An Adaptive Defense Mechanism for P2P Bots
碩士 === 中原大學 === 資訊工程研究所 === 98 === Abstract Among all the security threats in the cyberworld, botnet is one which is highly destructive and ever-increasingly populated such that an attacker can remotely control a large set of compromised computers to launch group or individual attacks against target...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/932pvf |
id |
ndltd-TW-098CYCU5392039 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098CYCU53920392019-05-15T20:33:09Z http://ndltd.ncl.edu.tw/handle/932pvf An Adaptive Defense Mechanism for P2P Bots P2PBots之適應性防禦機制 Keng-Wei Liu 劉耕瑋 碩士 中原大學 資訊工程研究所 98 Abstract Among all the security threats in the cyberworld, botnet is one which is highly destructive and ever-increasingly populated such that an attacker can remotely control a large set of compromised computers to launch group or individual attacks against targeted or non-targeted system. In recent years, the operation model of botnet control has evolved from the centralized IRC or HTTP botnets to the decentralized P2P botnet. The change inflicted degradation in the ability to detect the existence of botnet. The new P2P botnet adopting P2P communication model allows an attacker the capability to deliver attack command from any node in a P2P botnet. Hence, the existing botnet detection or defense mechanisms based on the centralized operation model are not effective in deterring the threats resulted from P2P botnet. Therefore, we devised a 2-stage adaptive detection and defense mechanism for P2P botnet. Processes utilizing P2P communication model are identified according to their network behavior. Then, they are subjected to be monitored for all activities on host computers. When any of the designated anomaly behaviors is detected, defense mechanism, such as the activation of a firewall rule to block the traffic to or from the corresponding communication port, are employed. The proposed mechanism can perform the intended defense whether or not the bot malware is a known one, a variation or a previously unknown one. A prototype system has been implemented and the effectiveness of the proposed scheme is verified. Hsiao-Rong Tyan 田筱榮 2010 學位論文 ; thesis 45 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 中原大學 === 資訊工程研究所 === 98 === Abstract
Among all the security threats in the cyberworld, botnet is one which is highly destructive and ever-increasingly populated such that an attacker can remotely control a large set of compromised computers to launch group or individual attacks against targeted or non-targeted system. In recent years, the operation model of botnet control has evolved from the centralized IRC or HTTP botnets to the decentralized P2P botnet. The change inflicted degradation in the ability to detect the existence of botnet. The new P2P botnet adopting P2P communication model allows an attacker the capability to deliver attack command from any node in a P2P botnet. Hence, the existing botnet detection or defense mechanisms based on the centralized operation model are not effective in deterring the threats resulted from P2P botnet. Therefore, we devised a 2-stage adaptive detection and defense mechanism for P2P botnet. Processes utilizing P2P communication model are identified according to their network behavior. Then, they are subjected to be monitored for all activities on host computers. When any of the designated anomaly behaviors is detected, defense mechanism, such as the activation of a firewall rule to block the traffic to or from the corresponding communication port, are employed. The proposed mechanism can perform the intended defense whether or not the bot malware is a known one, a variation or a previously unknown one. A prototype system has been implemented and the effectiveness of the proposed scheme is verified.
|
author2 |
Hsiao-Rong Tyan |
author_facet |
Hsiao-Rong Tyan Keng-Wei Liu 劉耕瑋 |
author |
Keng-Wei Liu 劉耕瑋 |
spellingShingle |
Keng-Wei Liu 劉耕瑋 An Adaptive Defense Mechanism for P2P Bots |
author_sort |
Keng-Wei Liu |
title |
An Adaptive Defense Mechanism for P2P Bots |
title_short |
An Adaptive Defense Mechanism for P2P Bots |
title_full |
An Adaptive Defense Mechanism for P2P Bots |
title_fullStr |
An Adaptive Defense Mechanism for P2P Bots |
title_full_unstemmed |
An Adaptive Defense Mechanism for P2P Bots |
title_sort |
adaptive defense mechanism for p2p bots |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/932pvf |
work_keys_str_mv |
AT kengweiliu anadaptivedefensemechanismforp2pbots AT liúgēngwěi anadaptivedefensemechanismforp2pbots AT kengweiliu p2pbotszhīshìyīngxìngfángyùjīzhì AT liúgēngwěi p2pbotszhīshìyīngxìngfángyùjīzhì AT kengweiliu adaptivedefensemechanismforp2pbots AT liúgēngwěi adaptivedefensemechanismforp2pbots |
_version_ |
1719100191300124672 |