Enumeration in a Peer-to-Peer Botnet. REFERENCES. Towards complete node enumeration in a peer-to-peer botnet
E N D
REFERENCES • Towards complete node enumeration in a peer-to-peer botnet B. Kang, E. Chan-Tin, C. Lee, J. Tyra, H. Kang, C. Nunnery, Z. Wadler, G. Sinclair, N. Hopper, D. Dagon, and Y. Kim..In ACM Symposium on Information, Computer & Communication Security (ASIACCS 2009), 2009.
INTRODUCTION • PPM-Passive P2P Monitor -collection of a “routing only” nodes in the P2P network • FWC-FireWall Checker -send back two query packets one from the sensor and one from another IP • Storm Botnet -Overnet Protocol • Crawler -sending look-up requests -get-peerlist protocol
ARCHITECTURE • Expected Problems and Fixes -PPM cannot identify a new node, if Storm botnet does not send messages to it -PPMis its lack of source address spoofing detection
ARCHITECTURE • Implementation Details 1. A Storm node in the bot network sends a request to one of our PPM 2. PPM replies to the request and sends another request to that Storm node 2’. At the same time, PPM also sends a message to FWC telling it to send a similar request to that Storm node 2”. Upon receiving this message, FWC sends a request to the same Storm node (same request that PPMsent to that Storm node).
ANALYTICAL AND EXPERIMENTAL RESULTS • Experimental Settings -PPM nodes, the FWC, and a P2P network crawler -deployed 256 PPM nodes -collected from 20 days -deployed 16 virtual machines infected each of them with Storm
ANALYTICAL AND EXPERIMENTAL RESULTS • Probability of PPM receiving a random message -Search is a message used in routing to find the replica roots - GetSearchResult is a message sent to possible replica roots to get the actual result -Publish is a message meant to publish binding information
CONCLUSION • PPM as an enumeration method for the Storm peer-to-peer botnet is efficient • analyzed the differences in enumeration results from the PPM and a crawler