Download now Free registration required
Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised machines connect to the central server and wait for commands. However, the first botnets that use Peer-To-Peer (P2P) networks for remote control of the compromised machines appeared in the wild recently. In this paper, the authors introduce a methodology to analyze and mitigate P2P botnets. In a case study, they examine in detail the Storm Worm botnet, the most wide-spread P2P botnet currently propagating in the wild. They were able to infiltrate and analyze in-depth the botnet, which allows one to estimate the total number of compromised machines.
- Format: PDF
- Size: 579.6 KB