首页> 外文会议>International Conference on Malicious and Unwanted Software >Sybil attacks as a mitigation strategy against the Storm botnet
【24h】

Sybil attacks as a mitigation strategy against the Storm botnet

机译:Sybil攻击作为暴风雨僵局的缓解战略

获取原文

摘要

The Storm botnet is one of the most sophisticated botnet active today, used for a variety of illicit activities. A key requirement for these activities is the ability by the botnet operators to transmit commands to the bots, or at least to the various segmented portions of the botnet. Disrupting these command and control (C&C) channels therefore becomes an attractive avenue to reducing botnets effectiveness and efficiency. Since the command and control infrastructure of Storm is based on peer-to-peer (P2P) networks, previous work has explored the use of index poisoning, a disruption method developed for file-sharing P2P networks, where the network is inundated with false information about the location of files. In contrast, in this paper we explore the feasibility of Sybil attacks as a mitigation strategy against Storm. The aim here is to infiltrate the botnet with large number of fake nodes (sybils), that seek to disrupt the communication between the bots by inserting themselves in the peer lists of “regular” bots, and eventually re-reroute or disrupt “real” C&C traffic. An important difference with index poisoning attacks is that sybil nodes must remain active and participate in the underlying P2P protocols, in order to remain in the peer list of regular bot nodes. However, they do not have to respond to the botmaster’s commands and participate into illicit activities. First, we outline a methodology for mounting practical Sybil attacks on the Storm botnet. Then, we describe our simulation studies, which provide some insights regarding the number of sybils necessary to achieve the desired level of disruption, with respect to the net growth rate of the botnet. We also explore how certain parameters such as the duration of the Sybil attack, and botnet design choices such as the size of a bot’s peer list, affect the effectiveness of the attack.
机译:Storm Botnet是今天最先进的僵尸网络之一,用于各种非法活动。这些活动的关键要求是僵尸网络运营商的能力将命令传输到机器人,或者至少到僵尸网络的各个分段部分。因此,扰乱这些命令和控制(C&C)渠道因此成为有吸引力的途径,以降低僵尸网络的有效性和效率。由于Storm的命令和控制基础设施基于点对点(P2P)网络,因此之前的工作已经探索了指数中毒的使用,这是一种用于文件共享P2P网络的中断方法,其中网络被虚假信息淹没关于文件的位置。相比之下,在本文中,我们探讨了Sybil攻击作为暴风雨的缓解战略的可行性。这里的目的是渗透大量假冒节点(Sybils)的僵尸网络,这将通过在“常规”机器人的对等列表中,并最终重新排出或扰乱“真实”来扰乱机器人之间的通信。 C&C流量。与指数中毒攻击的重要区别是Sybil节点必须保持活动并参与底层P2P协议,以便保留在常规BOT节点的对等列表中。但是,他们不必回应Botmaster的命令并参与非法活动。首先,我们概述了在风暴僵尸网络上安装实用的Sybil攻击的方法。然后,我们描述了我们的仿真研究,这对植物网的净增长率提供了有关达到所需的中断水平所需的Sybils数量的一些见解。我们还探讨了Sybil攻击的持续时间,以及僵尸网络设计选择,如机器人的对等列表的大小,影响了攻击的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号