Study of P2P Botnet

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4

Abstract

 Abstract: Today, centralized botnets are still widely used. In a centralized botnet, bots are connected to several servers (called C&C servers) to obtain commands. This architecture is easy to construct and efficient in distributing botmaster’s commands; however, it has a weak link - the C&C servers. Shutting down those servers would cause all the bots lose contact with their botmaster. In addition, defenders can easily monitor the botnet by creating a decoy to join a specified C&C channel. Today several P2P botnets have emerged Just like P2P networks, which are resilient to dynamic churn (i.e., peers join and leave the system at high rates), P2P botnet communication won’t be disrupted when losing a number of bots. In a P2P botnet, there is no central server, and bots are connected to each other and act as both C&C server and client. P2P botnets have shown advantages over traditional centralized botnets. As the next generation of botnets, they are more robust and difficult for security community to defend. Researchers have started to pay attention to P2P botnets. However, in order to effectively fight against this new form of botnets, enumerating every individual P2P botnet we have seen in the wild is not enough. Instead, we need to study P2P botnets in a systematic way.

Authors and Affiliations

Avadhoot Joshi , Prof. M. S. Chaudhary

Keywords

Related Articles

Simulating ECA-AODV Routing Scheme using TCP for MANETs

ECA model checks different resource constraints before constructing the path. This will ensure long time connectivity between source and destination nodes. TCP model will provide reliable data transfer between source nod...

 Predict Fault-Proneness Module Using Pattern Recognization (A Review)

 Abstract: Background: The accurate prediction of where faults are likely to occur in code can help direct test effort, reduce costs and improve the quality of software. Objective of this paper is We investigate how...

 A Statistical Approach to perform Web Based Summarization

Over the past decade more and more users of the Internet rely on the search engines to help them find the information they need. However the information they find depends to a large extent, on the ranking mechanism o...

 Efficient Data Caching Based On Fuzzy Decision Routing InVehicle Disruption Tolerant Networks

 Abstract: Disruption tolerant networks (DTNs) are characterized by low node density, unpredictable nodemobility, and lack of global network information. Most of current research efforts in DTNs focus on dataforward...

Service Level Management For it Ser-Vices in Small Settings: A Systematic Review

Abstract: This work presents the application of a systematic review protocol for Software Engineering. This protocol is used as a formal model by applying systematic review to Service Level Man-agement. The objective is...

Download PDF file
  • EP ID EP126685
  • DOI 10.9790/0661-16443542
  • Views 103
  • Downloads 0

How To Cite

Avadhoot Joshi, Prof. M. S. Chaudhary (2014).  Study of P2P Botnet. IOSR Journals (IOSR Journal of Computer Engineering), 16(4), 35-42. https://europub.co.uk./articles/-A-126685