2008
DOI: 10.1007/978-3-540-88313-5_30
|View full text |Cite
|
Sign up to set email alerts
|

Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 33 publications
(24 citation statements)
references
References 14 publications
0
24
0
Order By: Relevance
“…A scale-free network, which consists of a few highly-connected "hub" nodes and many "leaf" nodes, has been found to be particularly vulnerable to attacks where high-degree nodes are removed first. A takedown strategy that targets high-degree nodes is also recommended by previous works that studied botnet models [10,11,41], particularly for unstructured P2P networks where there are "super-peers" present.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…A scale-free network, which consists of a few highly-connected "hub" nodes and many "leaf" nodes, has been found to be particularly vulnerable to attacks where high-degree nodes are removed first. A takedown strategy that targets high-degree nodes is also recommended by previous works that studied botnet models [10,11,41], particularly for unstructured P2P networks where there are "super-peers" present.…”
Section: Related Workmentioning
confidence: 99%
“…We first focus on strategies explored in previous works that study botnet models [10,11,41,19]: -Uniform takedown: removing nodes from the network by selecting them uniformly at random. -Degree-based takedown: removing nodes from the network in descending order of node degree, that is, targeting high-degree nodes first.…”
Section: Uniform and Degree-based Takedown Strategiesmentioning
confidence: 99%
See 2 more Smart Citations
“…From the attacker's viewpoint, in terms of efficiency, Kad has the most efficient routing: contacting O(log N ) nodes during a search (where N is the size of the network); the modified Chord can achieve O(log 2 N ) hops; and the simple ring is the worst, requiring O(N ) steps. From resilience's perspective, the Kad network is shown to be robust to a few types of mitigation strategies such as cutting off random nodes and removing peers learnt from bots' peer lists [5]; the simple ring structure is evidently fragileremoving a couple of nodes can disconnect the overlay; and the modified Chord structure hits the middle ground: not as resilient as Kad but better than the simple ring. We believe that, while constructing a P2P botnet, the attacker needs to strike a balance between resilience or efficiency and the ability to evade detection.…”
Section: Insights From Analysismentioning
confidence: 99%