P2P Botnet Prevention With The Help of Sybil Attack

  • Sagar M Mane University of Pune
  • Avadhoot S Joshi
  • Vishal V Bhanawase
Keywords: Botnet, P2P Botnet, Index, poisoning, Sybil attack, Kademlia Protocol

Abstract

—“Botnet” is a network of computers that are compromised and controlled by an attacker. Botnets are one of the most serious threats to today’s Internet. Most current botnets have centralized command and control (C&C) architecture. However, peer-to-peer (P2P) structured botnets have gradually emerged as a new advanced form of botnets. Without central C&C servers, P2P botnets are more resilient to defences and countermeasures than traditional centralized botnets. In this paper, we systematically study P2P botnets along multiple dimensions: bot candidate selection, network construction, C&C mechanisms and communication protocols, and mitigation approaches. We carefully study two defence approaches: index poisoning and Sybil attack. According to the common idea shared by them, we are able to give analytical results to evaluate their performance. We also propose possible counter techniques which might be developed by attackers against index poisoning and Sybil attack defences. In addition, we obtain one interesting finding: compared to traditional centralized botnets, by using index poisoning technique, it is easier to shut down or at least effectively mitigate P2P botnets that adopt existing P2P protocols and rely on file index to disseminate commands.

References

[1] Abhijeet B. Potey, Prof.Anjali B.Raut “Defending Sybil Using Social Network”, International Journal of Engineering and Computer Science (IJECS) Volume 2 Issue, Page No. 196-199, 2 Feb 2013. [2] “Botnets - the evolving nature of adversaries, tactics, techniques and procedures” Georgia Tech Cyber Security Summit, 2011, Pages 6-7. [3] Joseph Massi, Sudhir Panda, Girish Rajappa, Senthil Selvaraj and Swapana Revankar “Botnet Detection and Mitigation” Proceedings of Student-Faculty Research Day, Pace University, 2010. [4] Andrew White, Alan Tickle, and Andrew Clark “Overcoming Reputation and Proof-of-Work Systems in Botnets” Fourth international Conference on Network and System Security, 2010. [5] Zhou Hangxia “Mitigating Peer-to-Peer Botnets by Sybil attacks”, International Conference on Innovative Computing and Communication and Asia-Pacific Conference on Information Technology and Ocean engineering © IEEE, 2010. [6] Oliver Jetter, Jochen Dinger, and Hannes Hartenstein “Quantitative Analysis of the Sybil Attack and Effective Sybil Resistance in Peerto-Peer Systems”, IEEE ICC proceedings, 2010. [7] Junfeng Duan, Jian Jiao, Chunhe Xia, Shan Yao, and Xiaojian Li “Descriptive Model of Peer-to-Peer Botnet Structures”, International Conference on Educational and Information Technology (lCEIT), 2010. [8] Ping Wang, Sherri Sparks, and Cliff C. Zou “An Advanced Hybrid Peer-to-Peer Botnet”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 7, NO. 2, Pages 113-127, APRIL-JUNE 2010. [9] Ping Wang, Lei Wu, Baber Aslam and Cliff C. Zou “A Systematic Study on Peer-to-Peer Botnets” IEEE, 2009. [10] Carlton R. Davis, Jos´e M. Fernandez, and Stephen Neville “Optimising Sybil Attacks against P2P-based Botnets”, 2009. [11] Ping Wang, Lei Wu, Baber Aslam and Cliff C. Zou “A Systematic Study on Peer-to-Peer Botnets” IEEE, 2009. [12] Duc T. Ha, Guanhua Yan, Stephan Eidenbenz, and Hung Q. Ngo “On the Effectiveness of Structural Detection and Defence Against P2Pbased Botnets”, 2009. [13] Thibault Cholez, Isabelle Chrisment and Olivier Festor “Evaluation of Sybil Attacks Protection Schemes in KAD”, published in 3rd International Conference on Autonomous Infrastructure, Management and Security – AIMS, 2009. [14] Robert F. Erbacher, Adele Cutler, Pranab Banerjee, and Jim Marshall “A Multi-Layered Approach to Botnet Detection”, 2008. [15] Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, and Felix Freiling “Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm”, 2008. [16] Reinier Schoof and Ralph Koning “Detecting peer-to-peer botnets”, 2007. [17] Antti Nummipuro “Detecting P2P-Controlled Bots on the Host” Seminar on Network security, 2007. [18] Daniel Stutzbach and Reza Rejaie “Improving Lookup Performance over a Widely-Deployed DHT”, infocom, 2006. [19] “Kademlia: A Design Specification”, the XLattice Project, 20032006.
[20] John R. Douceur “The Sybil Attack”, in the proceeding of first international workshop on peer-to-peer systems (IPTPS), Pages 251256, 2002. [21] Petar Maymounkov and David Mazi`eres “Kademlia: A Peer-to-peer Information System Based on the XOR Metric”. [22] Benedikt Westermann, Andriy Panchenko, and Lexi Pimenidis “A Kademlia-based Node Lookup System for Anonymization Networks”. [23] Isabel Pita and Adrian Riesco “Specifying and Analysing the Kademlia Protocol in Maude*”. [24] Manoj Rameshchandra Thakur “Distributed and Cooperative Approach to Botnet Detection Using Gossip Protocol”. [25] Moritz Steiner, Taoufik En-Najjary, and Ernst W. Biersack “Exploiting KAD: Possible Uses and Misuses”. [26] M. Patrick Collins, Timothy J. Shimeall, Sidney Faber, Jeff Janies, Rhiannon Weaver, and Markus De Shon “Using uncleanliness to predict future botnet addresses”. [27] Kademlia - Wikipedia, the free encyclopedia. [28] Distributed hash table - Wikipedia, the free encyclopedia.
Published
2017-12-17
How to Cite
Mane, S., Joshi, A., & Bhanawase, V. (2017). P2P Botnet Prevention With The Help of Sybil Attack. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 2(2). Retrieved from http://www.asianssr.org/index.php/ajct/article/view/109
Section
Article

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.