Download now Free registration required
Today malware distribution techniques have become more effective due to Peer-To-Peer (P2P) technology adopted by botmasters in order to facilitate spreading of malicious contents in the global network. However, obtaining flexible and self-organizing data exchange mechanisms, P2P botnets inherit the vulnerabilities of the routing scheme typical for structured P2P systems. In this paper, the authors analyze the impact of such vulnerabilities on the functionality of different DHT routing schemes adopted by botnet communities. They believe these vulnerabilities can be exploited by an intruder peer purposely introduced into a botnet, in order to significantly decrease the activity of the community.
- Format: PDF
- Size: 253 KB