2010 International Conference on Innovative Computing and Communication and 2010 Asia-Pacific Conference on Information Technol 2010
DOI: 10.1109/cicc-itoe.2010.67
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Peer-to-Peer Botnets by Sybil Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…A Sybil attack [43] is an effective method to terminate P2P botnets by creating many fake identities and inserting them into the bot's routing table to re-route the command queries and eventually disrupt the botmaster's C&C communication. Although P2P botnets are vulnerable to this kind of attack, our model was not as the bots did not connect with each other.…”
Section: The Resilience Against Sybil Attacksmentioning
confidence: 99%
“…A Sybil attack [43] is an effective method to terminate P2P botnets by creating many fake identities and inserting them into the bot's routing table to re-route the command queries and eventually disrupt the botmaster's C&C communication. Although P2P botnets are vulnerable to this kind of attack, our model was not as the bots did not connect with each other.…”
Section: The Resilience Against Sybil Attacksmentioning
confidence: 99%
“…One other technique proposed in the work by Hangxia et al [103] takes advantage of the vulnerability posed by the fact that nodes can join a P2P botnet without any way of confirming whether they were honest nodes or not. In this technique, the routing table of botnets are poisoned (compromised by infiltration) with nodes information; thereby causing it to re-route the command Some modern techniques have also proposed improvements to some of the pitfalls posed by some analysis-based techniques, in order to enhance their potency and reduce the number of false positives generated, such as Huang (2013) [98], Narang et al [99] and in Narang et al [100].…”
Section: Exploit/take Downmentioning
confidence: 99%
“…One other technique proposed in the work by Hangxia et al [103] takes advantage of the vulnerability posed by the fact that nodes can join a P2P botnet without any way of confirming whether they were honest nodes or not. In this technique, the routing table of botnets are poisoned (compromised by infiltration) with nodes information; thereby causing it to re-route the command information from the attacker to possibly non-existent nodes, and disrupting C&C communication, thereby mitigating the impact of the botnet.…”
Section: Exploit/take Downmentioning
confidence: 99%
“…They also study the effect of the sybil nodes sizes in attacking P2P botnet. Their proposed method has been evaluated by simulation and theoretically (Hangxia, 2010).…”
Section: Mitigating Peer-to-peer Botnets By Sybil Attacksmentioning
confidence: 99%
“…They evaluate this approach in both simple and realistic cases and achieve an encouraging good detection rate of C&C channel (Chang and Daniels, 2009). Gu et al (2008) Proposed a general botnet detection BotMiner can be useful for framework named BotMiner, based on detecting IRC botnet, but it is clustering analysis of network traffic not effective for detecting P2P botnet Masud et al (2008) Proposed a general botnet detection BotMiner can be useful for detecting framework named BotMiner, based botnet, but it is not effective for on clustering analysis of network traffic detecting P2P botnet Noh et al (2009) They consider the network traffic as They have better detection accuracy infinite data stream and use data mining than other data stream classification techniques to detect P2P botnet techniques Kang and Zhang (2009) Propose using a multi-phased flow The proposed system shows the model to detect malicious traffic efficiency with the SpamThru, Storm and Nugache botnets Kang and Zhang (2009) Applying the information entropy theory The results show that the entropy theory In the detection Multi-chart CUS UM to has its own advantages in detecting detect new P2P botnets P2P botnets Chang and Daniels (2009) Present two detection schemes using The proposed algorithms achieve an behavior clustering and statistical tests encouraging good detection rate of clustering and statistical tests C&C channel Chen et al (2009) Propose a detection method of P2P Effective in detecting the controlled bots controlled bots on the hosts, using API on the host, but has few limitations as the function calls and algorithms to process APIs large training set required to improve the detection accuracy Hangxia (2010) They propose mitigating P2P botnets using The results show that sybil attack technique Two Sybil attacks, based on analyzing can be quite effective to defend botnets' weaknesses against P2P botnets Liu et al (2010) Present a general P2P detection model and It can be used to detect unknown protocol algorithms based on network stream analysis P2P botnets effectively Al-Hammadi and Aickelin (2010) Developed an algorithm to detect P2P bots…”
Section: Behavior Clustering and Statistical Testsmentioning
confidence: 99%