Peer-to-peer botnets: overview and case study

  • Authors:
  • Julian B. Grizzard;Vikram Sharma;Chris Nunnery;Brent ByungHoon Kang;David Dagon

  • Affiliations:
  • The Johns Hopkins University, Applied Physics Laboratory;University of North Carolina at Charlotte;University of North Carolina at Charlotte;University of North Carolina at Charlotte;Georgia Institute of Technology

  • Venue:
  • HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Botnets have recently been identified as one of the most important threats to the security of the Internet. Traditionally, botnets organize themselves in an hierarchical manner with a central command and control location. This location can be statically defined in the bot, or it can be dynamically defined based on a directory server. Presently, the centralized characteristic of botnets is useful to security professionals because it offers a central point of failure for the botnet. In the near future, we believe attackers will move to more resilient architectures. In particular, one class of botnet structure that has entered initial stages of development is peer-to-peer based architectures. In this paper, we present an overview of peer-to-peer botnets. We also present a case study of a Kademlia-based Trojan.Peacomm bot.