首页> 外文OA文献 >Advanced monitoring in P2P botnets
【2h】

Advanced monitoring in P2P botnets

机译:P2P僵尸网络中的高级监控

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Botnets are increasingly being held responsible for most of the cybercrimes that occur nowadays. They are used to carry out malicious activities like banking credential theft and Distributed Denial of Service (DDoS) attacks to generate profit for their owner, the botmaster. Traditional botnets utilized centralized and decentralized Command-and-Control Servers (C2s). However, recent botnets have been observed to prefer P2P-based architectures to overcome some of the drawbacks of the earlier architectures. \ud\udA P2P architecture allows botnets to become more resilient and robust against random node failures and targeted attacks. However, the distributed nature of such botnets requires the defenders, i.e., researchers and law enforcement agencies, to use specialized tools such as crawlers and sensor nodes to monitor them. In return to such monitoring, botmasters have introduced various countermeasures to impede botnet monitoring, e.g., automated blacklisting mechanisms. \ud\udThe presence of anti-monitoring mechanisms not only render any gathered monitoring data to be inaccurate or incomplete, it may also adversely affect the success rate of botnet takedown attempts that rely upon such data. Most of the existing monitoring mechanisms identified from the related works only attempt to tolerate anti-monitoring mechanisms as much as possible, e.g., crawling bots with lower frequency. However, this might also introduce noise into the gathered data, e.g., due to the longer delay for crawling the botnet. This in turn may also reduce the quality of the data. \ud\udThis dissertation addresses most of the major issues associated with monitoring in P2P botnets as described above. Specifically, it analyzes the anti-monitoring mechanisms of three existing P2P botnets: 1) GameOver Zeus, 2)Sality, and 3) ZeroAccess, and proposes countermeasures to circumvent some of them. In addition, this dissertation also\udproposes several advanced anti-monitoring mechanisms from the perspective of a botmaster to anticipate future advancement of the botnets. This includes a set of lightweight crawler detection mechanisms as well as several novel mechanisms to detect sensor nodes deployed in P2P botnets. To ensure that the defenders do not loose this arms race, this dissertation also includes countermeasures to circumvent the proposed anti-monitoring mechanisms. Finally, this dissertation also investigates if the presence of third party monitoring mechanisms, e.g., sensors, in botnets influences the overall churn measurements. In addition, churn models for Sality and ZeroAccess are also derived using fine-granularity churn measurements. \ud\udThe works proposed in this dissertation have been evaluated using either real-world botnet datasets, i.e., that were gathered using crawlers and sensor nodes, or simulated datasets. Evaluation results indicate that most of the anti-monitoring mechanisms implemented by existing botnets can either be circumvented or tolerated to obtain monitoring data with a better quality. However, many crawlers and\udsensor nodes in existing botnets are found vulnerable to the antimonitoring mechanisms that are proposed from the perspective of a botmaster in this dissertation. Analysis of the fine-grained churn measurements for Sality and ZeroAccess indicate that churn in these botnets are similar to that of regular P2P file-sharing networks like Gnutella and Bittorent. In addition, the presence of highly responsive sensor nodes in the botnets are found not influencing the overall churn measurements. This is mainly due to low number of sensor nodes currently deployed in the botnets. Existing and future botnet monitoring mechanisms should apply the findings of this dissertation to ensure high quality monitoring data, and to remain undetected from the bots or the botmasters.
机译:僵尸网络越来越多地应对当今发生的大多数网络犯罪负责。它们被用来进行恶意活动,例如银行凭证盗窃和分布式拒绝服务(DDoS)攻击,以为其所有者,僵尸网络管理员赚钱。传统的僵尸网络利用集中式和分散式的命令与控制服务器(C2)。但是,已经发现,最近的僵尸网络更喜欢基于P2P的体系结构,以克服早期体系结构的某些缺点。 \ ud \ udP2P体系结构使僵尸网络变得更有弹性,更强大,可以抵抗随机节点故障和针对性攻击。但是,这种僵尸网络的分布式性质要求防御者(即研究人员和执法机构)使用专门的工具(例如爬虫和传感器节点)进行监视。作为这种监视的回报,僵尸网络管理员引入了各种阻止僵尸网络监视的对策,例如自动黑名单机制。反监控机制的存在不仅使收集的监控数据不准确或不完整,还会对依赖于此类数据的僵尸网络删除尝试的成功率产生不利影响。从相关工作中发现的大多数现有监视机制仅试图尽可能地容忍反监视机制,例如,以较低频率爬行机器人。但是,例如,由于爬虫僵尸网络的延迟时间较长,这也可能会将噪声引入收集的数据中。反过来,这也可能会降低数据质量。 \ ud \ ud如上所述,本文解决了与P2P僵尸网络中的监视相关的大多数主要问题。具体来说,它分析了三个现有的P2P僵尸网络的反监视机制:1)GameOver Zeus,2)Sality和3)ZeroAccess,并提出了对策来规避其中的一些对策。此外,本文还从僵尸网络管理员的角度提出了几种先进的反监控机制,以期对僵尸网络的未来发展进行展望。这包括一组轻量级爬虫检测机制以及几种新颖的机制来检测部署在P2P僵尸网络中的传感器节点。为了确保捍卫者不会失去这场军备竞赛,本文还包括对策,以规避拟议的反监督机制。最后,本文还研究了僵尸网络中第三方监控机制(例如传感器)的存在是否会影响总体客户流失度量。此外,Sality和ZeroAccess的客户流失模型也可以使用细粒度客户流失测量得出。 \ ud \ ud本论文中提出的工作已使用实际的僵尸网络数据集(即使用爬虫和传感器节点收集的僵尸网络数据集)或模拟数据集进行了评估。评估结果表明,可以绕开或容忍现有僵尸网络实施的大多数反监视机制,以获得质量更高的监视数据。然而,发现现有僵尸网络中的许多爬虫和\ udsensor节点容易受到从僵尸网络管理员的角度提出的反监视机制的影响。对Sality和ZeroAccess的细粒度流失度量的分析表明,这些僵尸网络中的流失与常规的P2P文件共享网络(如Gnutella和Bittorent)相似。此外,发现僵尸网络中高响应传感器节点的存在不影响总体流失度量。这主要是由于僵尸网络中当前部署的传感器节点数量较少。僵尸网络的现有监控机制和未来的僵尸网络监控机制都应运用本文的研究结果,以确保高质量的监控数据,并避免被僵尸网络或僵尸网络主机检测到。

著录项

  • 作者

    Karuppayah, Shankar;

  • 作者单位
  • 年度 2016
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号