Study of P2P Botnet
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: Today, centralized botnets are still widely used. In a centralized botnet, bots are connected to several servers (called C&C servers) to obtain commands. This architecture is easy to construct and efficient in distributing botmaster’s commands; however, it has a weak link - the C&C servers. Shutting down those servers would cause all the bots lose contact with their botmaster. In addition, defenders can easily monitor the botnet by creating a decoy to join a specified C&C channel. Today several P2P botnets have emerged Just like P2P networks, which are resilient to dynamic churn (i.e., peers join and leave the system at high rates), P2P botnet communication won’t be disrupted when losing a number of bots. In a P2P botnet, there is no central server, and bots are connected to each other and act as both C&C server and client. P2P botnets have shown advantages over traditional centralized botnets. As the next generation of botnets, they are more robust and difficult for security community to defend. Researchers have started to pay attention to P2P botnets. However, in order to effectively fight against this new form of botnets, enumerating every individual P2P botnet we have seen in the wild is not enough. Instead, we need to study P2P botnets in a systematic way.
Authors and Affiliations
Avadhoot Joshi , Prof. M. S. Chaudhary
Reducing Cross-ISP Traffic in P2P Systems Using Adaptive Search Radius
Peer to Peer communication has become very popular these days .This popularity and increase in P2P traffic has given birth to many internet traffic management problems for service providers. One of these problems...
A Survey on Routing Protocols influencing Mobile Sink in enhancing life time of WSN for Data gathering
Abstract: Wireless Sensor Network is a group of specialized sensors have the ability to sense, monitor, communicate to the neighbors and recording conditions at assorted locations such as temperature, sound, pressure, se...
Cloud Computing: Overview & Utility
Abstract: Cloud computing enables the process of storing documents, files photos online instead of using homecomputer, or webmail or a social networking site. If in an organization, it is desired to use an online i...
Challenges and Issues of Cluster Based Security in MANET
Abstract: Mobile ad-hoc networks are a specific kind of wireless networks that can be quickly deployed without pre- existing infrastructures. Even though there are various studies on cluster based security in MANET but t...
A software tool that provides relevant information for diabetic patients to help prevent diabetic foot[i][u][/u][/i]
Abstract: This project proposes a tool which can be very useful for diabetic patients for preventing diabetic foot. 347 million people worldwide have diabetes and 15% of them have the chance of developing diabetic...