文件名称:Measurements and Mitigation of Peer-to-Peer-based Botnets - A Case Study on Storm Worm
文件大小:1019KB
文件格式:PDF
更新时间:2013-05-21 17:10:23
Storm-Worm 僵尸网络 P2P Botnet botnet
Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised machines connect to the central server and wait for commands. However, the first botnets that use peer-to-peer (P2P) networks for remote control of the compromised machines appeared in the wild recently. In this paper, we introduce a methodology to analyze and mitigate P2P botnets. In a case study, we examine in detail the Storm Worm botnet, the most wide-spread P2P botnet currently propagating in the wild. We were able to infiltrate and analyze in-depth the botnet, which allows us to estimate the total number of compromised machines. Furthermore, we present two different ways to disrupt the communication channel between controller and compromised machines in order to mitigate the botnet and evaluate the effectiveness of these mechanisms. 僵尸网络,在一定公用控制机构下的一些计算机组成的网络,通常被攻击者使用控制中心服务器控制,网络中的机器连接到中心控制服务器并等待接收控制命令。 然而,第一个使用P2P网络来进行远程控制感染机器的僵尸网路确实最近才出现的。在本文中,我们介绍了分析和处理P2P僵尸网络的一种方法。在此研究中,我们深入检查了Storm Worm僵尸网络,它是现在网络上传播最广的P2P僵尸程序。我们能够深入渗透和分析僵尸网络,估计整个被感染控制机器的总体数量。此外,我们介绍了两种截断控制者和感染机器间的控制信道的方法来防范这个僵尸网络,同时评估了这些机制的有效性。