160 likes | 292 Views
A Hierarchical Hybrid Structure for Botnet Control and Command Zhiqi Zhang , Baochen Lu , Peng L iao , Chaoge Liu , Xiang Cui - Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conference . Speaker : Yi-Ting Tsai Date : 102.11.7. Outline .
E N D
A Hierarchical Hybrid Structure for Botnet Control and Command Zhiqi Zhang , Baochen Lu , Peng Liao , Chaoge Liu , Xiang Cui - Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conference Speaker : Yi-Ting Tsai Date : 102.11.7
Outline • Centralized Botnet • P2P Botnet • Hyprid P2P Botnet • Hierechical hybrid Botnet • Robustness Simulation • Defense against the proposed Botnet • Conclusion
Characteristics: • relay on C&C Servers • Weakness: • single-failure • Example: • AgoBot , SDBot , SpyBot
P2P Botnet • Kademlia-based protocol • Example : Slapper botnets -- -- • Bootstrap failure • Sybil attack -- -- -- -- • random probing protocol • Example : Sinit botnets • Extensive abnormal traffic -- -- • Sybil attack
---- Servent bots (server+client) ---- • servent bots :static global IP • slave bots:dynamic private IP ---- ---- ---- Peer list --------- --------- Slave bots (client) • Weakness: • Sybil attack • communication between clients Servent bots IP ---- ----
Servent bots (server+client) • Hierechical hybrid Botnet • 1 . Resolve -- • Sybil attack • communication between clients Slave bots (client) 2 . Difficult to be shut down 3 . Keep botnet under control
No • detect • No • hijacking • No • Sybil attack • Advanced • bootstrap process Poll fail Poll fail 2 failure 1 failure N-1 failure 0 failure Poll succeed Poll succeed Poll fail Poll succeed 0 failure N failure 0 failure N-1 failure 2 failure N failure 1 failure Poll fail Delete
No • detect • No • hijacking • No • Sybil attack • Advanced • bootstrap process Peer list 0 failure 1 failure < IP , port > . . . . N failure
No • detect • No • hijacking • No • Sybil attack • Advanced • bootstrap process Peer list • Random serviceport 0 failure < IP , port > • + • Data encryption 1 failure . . . . • || • Perfect ! N failure
No • detect • No • hijacking • No • Sybil attack • Advanced • bootstrap process • Communication Encryption Private key • One-time padding Public key Public key • Command Authentication Private key Private key • Private key signature Public key
Robustness Simulation Definition : the probability that a botnet remains connected together after a fraction of bots are removed. G = ( V , E ) V : bots
Simulation settings Servent bots : 25% Maximum size of botnets : 10000 Peer list () : 20 • igraph library • Network Workbench • Tool
Peer list size and Robustness Servent bots : 25% Maximum size of botnets : 10000 Bots to removed ( P ) = 95%
Defense against the proposed Botnet • Host-based Detection • Signature-based malware detection • Behavior-based detection • Honeypot-based Monitoring
Conclusion • Hierarchical hybrid p2p botnet • an advanced peer list • It can defend against Sybil attacks • Weakness : • very high complexity • very high latency