Study of P2P Botnet

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4

Abstract

 Abstract: Today, centralized botnets are still widely used. In a centralized botnet, bots are connected to several servers (called C&C servers) to obtain commands. This architecture is easy to construct and efficient in distributing botmaster’s commands; however, it has a weak link - the C&C servers. Shutting down those servers would cause all the bots lose contact with their botmaster. In addition, defenders can easily monitor the botnet by creating a decoy to join a specified C&C channel. Today several P2P botnets have emerged Just like P2P networks, which are resilient to dynamic churn (i.e., peers join and leave the system at high rates), P2P botnet communication won’t be disrupted when losing a number of bots. In a P2P botnet, there is no central server, and bots are connected to each other and act as both C&C server and client. P2P botnets have shown advantages over traditional centralized botnets. As the next generation of botnets, they are more robust and difficult for security community to defend. Researchers have started to pay attention to P2P botnets. However, in order to effectively fight against this new form of botnets, enumerating every individual P2P botnet we have seen in the wild is not enough. Instead, we need to study P2P botnets in a systematic way.

Authors and Affiliations

Avadhoot Joshi , Prof. M. S. Chaudhary

Keywords

Related Articles

 AUTOPARK: A Sensor Based, Automated, Secure and Efficient Parking Guidance System

 Nowadays, due to modern and lavish lifestyles people prefer their own vehicles while going anywhere, resulting in increased traffic congestion and parking problems. In this paper, we propose and present a complet...

 Detecting Masquerade in Face Recognition System – A Literature survey

 A masquerader is an (often external) attacker is one who, after succeeding in obtaining a legitimateuser’s credentials, attempts to use the stolen identity to carry out malicious actions.Automatic detection of masq...

Segmentation techniques used image reconigation and SAR Image Processing

Image segmentation is the process of partitioning an image intomultiple segments, so as to changethe representation of an image into something that is more meaningful and easier to analyze.Several generalpurposealgorithm...

A Compound Metric for Identification of Fault Prone Modules

Abstract: Software Quality is a significant non-functional requirement that is not fulfilled by many software products. Faulty modules tend to degrade the software quality which may cause customer’s dissatisfaction. Faul...

 A Short-Normalized Attack Graph Based Approach for Network Attack Analysis

 Abstract: Attack graphs are the graphs which describe attack scenarios, play important roles in analyzing network threats. These attack graphs are able to reveal such potential threats by evaluating the all possibl...

Download PDF file
  • EP ID EP126685
  • DOI 10.9790/0661-16443542
  • Views 110
  • Downloads 0

How To Cite

Avadhoot Joshi, Prof. M. S. Chaudhary (2014).  Study of P2P Botnet. IOSR Journals (IOSR Journal of Computer Engineering), 16(4), 35-42. https://europub.co.uk/articles/-A-126685