Header menu link for other important links
X

Study of P2P Botnet

, Prof. M. S. Chaudhary
Published in International Organization Of Scientific Research (IOSR)
2014
Volume: 16
   
Issue: 4
Pages: 35 - 42
Abstract

Today, centralized botnets are still widely used. In a centralized botnet, bots are connected to several servers (called C&C servers) to obtain commands. This architecture is easy to construct and efficient in distributing botmaster’s commands; however, it has a weak link - the C&C servers. Shutting down those servers would cause all the bots lose contact with their botmaster. In addition, defenders can easily monitor the botnet by creating a decoy to join a specified C&C channel. Today several P2P botnets have emerged Just like P2P networks, which are resilient to dynamic churn (i.e., peers join and leave the system at high rates), P2P botnet communication won’t be disrupted when losing a number of bots. In a P2P botnet, there is no central server, and bots are connected to each other and act as both C&C server and client. P2P botnets have shown advantages over traditional centralized botnets. As the next generation of botnets, they are more robust and difficult for security community to defend. Researchers have started to pay attention to P2P botnets. However, in order to effectively fight against this new form of botnets, enumerating every individual P2P botnet we have seen in the wild is not enough. Instead, we need to study P2P botnets in a systematic way.

About the journal
JournalIOSR Journal of Computer Engineering (IOSR-JCE)
PublisherInternational Organization Of Scientific Research (IOSR)
ISSN2278-8727
Open AccessYes