2019
DOI: 10.1109/access.2019.2906875
|View full text |Cite
|
Sign up to set email alerts
|

A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets

Abstract: Due to the global increase in mobile devices and cellular networks such as 3G, 4G, or LTE-A networks, the concept of the interpenetration of peer-to-peer (P2P) overlay networks in cellular environments has gained immense popularity among mobile users. P2P networks allow users to share their computing resources efficiently with the advantages of fault tolerance, robust connectivity, load balancing, and easy maintenance. The ability of a peer to connect to another peer depends on the distinguishing features of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…Routing table poisoning [22]: Routing protocols maintain routing tables which hold information regarding routes of the network. In routing, table poisoning attack the malicious nodes generate and send fabricated signalling traffic, or modify the legal information from other nodes, to create false routes in the routing tables of the participating nodes.…”
Section: ) Poisoning Methodsmentioning
confidence: 99%
“…Routing table poisoning [22]: Routing protocols maintain routing tables which hold information regarding routes of the network. In routing, table poisoning attack the malicious nodes generate and send fabricated signalling traffic, or modify the legal information from other nodes, to create false routes in the routing tables of the participating nodes.…”
Section: ) Poisoning Methodsmentioning
confidence: 99%
“…A bot-master in P2P botnet recruits new vulnerable hosts (bots) to run malicious software by all kinds of attacking techniques such as Trojan, worms, and virus [2]. A host in P2P botnet can act as a bot-master and a bot, which makes the detection of P2P botnet even more di cult and the e ect of P2P botnet more harmful [3,4]. P2P botnets, such as Peacomm, Storm botnet [5], Waledac botnet [6], Miner botnet [7], Kelihos botnet [8], and Zero Access botnet [9] have emerged and gradually escalated in recent years.…”
Section: Motivationmentioning
confidence: 99%
“…], [76], the Sybil attack [? ], the Sinkhole attack [77], the Routing Table Poisoning attack [78], DoS attack [79], [80], the DDoS attack [80], [81], with the target being the WSN Nodes of Prime MotorX.…”
Section: B Hacking Scenario On Network Layermentioning
confidence: 99%